Mar 12 05:28:46 localhost kernel: Linux version 5.14.0-687.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-14), GNU ld version 2.35.2-72.el9) #1 SMP PREEMPT_DYNAMIC Mon Feb 23 11:11:46 UTC 2026 Mar 12 05:28:46 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Mar 12 05:28:46 localhost kernel: Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-687.el9.x86_64 root=UUID=d95c3fed-ff86-4b48-8422-63578d153f1e ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Mar 12 05:28:46 localhost kernel: BIOS-provided physical RAM map: Mar 12 05:28:46 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Mar 12 05:28:46 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Mar 12 05:28:46 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Mar 12 05:28:46 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Mar 12 05:28:46 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Mar 12 05:28:46 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Mar 12 05:28:46 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Mar 12 05:28:46 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable Mar 12 05:28:46 localhost kernel: NX (Execute Disable) protection: active Mar 12 05:28:46 localhost kernel: APIC: Static calls initialized Mar 12 05:28:46 localhost kernel: SMBIOS 2.8 present. Mar 12 05:28:46 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Mar 12 05:28:46 localhost kernel: Hypervisor detected: KVM Mar 12 05:28:46 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Mar 12 05:28:46 localhost kernel: kvm-clock: using sched offset of 7380509695 cycles Mar 12 05:28:46 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Mar 12 05:28:46 localhost kernel: tsc: Detected 2799.998 MHz processor Mar 12 05:28:46 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 12 05:28:46 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 12 05:28:46 localhost kernel: last_pfn = 0x240000 max_arch_pfn = 0x400000000 Mar 12 05:28:46 localhost kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Mar 12 05:28:46 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 12 05:28:46 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Mar 12 05:28:46 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Mar 12 05:28:46 localhost kernel: Using GB pages for direct mapping Mar 12 05:28:46 localhost kernel: RAMDISK: [mem 0x1b6b6000-0x29b52fff] Mar 12 05:28:46 localhost kernel: ACPI: Early table checksum verification disabled Mar 12 05:28:46 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Mar 12 05:28:46 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 12 05:28:46 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 12 05:28:46 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 12 05:28:46 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Mar 12 05:28:46 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 12 05:28:46 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 12 05:28:46 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Mar 12 05:28:46 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Mar 12 05:28:46 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Mar 12 05:28:46 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Mar 12 05:28:46 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Mar 12 05:28:46 localhost kernel: No NUMA configuration found Mar 12 05:28:46 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000023fffffff] Mar 12 05:28:46 localhost kernel: NODE_DATA(0) allocated [mem 0x23ffd5000-0x23fffffff] Mar 12 05:28:46 localhost kernel: crashkernel reserved: 0x00000000af000000 - 0x00000000bf000000 (256 MB) Mar 12 05:28:46 localhost kernel: Zone ranges: Mar 12 05:28:46 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 12 05:28:46 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Mar 12 05:28:46 localhost kernel: Normal [mem 0x0000000100000000-0x000000023fffffff] Mar 12 05:28:46 localhost kernel: Device empty Mar 12 05:28:46 localhost kernel: Movable zone start for each node Mar 12 05:28:46 localhost kernel: Early memory node ranges Mar 12 05:28:46 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Mar 12 05:28:46 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Mar 12 05:28:46 localhost kernel: node 0: [mem 0x0000000100000000-0x000000023fffffff] Mar 12 05:28:46 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000023fffffff] Mar 12 05:28:46 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 12 05:28:46 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Mar 12 05:28:46 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Mar 12 05:28:46 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Mar 12 05:28:46 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Mar 12 05:28:46 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Mar 12 05:28:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Mar 12 05:28:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Mar 12 05:28:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 12 05:28:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Mar 12 05:28:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Mar 12 05:28:46 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 12 05:28:46 localhost kernel: TSC deadline timer available Mar 12 05:28:46 localhost kernel: CPU topo: Max. logical packages: 8 Mar 12 05:28:46 localhost kernel: CPU topo: Max. logical dies: 8 Mar 12 05:28:46 localhost kernel: CPU topo: Max. dies per package: 1 Mar 12 05:28:46 localhost kernel: CPU topo: Max. threads per core: 1 Mar 12 05:28:46 localhost kernel: CPU topo: Num. cores per package: 1 Mar 12 05:28:46 localhost kernel: CPU topo: Num. threads per package: 1 Mar 12 05:28:46 localhost kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Mar 12 05:28:46 localhost kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Mar 12 05:28:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Mar 12 05:28:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Mar 12 05:28:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Mar 12 05:28:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Mar 12 05:28:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Mar 12 05:28:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Mar 12 05:28:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Mar 12 05:28:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Mar 12 05:28:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Mar 12 05:28:46 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Mar 12 05:28:46 localhost kernel: Booting paravirtualized kernel on KVM Mar 12 05:28:46 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Mar 12 05:28:46 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Mar 12 05:28:46 localhost kernel: percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 Mar 12 05:28:46 localhost kernel: pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 Mar 12 05:28:46 localhost kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Mar 12 05:28:46 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Mar 12 05:28:46 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-687.el9.x86_64 root=UUID=d95c3fed-ff86-4b48-8422-63578d153f1e ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Mar 12 05:28:46 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-687.el9.x86_64", will be passed to user space. Mar 12 05:28:46 localhost kernel: random: crng init done Mar 12 05:28:46 localhost kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Mar 12 05:28:46 localhost kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Mar 12 05:28:46 localhost kernel: Fallback order for Node 0: 0 Mar 12 05:28:46 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 2064091 Mar 12 05:28:46 localhost kernel: Policy zone: Normal Mar 12 05:28:46 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Mar 12 05:28:46 localhost kernel: software IO TLB: area num 8. Mar 12 05:28:46 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Mar 12 05:28:46 localhost kernel: ftrace: allocating 49605 entries in 194 pages Mar 12 05:28:46 localhost kernel: ftrace: allocated 194 pages with 3 groups Mar 12 05:28:46 localhost kernel: Dynamic Preempt: voluntary Mar 12 05:28:46 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Mar 12 05:28:46 localhost kernel: rcu: RCU event tracing is enabled. Mar 12 05:28:46 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Mar 12 05:28:46 localhost kernel: Trampoline variant of Tasks RCU enabled. Mar 12 05:28:46 localhost kernel: Rude variant of Tasks RCU enabled. Mar 12 05:28:46 localhost kernel: Tracing variant of Tasks RCU enabled. Mar 12 05:28:46 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Mar 12 05:28:46 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Mar 12 05:28:46 localhost kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Mar 12 05:28:46 localhost kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Mar 12 05:28:46 localhost kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Mar 12 05:28:46 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Mar 12 05:28:46 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Mar 12 05:28:46 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Mar 12 05:28:46 localhost kernel: Console: colour VGA+ 80x25 Mar 12 05:28:46 localhost kernel: printk: console [ttyS0] enabled Mar 12 05:28:46 localhost kernel: ACPI: Core revision 20230331 Mar 12 05:28:46 localhost kernel: APIC: Switch to symmetric I/O mode setup Mar 12 05:28:46 localhost kernel: x2apic enabled Mar 12 05:28:46 localhost kernel: APIC: Switched APIC routing to: physical x2apic Mar 12 05:28:46 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Mar 12 05:28:46 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Mar 12 05:28:46 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Mar 12 05:28:46 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Mar 12 05:28:46 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Mar 12 05:28:46 localhost kernel: mitigations: Enabled attack vectors: user_kernel, user_user, guest_host, guest_guest, SMT mitigations: auto Mar 12 05:28:46 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Mar 12 05:28:46 localhost kernel: Spectre V2 : Mitigation: Retpolines Mar 12 05:28:46 localhost kernel: RETBleed: Mitigation: untrained return thunk Mar 12 05:28:46 localhost kernel: Speculative Return Stack Overflow: Mitigation: SMT disabled Mar 12 05:28:46 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 12 05:28:46 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Mar 12 05:28:46 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Mar 12 05:28:46 localhost kernel: active return thunk: retbleed_return_thunk Mar 12 05:28:46 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Mar 12 05:28:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Mar 12 05:28:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Mar 12 05:28:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Mar 12 05:28:46 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Mar 12 05:28:46 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Mar 12 05:28:46 localhost kernel: Freeing SMP alternatives memory: 40K Mar 12 05:28:46 localhost kernel: pid_max: default: 32768 minimum: 301 Mar 12 05:28:46 localhost kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf Mar 12 05:28:46 localhost kernel: landlock: Up and running. Mar 12 05:28:46 localhost kernel: Yama: becoming mindful. Mar 12 05:28:46 localhost kernel: SELinux: Initializing. Mar 12 05:28:46 localhost kernel: LSM support for eBPF active Mar 12 05:28:46 localhost kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Mar 12 05:28:46 localhost kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Mar 12 05:28:46 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Mar 12 05:28:46 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Mar 12 05:28:46 localhost kernel: ... version: 0 Mar 12 05:28:46 localhost kernel: ... bit width: 48 Mar 12 05:28:46 localhost kernel: ... generic registers: 6 Mar 12 05:28:46 localhost kernel: ... value mask: 0000ffffffffffff Mar 12 05:28:46 localhost kernel: ... max period: 00007fffffffffff Mar 12 05:28:46 localhost kernel: ... fixed-purpose events: 0 Mar 12 05:28:46 localhost kernel: ... event mask: 000000000000003f Mar 12 05:28:46 localhost kernel: signal: max sigframe size: 1776 Mar 12 05:28:46 localhost kernel: rcu: Hierarchical SRCU implementation. Mar 12 05:28:46 localhost kernel: rcu: Max phase no-delay instances is 400. Mar 12 05:28:46 localhost kernel: smp: Bringing up secondary CPUs ... Mar 12 05:28:46 localhost kernel: smpboot: x86: Booting SMP configuration: Mar 12 05:28:46 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Mar 12 05:28:46 localhost kernel: smp: Brought up 1 node, 8 CPUs Mar 12 05:28:46 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Mar 12 05:28:46 localhost kernel: node 0 deferred pages initialised in 11ms Mar 12 05:28:46 localhost kernel: Memory: 7617648K/8388068K available (16384K kernel code, 5797K rwdata, 13956K rodata, 4204K init, 7172K bss, 764500K reserved, 0K cma-reserved) Mar 12 05:28:46 localhost kernel: devtmpfs: initialized Mar 12 05:28:46 localhost kernel: x86/mm: Memory block size: 128MB Mar 12 05:28:46 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Mar 12 05:28:46 localhost kernel: futex hash table entries: 2048 (131072 bytes on 1 NUMA nodes, total 128 KiB, linear). Mar 12 05:28:46 localhost kernel: pinctrl core: initialized pinctrl subsystem Mar 12 05:28:46 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 12 05:28:46 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations Mar 12 05:28:46 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Mar 12 05:28:46 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Mar 12 05:28:46 localhost kernel: audit: initializing netlink subsys (disabled) Mar 12 05:28:46 localhost kernel: audit: type=2000 audit(1773307724.145:1): state=initialized audit_enabled=0 res=1 Mar 12 05:28:46 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Mar 12 05:28:46 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 12 05:28:46 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Mar 12 05:28:46 localhost kernel: cpuidle: using governor menu Mar 12 05:28:46 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 12 05:28:46 localhost kernel: PCI: Using configuration type 1 for base access Mar 12 05:28:46 localhost kernel: PCI: Using configuration type 1 for extended access Mar 12 05:28:46 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 12 05:28:46 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Mar 12 05:28:46 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Mar 12 05:28:46 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Mar 12 05:28:46 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Mar 12 05:28:46 localhost kernel: Demotion targets for Node 0: null Mar 12 05:28:46 localhost kernel: cryptd: max_cpu_qlen set to 1000 Mar 12 05:28:46 localhost kernel: ACPI: Added _OSI(Module Device) Mar 12 05:28:46 localhost kernel: ACPI: Added _OSI(Processor Device) Mar 12 05:28:46 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 12 05:28:46 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Mar 12 05:28:46 localhost kernel: ACPI: Interpreter enabled Mar 12 05:28:46 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Mar 12 05:28:46 localhost kernel: ACPI: Using IOAPIC for interrupt routing Mar 12 05:28:46 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 12 05:28:46 localhost kernel: PCI: Using E820 reservations for host bridge windows Mar 12 05:28:46 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Mar 12 05:28:46 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Mar 12 05:28:46 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Mar 12 05:28:46 localhost kernel: acpiphp: Slot [3] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [4] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [5] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [6] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [7] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [8] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [9] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [10] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [11] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [12] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [13] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [14] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [15] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [16] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [17] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [18] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [19] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [20] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [21] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [22] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [23] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [24] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [25] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [26] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [27] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [28] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [29] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [30] registered Mar 12 05:28:46 localhost kernel: acpiphp: Slot [31] registered Mar 12 05:28:46 localhost kernel: PCI host bridge to bus 0000:00 Mar 12 05:28:46 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Mar 12 05:28:46 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Mar 12 05:28:46 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Mar 12 05:28:46 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Mar 12 05:28:46 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x240000000-0x2bfffffff window] Mar 12 05:28:46 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Mar 12 05:28:46 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Mar 12 05:28:46 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Mar 12 05:28:46 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Mar 12 05:28:46 localhost kernel: pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] Mar 12 05:28:46 localhost kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Mar 12 05:28:46 localhost kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Mar 12 05:28:46 localhost kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Mar 12 05:28:46 localhost kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Mar 12 05:28:46 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Mar 12 05:28:46 localhost kernel: pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] Mar 12 05:28:46 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Mar 12 05:28:46 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Mar 12 05:28:46 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Mar 12 05:28:46 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Mar 12 05:28:46 localhost kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Mar 12 05:28:46 localhost kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Mar 12 05:28:46 localhost kernel: pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] Mar 12 05:28:46 localhost kernel: pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] Mar 12 05:28:46 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Mar 12 05:28:46 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Mar 12 05:28:46 localhost kernel: pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] Mar 12 05:28:46 localhost kernel: pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] Mar 12 05:28:46 localhost kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Mar 12 05:28:46 localhost kernel: pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] Mar 12 05:28:46 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Mar 12 05:28:46 localhost kernel: pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] Mar 12 05:28:46 localhost kernel: pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] Mar 12 05:28:46 localhost kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Mar 12 05:28:46 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Mar 12 05:28:46 localhost kernel: pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] Mar 12 05:28:46 localhost kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Mar 12 05:28:46 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint Mar 12 05:28:46 localhost kernel: pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] Mar 12 05:28:46 localhost kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Mar 12 05:28:46 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Mar 12 05:28:46 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Mar 12 05:28:46 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Mar 12 05:28:46 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Mar 12 05:28:46 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Mar 12 05:28:46 localhost kernel: iommu: Default domain type: Translated Mar 12 05:28:46 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 12 05:28:46 localhost kernel: SCSI subsystem initialized Mar 12 05:28:46 localhost kernel: ACPI: bus type USB registered Mar 12 05:28:46 localhost kernel: usbcore: registered new interface driver usbfs Mar 12 05:28:46 localhost kernel: usbcore: registered new interface driver hub Mar 12 05:28:46 localhost kernel: usbcore: registered new device driver usb Mar 12 05:28:46 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Mar 12 05:28:46 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 12 05:28:46 localhost kernel: PTP clock support registered Mar 12 05:28:46 localhost kernel: EDAC MC: Ver: 3.0.0 Mar 12 05:28:46 localhost kernel: NetLabel: Initializing Mar 12 05:28:46 localhost kernel: NetLabel: domain hash size = 128 Mar 12 05:28:46 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Mar 12 05:28:46 localhost kernel: NetLabel: unlabeled traffic allowed by default Mar 12 05:28:46 localhost kernel: PCI: Using ACPI for IRQ routing Mar 12 05:28:46 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Mar 12 05:28:46 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Mar 12 05:28:46 localhost kernel: e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] Mar 12 05:28:46 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Mar 12 05:28:46 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Mar 12 05:28:46 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Mar 12 05:28:46 localhost kernel: vgaarb: loaded Mar 12 05:28:46 localhost kernel: clocksource: Switched to clocksource kvm-clock Mar 12 05:28:46 localhost kernel: VFS: Disk quotas dquot_6.6.0 Mar 12 05:28:46 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 12 05:28:46 localhost kernel: pnp: PnP ACPI init Mar 12 05:28:46 localhost kernel: pnp 00:03: [dma 2] Mar 12 05:28:46 localhost kernel: pnp: PnP ACPI: found 5 devices Mar 12 05:28:46 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 12 05:28:46 localhost kernel: NET: Registered PF_INET protocol family Mar 12 05:28:46 localhost kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Mar 12 05:28:46 localhost kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Mar 12 05:28:46 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 12 05:28:46 localhost kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Mar 12 05:28:46 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Mar 12 05:28:46 localhost kernel: TCP: Hash tables configured (established 65536 bind 65536) Mar 12 05:28:46 localhost kernel: MPTCP token hash table entries: 8192 (order: 5, 196608 bytes, linear) Mar 12 05:28:46 localhost kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Mar 12 05:28:46 localhost kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Mar 12 05:28:46 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 12 05:28:46 localhost kernel: NET: Registered PF_XDP protocol family Mar 12 05:28:46 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Mar 12 05:28:46 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Mar 12 05:28:46 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Mar 12 05:28:46 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Mar 12 05:28:46 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x240000000-0x2bfffffff window] Mar 12 05:28:46 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Mar 12 05:28:46 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Mar 12 05:28:46 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Mar 12 05:28:46 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x160 took 50427 usecs Mar 12 05:28:46 localhost kernel: PCI: CLS 0 bytes, default 64 Mar 12 05:28:46 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Mar 12 05:28:46 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Mar 12 05:28:46 localhost kernel: ACPI: bus type thunderbolt registered Mar 12 05:28:46 localhost kernel: Trying to unpack rootfs image as initramfs... Mar 12 05:28:46 localhost kernel: Initialise system trusted keyrings Mar 12 05:28:46 localhost kernel: Key type blacklist registered Mar 12 05:28:46 localhost kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 Mar 12 05:28:46 localhost kernel: zbud: loaded Mar 12 05:28:46 localhost kernel: integrity: Platform Keyring initialized Mar 12 05:28:46 localhost kernel: integrity: Machine keyring initialized Mar 12 05:28:46 localhost kernel: Freeing initrd memory: 234100K Mar 12 05:28:46 localhost kernel: NET: Registered PF_ALG protocol family Mar 12 05:28:46 localhost kernel: xor: automatically using best checksumming function avx Mar 12 05:28:46 localhost kernel: Key type asymmetric registered Mar 12 05:28:46 localhost kernel: Asymmetric key parser 'x509' registered Mar 12 05:28:46 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Mar 12 05:28:46 localhost kernel: io scheduler mq-deadline registered Mar 12 05:28:46 localhost kernel: io scheduler kyber registered Mar 12 05:28:46 localhost kernel: io scheduler bfq registered Mar 12 05:28:46 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Mar 12 05:28:46 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Mar 12 05:28:46 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Mar 12 05:28:46 localhost kernel: ACPI: button: Power Button [PWRF] Mar 12 05:28:46 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Mar 12 05:28:46 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Mar 12 05:28:46 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Mar 12 05:28:46 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Mar 12 05:28:46 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Mar 12 05:28:46 localhost kernel: Non-volatile memory driver v1.3 Mar 12 05:28:46 localhost kernel: rdac: device handler registered Mar 12 05:28:46 localhost kernel: hp_sw: device handler registered Mar 12 05:28:46 localhost kernel: emc: device handler registered Mar 12 05:28:46 localhost kernel: alua: device handler registered Mar 12 05:28:46 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Mar 12 05:28:46 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Mar 12 05:28:46 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Mar 12 05:28:46 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Mar 12 05:28:46 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Mar 12 05:28:46 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Mar 12 05:28:46 localhost kernel: usb usb1: Product: UHCI Host Controller Mar 12 05:28:46 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-687.el9.x86_64 uhci_hcd Mar 12 05:28:46 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Mar 12 05:28:46 localhost kernel: hub 1-0:1.0: USB hub found Mar 12 05:28:46 localhost kernel: hub 1-0:1.0: 2 ports detected Mar 12 05:28:46 localhost kernel: usbcore: registered new interface driver usbserial_generic Mar 12 05:28:46 localhost kernel: usbserial: USB Serial support registered for generic Mar 12 05:28:46 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Mar 12 05:28:46 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Mar 12 05:28:46 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Mar 12 05:28:46 localhost kernel: mousedev: PS/2 mouse device common for all mice Mar 12 05:28:46 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Mar 12 05:28:46 localhost kernel: rtc_cmos 00:04: registered as rtc0 Mar 12 05:28:46 localhost kernel: rtc_cmos 00:04: setting system clock to 2026-03-12T09:28:45 UTC (1773307725) Mar 12 05:28:46 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Mar 12 05:28:46 localhost kernel: amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled Mar 12 05:28:46 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Mar 12 05:28:46 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Mar 12 05:28:46 localhost kernel: usbcore: registered new interface driver usbhid Mar 12 05:28:46 localhost kernel: usbhid: USB HID core driver Mar 12 05:28:46 localhost kernel: drop_monitor: Initializing network drop monitor service Mar 12 05:28:46 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Mar 12 05:28:46 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Mar 12 05:28:46 localhost kernel: Initializing XFRM netlink socket Mar 12 05:28:46 localhost kernel: NET: Registered PF_INET6 protocol family Mar 12 05:28:46 localhost kernel: Segment Routing with IPv6 Mar 12 05:28:46 localhost kernel: NET: Registered PF_PACKET protocol family Mar 12 05:28:46 localhost kernel: mpls_gso: MPLS GSO support Mar 12 05:28:46 localhost kernel: IPI shorthand broadcast: enabled Mar 12 05:28:46 localhost kernel: AVX2 version of gcm_enc/dec engaged. Mar 12 05:28:46 localhost kernel: AES CTR mode by8 optimization enabled Mar 12 05:28:46 localhost kernel: sched_clock: Marking stable (1146002363, 139909720)->(1406550902, -120638819) Mar 12 05:28:46 localhost kernel: registered taskstats version 1 Mar 12 05:28:46 localhost kernel: Loading compiled-in X.509 certificates Mar 12 05:28:46 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: fea3310e757009fdf4938aef125dfb5a1f0e3bc0' Mar 12 05:28:46 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Mar 12 05:28:46 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Mar 12 05:28:46 localhost kernel: Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' Mar 12 05:28:46 localhost kernel: Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' Mar 12 05:28:46 localhost kernel: Demotion targets for Node 0: null Mar 12 05:28:46 localhost kernel: page_owner is disabled Mar 12 05:28:46 localhost kernel: Key type .fscrypt registered Mar 12 05:28:46 localhost kernel: Key type fscrypt-provisioning registered Mar 12 05:28:46 localhost kernel: Key type big_key registered Mar 12 05:28:46 localhost kernel: Key type encrypted registered Mar 12 05:28:46 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Mar 12 05:28:46 localhost kernel: Loading compiled-in module X.509 certificates Mar 12 05:28:46 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: fea3310e757009fdf4938aef125dfb5a1f0e3bc0' Mar 12 05:28:46 localhost kernel: ima: Allocated hash algorithm: sha256 Mar 12 05:28:46 localhost kernel: ima: No architecture policies found Mar 12 05:28:46 localhost kernel: evm: Initialising EVM extended attributes: Mar 12 05:28:46 localhost kernel: evm: security.selinux Mar 12 05:28:46 localhost kernel: evm: security.SMACK64 (disabled) Mar 12 05:28:46 localhost kernel: evm: security.SMACK64EXEC (disabled) Mar 12 05:28:46 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Mar 12 05:28:46 localhost kernel: evm: security.SMACK64MMAP (disabled) Mar 12 05:28:46 localhost kernel: evm: security.apparmor (disabled) Mar 12 05:28:46 localhost kernel: evm: security.ima Mar 12 05:28:46 localhost kernel: evm: security.capability Mar 12 05:28:46 localhost kernel: evm: HMAC attrs: 0x1 Mar 12 05:28:46 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Mar 12 05:28:46 localhost kernel: Running certificate verification RSA selftest Mar 12 05:28:46 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Mar 12 05:28:46 localhost kernel: Running certificate verification ECDSA selftest Mar 12 05:28:46 localhost kernel: Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' Mar 12 05:28:46 localhost kernel: clk: Disabling unused clocks Mar 12 05:28:46 localhost kernel: Freeing unused decrypted memory: 2028K Mar 12 05:28:46 localhost kernel: Freeing unused kernel image (initmem) memory: 4204K Mar 12 05:28:46 localhost kernel: Write protecting the kernel read-only data: 30720k Mar 12 05:28:46 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 380K Mar 12 05:28:46 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Mar 12 05:28:46 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Mar 12 05:28:46 localhost kernel: usb 1-1: Product: QEMU USB Tablet Mar 12 05:28:46 localhost kernel: usb 1-1: Manufacturer: QEMU Mar 12 05:28:46 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Mar 12 05:28:46 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Mar 12 05:28:46 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Mar 12 05:28:46 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Mar 12 05:28:46 localhost kernel: Run /init as init process Mar 12 05:28:46 localhost kernel: with arguments: Mar 12 05:28:46 localhost kernel: /init Mar 12 05:28:46 localhost kernel: with environment: Mar 12 05:28:46 localhost kernel: HOME=/ Mar 12 05:28:46 localhost kernel: TERM=linux Mar 12 05:28:46 localhost kernel: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-687.el9.x86_64 Mar 12 05:28:46 localhost systemd[1]: systemd 252-67.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 12 05:28:46 localhost systemd[1]: Detected virtualization kvm. Mar 12 05:28:46 localhost systemd[1]: Detected architecture x86-64. Mar 12 05:28:46 localhost systemd[1]: Running in initrd. Mar 12 05:28:46 localhost systemd[1]: No hostname configured, using default hostname. Mar 12 05:28:46 localhost systemd[1]: Hostname set to . Mar 12 05:28:46 localhost systemd[1]: Initializing machine ID from VM UUID. Mar 12 05:28:46 localhost systemd[1]: Queued start job for default target Initrd Default Target. Mar 12 05:28:46 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Mar 12 05:28:46 localhost systemd[1]: Reached target Local Encrypted Volumes. Mar 12 05:28:46 localhost systemd[1]: Reached target Initrd /usr File System. Mar 12 05:28:46 localhost systemd[1]: Reached target Local File Systems. Mar 12 05:28:46 localhost systemd[1]: Reached target Path Units. Mar 12 05:28:46 localhost systemd[1]: Reached target Slice Units. Mar 12 05:28:46 localhost systemd[1]: Reached target Swaps. Mar 12 05:28:46 localhost systemd[1]: Reached target Timer Units. Mar 12 05:28:46 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Mar 12 05:28:46 localhost systemd[1]: Listening on Journal Socket (/dev/log). Mar 12 05:28:46 localhost systemd[1]: Listening on Journal Socket. Mar 12 05:28:46 localhost systemd[1]: Listening on udev Control Socket. Mar 12 05:28:46 localhost systemd[1]: Listening on udev Kernel Socket. Mar 12 05:28:46 localhost systemd[1]: Reached target Socket Units. Mar 12 05:28:46 localhost systemd[1]: Starting Create List of Static Device Nodes... Mar 12 05:28:46 localhost systemd[1]: Starting Journal Service... Mar 12 05:28:46 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Mar 12 05:28:46 localhost systemd[1]: Starting Apply Kernel Variables... Mar 12 05:28:46 localhost systemd[1]: Starting Create System Users... Mar 12 05:28:46 localhost systemd[1]: Starting Setup Virtual Console... Mar 12 05:28:46 localhost systemd[1]: Finished Create List of Static Device Nodes. Mar 12 05:28:46 localhost systemd[1]: Finished Apply Kernel Variables. Mar 12 05:28:46 localhost systemd-journald[304]: Journal started Mar 12 05:28:46 localhost systemd-journald[304]: Runtime Journal (/run/log/journal/f125efeec0824d05ac67abc8ec5ed40e) is 8.0M, max 153.6M, 145.6M free. Mar 12 05:28:46 localhost systemd[1]: Started Journal Service. Mar 12 05:28:46 localhost systemd-sysusers[308]: Creating group 'users' with GID 100. Mar 12 05:28:46 localhost systemd-sysusers[308]: Creating group 'dbus' with GID 81. Mar 12 05:28:46 localhost systemd-sysusers[308]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Mar 12 05:28:46 localhost systemd[1]: Finished Create System Users. Mar 12 05:28:46 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Mar 12 05:28:46 localhost systemd[1]: Starting Create Volatile Files and Directories... Mar 12 05:28:46 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Mar 12 05:28:46 localhost systemd[1]: Finished Create Volatile Files and Directories. Mar 12 05:28:46 localhost systemd[1]: Finished Setup Virtual Console. Mar 12 05:28:46 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Mar 12 05:28:46 localhost systemd[1]: Starting dracut cmdline hook... Mar 12 05:28:46 localhost dracut-cmdline[324]: dracut-9 dracut-057-110.git20260130.el9 Mar 12 05:28:46 localhost dracut-cmdline[324]: Using kernel command line parameters: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-687.el9.x86_64 root=UUID=d95c3fed-ff86-4b48-8422-63578d153f1e ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Mar 12 05:28:46 localhost systemd[1]: Finished dracut cmdline hook. Mar 12 05:28:46 localhost systemd[1]: Starting dracut pre-udev hook... Mar 12 05:28:46 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 12 05:28:46 localhost kernel: device-mapper: uevent: version 1.0.3 Mar 12 05:28:46 localhost kernel: device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev Mar 12 05:28:46 localhost kernel: RPC: Registered named UNIX socket transport module. Mar 12 05:28:46 localhost kernel: RPC: Registered udp transport module. Mar 12 05:28:46 localhost kernel: RPC: Registered tcp transport module. Mar 12 05:28:46 localhost kernel: RPC: Registered tcp-with-tls transport module. Mar 12 05:28:46 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Mar 12 05:28:46 localhost rpc.statd[441]: Version 2.5.4 starting Mar 12 05:28:46 localhost rpc.statd[441]: Initializing NSM state Mar 12 05:28:46 localhost rpc.idmapd[446]: Setting log level to 0 Mar 12 05:28:46 localhost systemd[1]: Finished dracut pre-udev hook. Mar 12 05:28:47 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Mar 12 05:28:47 localhost systemd-udevd[459]: Using default interface naming scheme 'rhel-9.0'. Mar 12 05:28:47 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Mar 12 05:28:47 localhost systemd[1]: Starting dracut pre-trigger hook... Mar 12 05:28:47 localhost systemd[1]: Finished dracut pre-trigger hook. Mar 12 05:28:47 localhost systemd[1]: Starting Coldplug All udev Devices... Mar 12 05:28:47 localhost systemd[1]: Created slice Slice /system/modprobe. Mar 12 05:28:47 localhost systemd[1]: Starting Load Kernel Module configfs... Mar 12 05:28:47 localhost systemd[1]: Finished Coldplug All udev Devices. Mar 12 05:28:47 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 12 05:28:47 localhost systemd[1]: Finished Load Kernel Module configfs. Mar 12 05:28:47 localhost systemd[1]: Mounting Kernel Configuration File System... Mar 12 05:28:47 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Mar 12 05:28:47 localhost systemd[1]: Reached target Network. Mar 12 05:28:47 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Mar 12 05:28:47 localhost kernel: virtio_blk virtio2: 8/0/0 default/read/poll queues Mar 12 05:28:47 localhost systemd[1]: Starting dracut initqueue hook... Mar 12 05:28:47 localhost systemd[1]: Mounted Kernel Configuration File System. Mar 12 05:28:47 localhost kernel: virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) Mar 12 05:28:47 localhost kernel: vda: vda1 Mar 12 05:28:47 localhost systemd[1]: Reached target System Initialization. Mar 12 05:28:47 localhost systemd[1]: Reached target Basic System. Mar 12 05:28:47 localhost kernel: libata version 3.00 loaded. Mar 12 05:28:47 localhost kernel: ata_piix 0000:00:01.1: version 2.13 Mar 12 05:28:47 localhost kernel: scsi host0: ata_piix Mar 12 05:28:47 localhost kernel: scsi host1: ata_piix Mar 12 05:28:47 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 Mar 12 05:28:47 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 Mar 12 05:28:47 localhost systemd-udevd[471]: Network interface NamePolicy= disabled on kernel command line. Mar 12 05:28:47 localhost systemd[1]: Found device /dev/disk/by-uuid/d95c3fed-ff86-4b48-8422-63578d153f1e. Mar 12 05:28:47 localhost kernel: ACPI: bus type drm_connector registered Mar 12 05:28:47 localhost systemd[1]: Reached target Initrd Root Device. Mar 12 05:28:47 localhost kernel: ata1: found unknown device (class 0) Mar 12 05:28:47 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Mar 12 05:28:47 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Mar 12 05:28:47 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Mar 12 05:28:47 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Mar 12 05:28:47 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Mar 12 05:28:47 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Mar 12 05:28:47 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Mar 12 05:28:47 localhost kernel: Console: switching to colour dummy device 80x25 Mar 12 05:28:47 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Mar 12 05:28:47 localhost kernel: [drm] features: -context_init Mar 12 05:28:47 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 Mar 12 05:28:47 localhost kernel: [drm] number of scanouts: 1 Mar 12 05:28:47 localhost kernel: [drm] number of cap sets: 0 Mar 12 05:28:47 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Mar 12 05:28:47 localhost kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Mar 12 05:28:47 localhost kernel: Console: switching to colour frame buffer device 128x48 Mar 12 05:28:47 localhost kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Mar 12 05:28:47 localhost systemd[1]: Finished dracut initqueue hook. Mar 12 05:28:47 localhost systemd[1]: Reached target Preparation for Remote File Systems. Mar 12 05:28:47 localhost systemd[1]: Reached target Remote Encrypted Volumes. Mar 12 05:28:47 localhost systemd[1]: Reached target Remote File Systems. Mar 12 05:28:47 localhost systemd[1]: Starting dracut pre-mount hook... Mar 12 05:28:47 localhost systemd[1]: Finished dracut pre-mount hook. Mar 12 05:28:47 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/d95c3fed-ff86-4b48-8422-63578d153f1e... Mar 12 05:28:47 localhost systemd-fsck[562]: /usr/sbin/fsck.xfs: XFS file system. Mar 12 05:28:47 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/d95c3fed-ff86-4b48-8422-63578d153f1e. Mar 12 05:28:47 localhost systemd[1]: Mounting /sysroot... Mar 12 05:28:48 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Mar 12 05:28:48 localhost kernel: XFS (vda1): Mounting V5 Filesystem d95c3fed-ff86-4b48-8422-63578d153f1e Mar 12 05:28:48 localhost kernel: XFS (vda1): Ending clean mount Mar 12 05:28:48 localhost systemd[1]: Mounted /sysroot. Mar 12 05:28:48 localhost systemd[1]: Reached target Initrd Root File System. Mar 12 05:28:48 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Mar 12 05:28:48 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Mar 12 05:28:48 localhost systemd[1]: Reached target Initrd File Systems. Mar 12 05:28:48 localhost systemd[1]: Reached target Initrd Default Target. Mar 12 05:28:48 localhost systemd[1]: Starting dracut mount hook... Mar 12 05:28:48 localhost systemd[1]: Finished dracut mount hook. Mar 12 05:28:48 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Mar 12 05:28:48 localhost rpc.idmapd[446]: exiting on signal 15 Mar 12 05:28:48 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Mar 12 05:28:48 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Mar 12 05:28:48 localhost systemd[1]: Stopped target Network. Mar 12 05:28:48 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Mar 12 05:28:48 localhost systemd[1]: Stopped target Timer Units. Mar 12 05:28:48 localhost systemd[1]: dbus.socket: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Mar 12 05:28:48 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Mar 12 05:28:48 localhost systemd[1]: Stopped target Initrd Default Target. Mar 12 05:28:48 localhost systemd[1]: Stopped target Basic System. Mar 12 05:28:48 localhost systemd[1]: Stopped target Initrd Root Device. Mar 12 05:28:48 localhost systemd[1]: Stopped target Initrd /usr File System. Mar 12 05:28:48 localhost systemd[1]: Stopped target Path Units. Mar 12 05:28:48 localhost systemd[1]: Stopped target Remote File Systems. Mar 12 05:28:48 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Mar 12 05:28:48 localhost systemd[1]: Stopped target Slice Units. Mar 12 05:28:48 localhost systemd[1]: Stopped target Socket Units. Mar 12 05:28:48 localhost systemd[1]: Stopped target System Initialization. Mar 12 05:28:48 localhost systemd[1]: Stopped target Local File Systems. Mar 12 05:28:48 localhost systemd[1]: Stopped target Swaps. Mar 12 05:28:48 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped dracut mount hook. Mar 12 05:28:48 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped dracut pre-mount hook. Mar 12 05:28:48 localhost systemd[1]: Stopped target Local Encrypted Volumes. Mar 12 05:28:48 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Mar 12 05:28:48 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped dracut initqueue hook. Mar 12 05:28:48 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped Apply Kernel Variables. Mar 12 05:28:48 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped Create Volatile Files and Directories. Mar 12 05:28:48 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped Coldplug All udev Devices. Mar 12 05:28:48 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped dracut pre-trigger hook. Mar 12 05:28:48 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Mar 12 05:28:48 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped Setup Virtual Console. Mar 12 05:28:48 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Mar 12 05:28:48 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Mar 12 05:28:48 localhost systemd[1]: systemd-udevd.service: Consumed 1.229s CPU time. Mar 12 05:28:48 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Closed udev Control Socket. Mar 12 05:28:48 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Closed udev Kernel Socket. Mar 12 05:28:48 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped dracut pre-udev hook. Mar 12 05:28:48 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped dracut cmdline hook. Mar 12 05:28:48 localhost systemd[1]: Starting Cleanup udev Database... Mar 12 05:28:48 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Mar 12 05:28:48 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped Create List of Static Device Nodes. Mar 12 05:28:48 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Stopped Create System Users. Mar 12 05:28:48 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Mar 12 05:28:48 localhost systemd[1]: Finished Cleanup udev Database. Mar 12 05:28:48 localhost systemd[1]: Reached target Switch Root. Mar 12 05:28:48 localhost systemd[1]: Starting Switch Root... Mar 12 05:28:48 localhost systemd[1]: Switching root. Mar 12 05:28:48 localhost systemd-journald[304]: Journal stopped Mar 12 05:28:49 localhost systemd-journald[304]: Received SIGTERM from PID 1 (systemd). Mar 12 05:28:49 localhost kernel: audit: type=1404 audit(1773307728.769:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Mar 12 05:28:49 localhost kernel: SELinux: policy capability network_peer_controls=1 Mar 12 05:28:49 localhost kernel: SELinux: policy capability open_perms=1 Mar 12 05:28:49 localhost kernel: SELinux: policy capability extended_socket_class=1 Mar 12 05:28:49 localhost kernel: SELinux: policy capability always_check_network=0 Mar 12 05:28:49 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Mar 12 05:28:49 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 12 05:28:49 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 12 05:28:49 localhost kernel: audit: type=1403 audit(1773307728.898:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Mar 12 05:28:49 localhost systemd[1]: Successfully loaded SELinux policy in 136.195ms. Mar 12 05:28:49 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 46.350ms. Mar 12 05:28:49 localhost systemd[1]: systemd 252-67.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 12 05:28:49 localhost systemd[1]: Detected virtualization kvm. Mar 12 05:28:49 localhost systemd[1]: Detected architecture x86-64. Mar 12 05:28:49 localhost systemd-rc-local-generator[646]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:28:49 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Mar 12 05:28:49 localhost systemd[1]: Stopped Switch Root. Mar 12 05:28:49 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Mar 12 05:28:49 localhost systemd[1]: Created slice Slice /system/getty. Mar 12 05:28:49 localhost systemd[1]: Created slice Slice /system/serial-getty. Mar 12 05:28:49 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Mar 12 05:28:49 localhost systemd[1]: Created slice User and Session Slice. Mar 12 05:28:49 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Mar 12 05:28:49 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Mar 12 05:28:49 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Mar 12 05:28:49 localhost systemd[1]: Reached target Local Encrypted Volumes. Mar 12 05:28:49 localhost systemd[1]: Stopped target Switch Root. Mar 12 05:28:49 localhost systemd[1]: Stopped target Initrd File Systems. Mar 12 05:28:49 localhost systemd[1]: Stopped target Initrd Root File System. Mar 12 05:28:49 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Mar 12 05:28:49 localhost systemd[1]: Reached target Path Units. Mar 12 05:28:49 localhost systemd[1]: Reached target rpc_pipefs.target. Mar 12 05:28:49 localhost systemd[1]: Reached target Slice Units. Mar 12 05:28:49 localhost systemd[1]: Reached target Swaps. Mar 12 05:28:49 localhost systemd[1]: Reached target Local Verity Protected Volumes. Mar 12 05:28:49 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Mar 12 05:28:49 localhost systemd[1]: Reached target RPC Port Mapper. Mar 12 05:28:49 localhost systemd[1]: Listening on Process Core Dump Socket. Mar 12 05:28:49 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Mar 12 05:28:49 localhost systemd[1]: Listening on udev Control Socket. Mar 12 05:28:49 localhost systemd[1]: Listening on udev Kernel Socket. Mar 12 05:28:49 localhost systemd[1]: Mounting Huge Pages File System... Mar 12 05:28:49 localhost systemd[1]: Mounting POSIX Message Queue File System... Mar 12 05:28:49 localhost systemd[1]: Mounting Kernel Debug File System... Mar 12 05:28:49 localhost systemd[1]: Mounting Kernel Trace File System... Mar 12 05:28:49 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 12 05:28:49 localhost systemd[1]: Starting Create List of Static Device Nodes... Mar 12 05:28:49 localhost systemd[1]: Starting Load Kernel Module configfs... Mar 12 05:28:49 localhost systemd[1]: Starting Load Kernel Module drm... Mar 12 05:28:49 localhost systemd[1]: Starting Load Kernel Module efi_pstore... Mar 12 05:28:49 localhost systemd[1]: Starting Load Kernel Module fuse... Mar 12 05:28:49 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Mar 12 05:28:49 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Mar 12 05:28:49 localhost systemd[1]: Stopped File System Check on Root Device. Mar 12 05:28:49 localhost systemd[1]: Stopped Journal Service. Mar 12 05:28:49 localhost kernel: fuse: init (API version 7.37) Mar 12 05:28:49 localhost systemd[1]: Starting Journal Service... Mar 12 05:28:49 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Mar 12 05:28:49 localhost systemd[1]: Starting Generate network units from Kernel command line... Mar 12 05:28:49 localhost systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 12 05:28:49 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Mar 12 05:28:49 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Mar 12 05:28:49 localhost systemd[1]: Starting Apply Kernel Variables... Mar 12 05:28:49 localhost systemd-journald[695]: Journal started Mar 12 05:28:49 localhost systemd-journald[695]: Runtime Journal (/run/log/journal/7a4367143bdc482a84daccb4bc12a7ce) is 8.0M, max 153.6M, 145.6M free. Mar 12 05:28:49 localhost systemd[1]: Queued start job for default target Multi-User System. Mar 12 05:28:49 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Mar 12 05:28:49 localhost systemd[1]: Starting Coldplug All udev Devices... Mar 12 05:28:49 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Mar 12 05:28:49 localhost systemd[1]: Started Journal Service. Mar 12 05:28:49 localhost systemd[1]: Mounted Huge Pages File System. Mar 12 05:28:49 localhost systemd[1]: Mounted POSIX Message Queue File System. Mar 12 05:28:49 localhost systemd[1]: Mounted Kernel Debug File System. Mar 12 05:28:49 localhost systemd[1]: Mounted Kernel Trace File System. Mar 12 05:28:49 localhost systemd[1]: Finished Create List of Static Device Nodes. Mar 12 05:28:49 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 12 05:28:49 localhost systemd[1]: Finished Load Kernel Module configfs. Mar 12 05:28:49 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 12 05:28:49 localhost systemd[1]: Finished Load Kernel Module drm. Mar 12 05:28:49 localhost systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 12 05:28:49 localhost systemd[1]: Finished Load Kernel Module efi_pstore. Mar 12 05:28:49 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 12 05:28:49 localhost systemd[1]: Finished Load Kernel Module fuse. Mar 12 05:28:49 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Mar 12 05:28:49 localhost systemd[1]: Finished Generate network units from Kernel command line. Mar 12 05:28:49 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Mar 12 05:28:49 localhost systemd[1]: Finished Apply Kernel Variables. Mar 12 05:28:49 localhost systemd[1]: Mounting FUSE Control File System... Mar 12 05:28:49 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 12 05:28:49 localhost systemd[1]: Starting Rebuild Hardware Database... Mar 12 05:28:49 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Mar 12 05:28:49 localhost systemd[1]: Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 12 05:28:49 localhost systemd[1]: Starting Load/Save OS Random Seed... Mar 12 05:28:49 localhost systemd[1]: Starting Create System Users... Mar 12 05:28:49 localhost systemd[1]: Mounted FUSE Control File System. Mar 12 05:28:49 localhost systemd-journald[695]: Runtime Journal (/run/log/journal/7a4367143bdc482a84daccb4bc12a7ce) is 8.0M, max 153.6M, 145.6M free. Mar 12 05:28:49 localhost systemd-journald[695]: Received client request to flush runtime journal. Mar 12 05:28:49 localhost systemd[1]: Finished Coldplug All udev Devices. Mar 12 05:28:49 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Mar 12 05:28:49 localhost systemd[1]: Finished Load/Save OS Random Seed. Mar 12 05:28:49 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 12 05:28:49 localhost systemd[1]: Finished Create System Users. Mar 12 05:28:49 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Mar 12 05:28:49 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Mar 12 05:28:49 localhost systemd[1]: Reached target Preparation for Local File Systems. Mar 12 05:28:49 localhost systemd[1]: Reached target Local File Systems. Mar 12 05:28:49 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Mar 12 05:28:49 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Mar 12 05:28:49 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Mar 12 05:28:49 localhost systemd[1]: Update Boot Loader Random Seed was skipped because no trigger condition checks were met. Mar 12 05:28:49 localhost systemd[1]: Starting Automatic Boot Loader Update... Mar 12 05:28:49 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Mar 12 05:28:49 localhost systemd[1]: Starting Create Volatile Files and Directories... Mar 12 05:28:49 localhost bootctl[712]: Couldn't find EFI system partition, skipping. Mar 12 05:28:49 localhost systemd[1]: Finished Automatic Boot Loader Update. Mar 12 05:28:50 localhost systemd[1]: Finished Create Volatile Files and Directories. Mar 12 05:28:50 localhost systemd[1]: Starting Security Auditing Service... Mar 12 05:28:50 localhost systemd[1]: Starting RPC Bind... Mar 12 05:28:50 localhost systemd[1]: Starting Rebuild Journal Catalog... Mar 12 05:28:50 localhost auditd[718]: audit dispatcher initialized with q_depth=2000 and 1 active plugins Mar 12 05:28:50 localhost auditd[718]: Init complete, auditd 3.1.5 listening for events (startup state enable) Mar 12 05:28:50 localhost systemd[1]: Finished Rebuild Journal Catalog. Mar 12 05:28:50 localhost systemd[1]: Started RPC Bind. Mar 12 05:28:50 localhost augenrules[723]: /sbin/augenrules: No change Mar 12 05:28:50 localhost augenrules[738]: No rules Mar 12 05:28:50 localhost augenrules[738]: enabled 1 Mar 12 05:28:50 localhost augenrules[738]: failure 1 Mar 12 05:28:50 localhost augenrules[738]: pid 718 Mar 12 05:28:50 localhost augenrules[738]: rate_limit 0 Mar 12 05:28:50 localhost augenrules[738]: backlog_limit 8192 Mar 12 05:28:50 localhost augenrules[738]: lost 0 Mar 12 05:28:50 localhost augenrules[738]: backlog 3 Mar 12 05:28:50 localhost augenrules[738]: backlog_wait_time 60000 Mar 12 05:28:50 localhost augenrules[738]: backlog_wait_time_actual 0 Mar 12 05:28:50 localhost augenrules[738]: enabled 1 Mar 12 05:28:50 localhost augenrules[738]: failure 1 Mar 12 05:28:50 localhost augenrules[738]: pid 718 Mar 12 05:28:50 localhost augenrules[738]: rate_limit 0 Mar 12 05:28:50 localhost augenrules[738]: backlog_limit 8192 Mar 12 05:28:50 localhost augenrules[738]: lost 0 Mar 12 05:28:50 localhost augenrules[738]: backlog 4 Mar 12 05:28:50 localhost augenrules[738]: backlog_wait_time 60000 Mar 12 05:28:50 localhost augenrules[738]: backlog_wait_time_actual 0 Mar 12 05:28:50 localhost augenrules[738]: enabled 1 Mar 12 05:28:50 localhost augenrules[738]: failure 1 Mar 12 05:28:50 localhost augenrules[738]: pid 718 Mar 12 05:28:50 localhost augenrules[738]: rate_limit 0 Mar 12 05:28:50 localhost augenrules[738]: backlog_limit 8192 Mar 12 05:28:50 localhost augenrules[738]: lost 0 Mar 12 05:28:50 localhost augenrules[738]: backlog 3 Mar 12 05:28:50 localhost augenrules[738]: backlog_wait_time 60000 Mar 12 05:28:50 localhost augenrules[738]: backlog_wait_time_actual 0 Mar 12 05:28:50 localhost systemd[1]: Started Security Auditing Service. Mar 12 05:28:50 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Mar 12 05:28:50 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Mar 12 05:28:50 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Mar 12 05:28:50 localhost systemd[1]: Finished Rebuild Hardware Database. Mar 12 05:28:50 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Mar 12 05:28:50 localhost systemd[1]: Starting Update is Completed... Mar 12 05:28:50 localhost systemd[1]: Finished Update is Completed. Mar 12 05:28:50 localhost systemd-udevd[746]: Using default interface naming scheme 'rhel-9.0'. Mar 12 05:28:50 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Mar 12 05:28:50 localhost systemd[1]: Reached target System Initialization. Mar 12 05:28:50 localhost systemd[1]: Started dnf makecache --timer. Mar 12 05:28:50 localhost systemd[1]: Started Daily rotation of log files. Mar 12 05:28:50 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Mar 12 05:28:50 localhost systemd[1]: Reached target Timer Units. Mar 12 05:28:50 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Mar 12 05:28:50 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Mar 12 05:28:50 localhost systemd[1]: Reached target Socket Units. Mar 12 05:28:50 localhost systemd[1]: Starting D-Bus System Message Bus... Mar 12 05:28:50 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 12 05:28:50 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Mar 12 05:28:50 localhost systemd[1]: Starting Load Kernel Module configfs... Mar 12 05:28:50 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 12 05:28:50 localhost systemd[1]: Finished Load Kernel Module configfs. Mar 12 05:28:50 localhost systemd-udevd[759]: Network interface NamePolicy= disabled on kernel command line. Mar 12 05:28:50 localhost systemd[1]: Started D-Bus System Message Bus. Mar 12 05:28:50 localhost systemd[1]: Reached target Basic System. Mar 12 05:28:50 localhost dbus-broker-lau[785]: Ready Mar 12 05:28:50 localhost systemd[1]: Starting NTP client/server... Mar 12 05:28:50 localhost systemd[1]: Starting Cloud-init: Local Stage (pre-network)... Mar 12 05:28:50 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Mar 12 05:28:50 localhost kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Mar 12 05:28:50 localhost kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Mar 12 05:28:50 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Mar 12 05:28:50 localhost chronyd[802]: chronyd version 4.8 starting (+CMDMON +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +NTS +SECHASH +IPV6 +DEBUG) Mar 12 05:28:50 localhost chronyd[802]: Loaded 0 symmetric keys Mar 12 05:28:50 localhost chronyd[802]: Using right/UTC timezone to obtain leap second data Mar 12 05:28:50 localhost chronyd[802]: Loaded seccomp filter (level 2) Mar 12 05:28:50 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Mar 12 05:28:50 localhost systemd[1]: Starting IPv4 firewall with iptables... Mar 12 05:28:50 localhost systemd[1]: Started irqbalance daemon. Mar 12 05:28:50 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Mar 12 05:28:50 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Mar 12 05:28:50 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Mar 12 05:28:50 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Mar 12 05:28:50 localhost systemd[1]: Reached target sshd-keygen.target. Mar 12 05:28:50 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Mar 12 05:28:50 localhost systemd[1]: Reached target User and Group Name Lookups. Mar 12 05:28:50 localhost systemd[1]: Starting User Login Management... Mar 12 05:28:50 localhost systemd[1]: Started NTP client/server. Mar 12 05:28:50 localhost kernel: kvm_amd: TSC scaling supported Mar 12 05:28:50 localhost kernel: kvm_amd: Nested Virtualization enabled Mar 12 05:28:50 localhost kernel: kvm_amd: Nested Paging enabled Mar 12 05:28:50 localhost kernel: kvm_amd: LBR virtualization supported Mar 12 05:28:50 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Mar 12 05:28:50 localhost systemd-logind[814]: New seat seat0. Mar 12 05:28:50 localhost systemd-logind[814]: Watching system buttons on /dev/input/event0 (Power Button) Mar 12 05:28:50 localhost systemd-logind[814]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Mar 12 05:28:50 localhost systemd[1]: Started User Login Management. Mar 12 05:28:50 localhost kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Mar 12 05:28:50 localhost kernel: Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled Mar 12 05:28:50 localhost iptables.init[807]: iptables: Applying firewall rules: [ OK ] Mar 12 05:28:50 localhost systemd[1]: Finished IPv4 firewall with iptables. Mar 12 05:28:51 localhost cloud-init[851]: Cloud-init v. 24.4-8.el9 running 'init-local' at Thu, 12 Mar 2026 09:28:51 +0000. Up 6.85 seconds. Mar 12 05:28:51 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3 Mar 12 05:28:51 localhost kernel: ISO 9660 Extensions: RRIP_1991A Mar 12 05:28:51 localhost systemd[1]: run-cloud\x2dinit-tmp-tmpa1m7h5up.mount: Deactivated successfully. Mar 12 05:28:51 localhost systemd[1]: Starting Hostname Service... Mar 12 05:28:51 localhost systemd[1]: Started Hostname Service. Mar 12 05:28:51 np0005645166.novalocal systemd-hostnamed[865]: Hostname set to (static) Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Finished Cloud-init: Local Stage (pre-network). Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Reached target Preparation for Network. Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Starting Network Manager... Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8208] NetworkManager (version 1.54.3-2.el9) is starting... (boot:b0557583-8077-4fac-b1cb-250e378b7245) Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8215] Read config: /etc/NetworkManager/NetworkManager.conf, /run/NetworkManager/conf.d/15-carrier-timeout.conf Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8417] manager[0x5621d8979000]: monitoring kernel firmware directory '/lib/firmware'. Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8483] hostname: hostname: using hostnamed Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8483] hostname: static hostname changed from (none) to "np0005645166.novalocal" Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8490] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8630] manager[0x5621d8979000]: rfkill: Wi-Fi hardware radio set enabled Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8631] manager[0x5621d8979000]: rfkill: WWAN hardware radio set enabled Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8745] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-device-plugin-team.so) Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8747] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8749] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8750] manager: Networking is enabled by state file Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8754] settings: Loaded settings plugin: keyfile (internal) Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8788] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-settings-plugin-ifcfg-rh.so") Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8822] Warning: the ifcfg-rh plugin is deprecated, please migrate connections to the keyfile format using "nmcli connection migrate" Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8844] dhcp: init: Using DHCP client 'internal' Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8850] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8872] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8889] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', managed-type: 'external') Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8907] device (lo): Activation: starting connection 'lo' (60824abd-3a2e-4b5a-bdaa-e2c5804d65c0) Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8925] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8931] device (eth0): state change: unmanaged -> unavailable (reason 'managed', managed-type: 'external') Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.8993] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Starting Network Manager Script Dispatcher Service... Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9029] device (lo): state change: disconnected -> prepare (reason 'none', managed-type: 'external') Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9032] device (lo): state change: prepare -> config (reason 'none', managed-type: 'external') Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Started Network Manager. Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9036] device (lo): state change: config -> ip-config (reason 'none', managed-type: 'external') Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9062] device (eth0): carrier: link connected Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9069] device (lo): state change: ip-config -> ip-check (reason 'none', managed-type: 'external') Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Reached target Network. Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9099] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', managed-type: 'full') Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9110] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9116] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9118] device (eth0): state change: disconnected -> prepare (reason 'none', managed-type: 'full') Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9121] manager: NetworkManager state is now CONNECTING Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9123] device (eth0): state change: prepare -> config (reason 'none', managed-type: 'full') Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9133] device (eth0): state change: config -> ip-config (reason 'none', managed-type: 'full') Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Starting Network Manager Wait Online... Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9161] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Started Network Manager Script Dispatcher Service. Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9278] dhcp4 (eth0): state changed new lease, address=38.102.83.224 Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9293] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9321] device (lo): state change: ip-check -> secondaries (reason 'none', managed-type: 'external') Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9331] device (eth0): state change: ip-config -> ip-check (reason 'none', managed-type: 'full') Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9344] device (lo): state change: secondaries -> activated (reason 'none', managed-type: 'external') Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9355] device (lo): Activation: successful, device activated. Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9388] device (eth0): state change: ip-check -> secondaries (reason 'none', managed-type: 'full') Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9391] device (eth0): state change: secondaries -> activated (reason 'none', managed-type: 'full') Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9397] manager: NetworkManager state is now CONNECTED_SITE Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9400] device (eth0): Activation: successful, device activated. Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9409] manager: NetworkManager state is now CONNECTED_GLOBAL Mar 12 05:28:51 np0005645166.novalocal NetworkManager[869]: [1773307731.9415] manager: startup complete Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Mar 12 05:28:51 np0005645166.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Reached target NFS client services. Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Reached target Preparation for Remote File Systems. Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Reached target Remote File Systems. Mar 12 05:28:51 np0005645166.novalocal systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Finished Network Manager Wait Online. Mar 12 05:28:51 np0005645166.novalocal systemd[1]: Starting Cloud-init: Network Stage... Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: Cloud-init v. 24.4-8.el9 running 'init' at Thu, 12 Mar 2026 09:28:52 +0000. Up 7.85 seconds. Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: | eth0 | True | 38.102.83.224 | 255.255.255.0 | global | fa:16:3e:a3:e2:86 | Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: | eth0 | True | fe80::f816:3eff:fea3:e286/64 | . | link | fa:16:3e:a3:e2:86 | Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: | lo | True | ::1/128 | . | host | . | Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: +-------+-------------+---------+-----------+-------+ Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: | Route | Destination | Gateway | Interface | Flags | Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: +-------+-------------+---------+-----------+-------+ Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: | 3 | multicast | :: | eth0 | U | Mar 12 05:28:52 np0005645166.novalocal cloud-init[930]: ci-info: +-------+-------------+---------+-----------+-------+ Mar 12 05:28:53 np0005645166.novalocal useradd[996]: new group: name=cloud-user, GID=1001 Mar 12 05:28:53 np0005645166.novalocal useradd[996]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Mar 12 05:28:53 np0005645166.novalocal useradd[996]: add 'cloud-user' to group 'adm' Mar 12 05:28:53 np0005645166.novalocal useradd[996]: add 'cloud-user' to group 'systemd-journal' Mar 12 05:28:53 np0005645166.novalocal useradd[996]: add 'cloud-user' to shadow group 'adm' Mar 12 05:28:53 np0005645166.novalocal useradd[996]: add 'cloud-user' to shadow group 'systemd-journal' Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: Generating public/private rsa key pair. Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: The key fingerprint is: Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: SHA256:knGfCRyhqTmzvG64Fg0O/mDdMvt+4j0aFsiwm9lZb0M root@np0005645166.novalocal Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: The key's randomart image is: Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: +---[RSA 3072]----+ Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: | o. | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: | + . | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: | . + + | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: |. = .o + o o | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: |.+.=*ooES + | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: | +B=+=+. | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: |.+o=*o + | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: | oooo+o. | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: | ..+*=+.. | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: +----[SHA256]-----+ Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: Generating public/private ecdsa key pair. Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: The key fingerprint is: Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: SHA256:DaKvIS8zbwPQudqySoKBwaShxNQxF5AywqvBlMynyzI root@np0005645166.novalocal Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: The key's randomart image is: Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: +---[ECDSA 256]---+ Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: |B+o++o. | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: |B@ +o | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: |Bo*. . . | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: |+=o . . o | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: |=o... S . | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: |E+o . | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: |+=... . | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: |= =ooo | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: |+o *+. | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: +----[SHA256]-----+ Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: Generating public/private ed25519 key pair. Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: The key fingerprint is: Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: SHA256:4Qa2stil48wgM/IqaHNbs1kJGUOc9ddjsgeZtZO/+Xk root@np0005645166.novalocal Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: The key's randomart image is: Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: +--[ED25519 256]--+ Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: | ..o. . | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: | .o . = o | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: | oo .. * B | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: | .++ .. = + | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: | .oo S . . . | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: | o =... . o| Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: |* o =o o o | Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: |+B *..= E| Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: |+.+.=o .o| Mar 12 05:28:53 np0005645166.novalocal cloud-init[930]: +----[SHA256]-----+ Mar 12 05:28:53 np0005645166.novalocal sm-notify[1012]: Version 2.5.4 starting Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Finished Cloud-init: Network Stage. Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Reached target Cloud-config availability. Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Reached target Network is Online. Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Starting Cloud-init: Config Stage... Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Starting Crash recovery kernel arming... Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Starting Notify NFS peers of a restart... Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Starting System Logging Service... Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Starting OpenSSH server daemon... Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Starting Permit User Sessions... Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Started Notify NFS peers of a restart. Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Finished Permit User Sessions. Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Started Command Scheduler. Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Started Getty on tty1. Mar 12 05:28:53 np0005645166.novalocal sshd[1014]: Server listening on 0.0.0.0 port 22. Mar 12 05:28:53 np0005645166.novalocal sshd[1014]: Server listening on :: port 22. Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Started Serial Getty on ttyS0. Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Reached target Login Prompts. Mar 12 05:28:53 np0005645166.novalocal crond[1017]: (CRON) STARTUP (1.5.7) Mar 12 05:28:53 np0005645166.novalocal crond[1017]: (CRON) INFO (Syslog will be used instead of sendmail.) Mar 12 05:28:53 np0005645166.novalocal crond[1017]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 80% if used.) Mar 12 05:28:53 np0005645166.novalocal crond[1017]: (CRON) INFO (running with inotify support) Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Started OpenSSH server daemon. Mar 12 05:28:53 np0005645166.novalocal rsyslogd[1013]: [origin software="rsyslogd" swVersion="8.2510.0-2.el9" x-pid="1013" x-info="https://www.rsyslog.com"] start Mar 12 05:28:53 np0005645166.novalocal rsyslogd[1013]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2510.0-2.el9 try https://www.rsyslog.com/e/2040 ] Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Started System Logging Service. Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Reached target Multi-User System. Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Starting Record Runlevel Change in UTMP... Mar 12 05:28:53 np0005645166.novalocal systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Finished Record Runlevel Change in UTMP. Mar 12 05:28:53 np0005645166.novalocal sshd-session[1037]: Unable to negotiate with 38.102.83.114 port 55774: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Mar 12 05:28:53 np0005645166.novalocal rsyslogd[1013]: imjournal: journal files changed, reloading... [v8.2510.0-2.el9 try https://www.rsyslog.com/e/0 ] Mar 12 05:28:53 np0005645166.novalocal sshd-session[1065]: Unable to negotiate with 38.102.83.114 port 55798: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Mar 12 05:28:53 np0005645166.novalocal sshd-session[1072]: Unable to negotiate with 38.102.83.114 port 55808: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Mar 12 05:28:53 np0005645166.novalocal sshd-session[1020]: Connection closed by 38.102.83.114 port 55764 [preauth] Mar 12 05:28:53 np0005645166.novalocal sshd-session[1052]: Connection closed by 38.102.83.114 port 55790 [preauth] Mar 12 05:28:53 np0005645166.novalocal sshd-session[1121]: Unable to negotiate with 38.102.83.114 port 55842: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth] Mar 12 05:28:53 np0005645166.novalocal sshd-session[1132]: Unable to negotiate with 38.102.83.114 port 55848: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Mar 12 05:28:53 np0005645166.novalocal sshd-session[1086]: Connection closed by 38.102.83.114 port 55816 [preauth] Mar 12 05:28:53 np0005645166.novalocal sshd-session[1107]: Connection closed by 38.102.83.114 port 55830 [preauth] Mar 12 05:28:53 np0005645166.novalocal kdumpctl[1023]: kdump: No kdump initial ramdisk found. Mar 12 05:28:53 np0005645166.novalocal kdumpctl[1023]: kdump: Rebuilding /boot/initramfs-5.14.0-687.el9.x86_64kdump.img Mar 12 05:28:53 np0005645166.novalocal cloud-init[1177]: Cloud-init v. 24.4-8.el9 running 'modules:config' at Thu, 12 Mar 2026 09:28:53 +0000. Up 9.49 seconds. Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Finished Cloud-init: Config Stage. Mar 12 05:28:53 np0005645166.novalocal systemd[1]: Starting Cloud-init: Final Stage... Mar 12 05:28:54 np0005645166.novalocal cloud-init[1395]: Cloud-init v. 24.4-8.el9 running 'modules:final' at Thu, 12 Mar 2026 09:28:54 +0000. Up 9.86 seconds. Mar 12 05:28:54 np0005645166.novalocal cloud-init[1431]: ############################################################# Mar 12 05:28:54 np0005645166.novalocal cloud-init[1435]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Mar 12 05:28:54 np0005645166.novalocal cloud-init[1445]: 256 SHA256:DaKvIS8zbwPQudqySoKBwaShxNQxF5AywqvBlMynyzI root@np0005645166.novalocal (ECDSA) Mar 12 05:28:54 np0005645166.novalocal cloud-init[1455]: 256 SHA256:4Qa2stil48wgM/IqaHNbs1kJGUOc9ddjsgeZtZO/+Xk root@np0005645166.novalocal (ED25519) Mar 12 05:28:54 np0005645166.novalocal cloud-init[1462]: 3072 SHA256:knGfCRyhqTmzvG64Fg0O/mDdMvt+4j0aFsiwm9lZb0M root@np0005645166.novalocal (RSA) Mar 12 05:28:54 np0005645166.novalocal cloud-init[1463]: -----END SSH HOST KEY FINGERPRINTS----- Mar 12 05:28:54 np0005645166.novalocal cloud-init[1467]: ############################################################# Mar 12 05:28:54 np0005645166.novalocal cloud-init[1395]: Cloud-init v. 24.4-8.el9 finished at Thu, 12 Mar 2026 09:28:54 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 10.05 seconds Mar 12 05:28:54 np0005645166.novalocal systemd[1]: Finished Cloud-init: Final Stage. Mar 12 05:28:54 np0005645166.novalocal systemd[1]: Reached target Cloud-init target. Mar 12 05:28:54 np0005645166.novalocal dracut[1536]: dracut-057-110.git20260130.el9 Mar 12 05:28:54 np0005645166.novalocal dracut[1538]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics --mount "/dev/disk/by-uuid/d95c3fed-ff86-4b48-8422-63578d153f1e /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device --add-confdir /lib/kdump/dracut.conf.d -f /boot/initramfs-5.14.0-687.el9.x86_64kdump.img 5.14.0-687.el9.x86_64 Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: Module 'ifcfg' will not be installed, because it's in the list to be omitted! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: Module 'plymouth' will not be installed, because it's in the list to be omitted! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: Module 'resume' will not be installed, because it's in the list to be omitted! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: Module 'earlykdump' will not be installed, because it's in the list to be omitted! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: memstrack is not available Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Mar 12 05:28:55 np0005645166.novalocal dracut[1538]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: memstrack is not available Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: *** Including module: systemd *** Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: *** Including module: fips *** Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: *** Including module: systemd-initrd *** Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: *** Including module: i18n *** Mar 12 05:28:56 np0005645166.novalocal chronyd[802]: Selected source 206.108.0.131 (2.centos.pool.ntp.org) Mar 12 05:28:56 np0005645166.novalocal chronyd[802]: System clock TAI offset set to 37 seconds Mar 12 05:28:56 np0005645166.novalocal dracut[1538]: *** Including module: drm *** Mar 12 05:28:57 np0005645166.novalocal dracut[1538]: *** Including module: prefixdevname *** Mar 12 05:28:57 np0005645166.novalocal dracut[1538]: *** Including module: kernel-modules *** Mar 12 05:28:57 np0005645166.novalocal kernel: block vda: the capability attribute has been deprecated. Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: *** Including module: kernel-modules-extra *** Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: kernel-modules-extra: configuration source "/run/depmod.d" does not exist Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: kernel-modules-extra: configuration source "/lib/depmod.d" does not exist Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: kernel-modules-extra: parsing configuration file "/etc/depmod.d/dist.conf" Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: kernel-modules-extra: /etc/depmod.d/dist.conf: added "updates extra built-in weak-updates" to the list of search directories Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: *** Including module: qemu *** Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: *** Including module: fstab-sys *** Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: *** Including module: rootfs-block *** Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: *** Including module: terminfo *** Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: *** Including module: udev-rules *** Mar 12 05:28:58 np0005645166.novalocal chronyd[802]: Selected source 23.133.168.247 (2.centos.pool.ntp.org) Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: Skipping udev rule: 91-permissions.rules Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: Skipping udev rule: 80-drivers-modprobe.rules Mar 12 05:28:58 np0005645166.novalocal chronyd[802]: Selected source 147.189.136.126 (2.centos.pool.ntp.org) Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: *** Including module: virtiofs *** Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: *** Including module: dracut-systemd *** Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: *** Including module: usrmount *** Mar 12 05:28:58 np0005645166.novalocal dracut[1538]: *** Including module: base *** Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: *** Including module: fs-lib *** Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: *** Including module: kdumpbase *** Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: *** Including module: microcode_ctl-fw_dir_override *** Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl module: mangling fw_dir Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware" Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: configuration "intel" is ignored Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: configuration "intel-06-2d-07" is ignored Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: configuration "intel-06-4e-03" is ignored Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: configuration "intel-06-4f-01" is ignored Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: configuration "intel-06-55-04" is ignored Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: configuration "intel-06-5e-03" is ignored Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: configuration "intel-06-8c-01" is ignored Mar 12 05:28:59 np0005645166.novalocal dracut[1538]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Mar 12 05:29:00 np0005645166.novalocal dracut[1538]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Mar 12 05:29:00 np0005645166.novalocal dracut[1538]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Mar 12 05:29:00 np0005645166.novalocal dracut[1538]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Mar 12 05:29:00 np0005645166.novalocal dracut[1538]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8f-08"... Mar 12 05:29:00 np0005645166.novalocal dracut[1538]: microcode_ctl: configuration "intel-06-8f-08" is ignored Mar 12 05:29:00 np0005645166.novalocal dracut[1538]: microcode_ctl: final fw_dir: "/lib/firmware/updates /lib/firmware" Mar 12 05:29:00 np0005645166.novalocal dracut[1538]: *** Including module: openssl *** Mar 12 05:29:00 np0005645166.novalocal dracut[1538]: *** Including module: shutdown *** Mar 12 05:29:00 np0005645166.novalocal dracut[1538]: *** Including module: squash *** Mar 12 05:29:00 np0005645166.novalocal dracut[1538]: *** Including modules done *** Mar 12 05:29:00 np0005645166.novalocal dracut[1538]: *** Installing kernel module dependencies *** Mar 12 05:29:00 np0005645166.novalocal dracut[1538]: *** Installing kernel module dependencies done *** Mar 12 05:29:00 np0005645166.novalocal dracut[1538]: *** Resolving executable dependencies *** Mar 12 05:29:01 np0005645166.novalocal irqbalance[808]: Cannot change IRQ 25 affinity: Operation not permitted Mar 12 05:29:01 np0005645166.novalocal irqbalance[808]: IRQ 25 affinity is now unmanaged Mar 12 05:29:01 np0005645166.novalocal irqbalance[808]: Cannot change IRQ 31 affinity: Operation not permitted Mar 12 05:29:01 np0005645166.novalocal irqbalance[808]: IRQ 31 affinity is now unmanaged Mar 12 05:29:01 np0005645166.novalocal irqbalance[808]: Cannot change IRQ 28 affinity: Operation not permitted Mar 12 05:29:01 np0005645166.novalocal irqbalance[808]: IRQ 28 affinity is now unmanaged Mar 12 05:29:01 np0005645166.novalocal irqbalance[808]: Cannot change IRQ 32 affinity: Operation not permitted Mar 12 05:29:01 np0005645166.novalocal irqbalance[808]: IRQ 32 affinity is now unmanaged Mar 12 05:29:01 np0005645166.novalocal irqbalance[808]: Cannot change IRQ 30 affinity: Operation not permitted Mar 12 05:29:01 np0005645166.novalocal irqbalance[808]: IRQ 30 affinity is now unmanaged Mar 12 05:29:01 np0005645166.novalocal irqbalance[808]: Cannot change IRQ 29 affinity: Operation not permitted Mar 12 05:29:01 np0005645166.novalocal irqbalance[808]: IRQ 29 affinity is now unmanaged Mar 12 05:29:02 np0005645166.novalocal systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Mar 12 05:29:02 np0005645166.novalocal dracut[1538]: *** Resolving executable dependencies done *** Mar 12 05:29:02 np0005645166.novalocal dracut[1538]: *** Generating early-microcode cpio image *** Mar 12 05:29:02 np0005645166.novalocal dracut[1538]: *** Store current command line parameters *** Mar 12 05:29:02 np0005645166.novalocal dracut[1538]: Stored kernel commandline: Mar 12 05:29:02 np0005645166.novalocal dracut[1538]: No dracut internal kernel commandline stored in the initramfs Mar 12 05:29:02 np0005645166.novalocal dracut[1538]: *** Install squash loader *** Mar 12 05:29:03 np0005645166.novalocal dracut[1538]: *** Squashing the files inside the initramfs *** Mar 12 05:29:03 np0005645166.novalocal sshd-session[4389]: Invalid user admin from 185.156.73.233 port 58648 Mar 12 05:29:03 np0005645166.novalocal sshd-session[4389]: Connection closed by invalid user admin 185.156.73.233 port 58648 [preauth] Mar 12 05:29:04 np0005645166.novalocal dracut[1538]: *** Squashing the files inside the initramfs done *** Mar 12 05:29:04 np0005645166.novalocal dracut[1538]: *** Creating image file '/boot/initramfs-5.14.0-687.el9.x86_64kdump.img' *** Mar 12 05:29:04 np0005645166.novalocal dracut[1538]: *** Hardlinking files *** Mar 12 05:29:04 np0005645166.novalocal dracut[1538]: Mode: real Mar 12 05:29:04 np0005645166.novalocal dracut[1538]: Files: 50 Mar 12 05:29:04 np0005645166.novalocal dracut[1538]: Linked: 0 files Mar 12 05:29:04 np0005645166.novalocal dracut[1538]: Compared: 0 xattrs Mar 12 05:29:04 np0005645166.novalocal dracut[1538]: Compared: 0 files Mar 12 05:29:04 np0005645166.novalocal dracut[1538]: Saved: 0 B Mar 12 05:29:04 np0005645166.novalocal dracut[1538]: Duration: 0.000451 seconds Mar 12 05:29:04 np0005645166.novalocal dracut[1538]: *** Hardlinking files done *** Mar 12 05:29:04 np0005645166.novalocal dracut[1538]: *** Creating initramfs image file '/boot/initramfs-5.14.0-687.el9.x86_64kdump.img' done *** Mar 12 05:29:05 np0005645166.novalocal kdumpctl[1023]: kdump: kexec: loaded kdump kernel Mar 12 05:29:05 np0005645166.novalocal kdumpctl[1023]: kdump: Starting kdump: [OK] Mar 12 05:29:05 np0005645166.novalocal systemd[1]: Finished Crash recovery kernel arming. Mar 12 05:29:05 np0005645166.novalocal systemd[1]: Startup finished in 1.545s (kernel) + 2.820s (initrd) + 16.402s (userspace) = 20.769s. Mar 12 05:29:07 np0005645166.novalocal sshd-session[4790]: Accepted publickey for zuul-worker from 38.102.83.114 port 56166 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Mar 12 05:29:07 np0005645166.novalocal systemd[1]: Created slice User Slice of UID 1000. Mar 12 05:29:07 np0005645166.novalocal systemd[1]: Starting User Runtime Directory /run/user/1000... Mar 12 05:29:07 np0005645166.novalocal systemd-logind[814]: New session 1 of user zuul-worker. Mar 12 05:29:07 np0005645166.novalocal systemd[1]: Finished User Runtime Directory /run/user/1000. Mar 12 05:29:07 np0005645166.novalocal systemd[1]: Starting User Manager for UID 1000... Mar 12 05:29:07 np0005645166.novalocal systemd[4794]: pam_unix(systemd-user:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Mar 12 05:29:07 np0005645166.novalocal systemd[4794]: Queued start job for default target Main User Target. Mar 12 05:29:07 np0005645166.novalocal systemd[4794]: Created slice User Application Slice. Mar 12 05:29:07 np0005645166.novalocal systemd[4794]: Started Mark boot as successful after the user session has run 2 minutes. Mar 12 05:29:07 np0005645166.novalocal systemd[4794]: Started Daily Cleanup of User's Temporary Directories. Mar 12 05:29:07 np0005645166.novalocal systemd[4794]: Reached target Paths. Mar 12 05:29:07 np0005645166.novalocal systemd[4794]: Reached target Timers. Mar 12 05:29:07 np0005645166.novalocal systemd[4794]: Starting D-Bus User Message Bus Socket... Mar 12 05:29:07 np0005645166.novalocal systemd[4794]: Starting Create User's Volatile Files and Directories... Mar 12 05:29:07 np0005645166.novalocal systemd[4794]: Finished Create User's Volatile Files and Directories. Mar 12 05:29:07 np0005645166.novalocal systemd[4794]: Listening on D-Bus User Message Bus Socket. Mar 12 05:29:07 np0005645166.novalocal systemd[4794]: Reached target Sockets. Mar 12 05:29:07 np0005645166.novalocal systemd[4794]: Reached target Basic System. Mar 12 05:29:07 np0005645166.novalocal systemd[4794]: Reached target Main User Target. Mar 12 05:29:07 np0005645166.novalocal systemd[4794]: Startup finished in 111ms. Mar 12 05:29:07 np0005645166.novalocal systemd[1]: Started User Manager for UID 1000. Mar 12 05:29:07 np0005645166.novalocal systemd[1]: Started Session 1 of User zuul-worker. Mar 12 05:29:07 np0005645166.novalocal sshd-session[4790]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Mar 12 05:29:07 np0005645166.novalocal python3[4874]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Mar 12 05:29:09 np0005645166.novalocal python3[4902]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Mar 12 05:29:13 np0005645166.novalocal python3[4960]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Mar 12 05:29:14 np0005645166.novalocal python3[5000]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Mar 12 05:29:15 np0005645166.novalocal python3[5026]: ansible-authorized_key Invoked with user=zuul-worker state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Mar 12 05:29:15 np0005645166.novalocal python3[5050]: ansible-file Invoked with state=directory path=/home/zuul-worker/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:16 np0005645166.novalocal python3[5149]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Mar 12 05:29:16 np0005645166.novalocal python3[5220]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1773307756.059794-163-182688708266334/source dest=/home/zuul-worker/.ssh/id_rsa mode=384 force=False _original_basename=7891d2d2c3ad4f669e2cb062f4219cd5_id_rsa follow=False checksum=a6f9f86a9965ef8b14f271c834e97334b4b6a27f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:17 np0005645166.novalocal python3[5343]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Mar 12 05:29:17 np0005645166.novalocal python3[5414]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1773307756.9245555-174-85508669786195/source dest=/home/zuul-worker/.ssh/id_rsa.pub mode=420 force=False _original_basename=7891d2d2c3ad4f669e2cb062f4219cd5_id_rsa.pub follow=False checksum=3fa5c9d37599473b1635c7e3c1faaaa2629b99d4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:18 np0005645166.novalocal python3[5462]: ansible-ping Invoked with data=pong Mar 12 05:29:19 np0005645166.novalocal python3[5486]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Mar 12 05:29:20 np0005645166.novalocal python3[5544]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Mar 12 05:29:21 np0005645166.novalocal systemd[1]: systemd-hostnamed.service: Deactivated successfully. Mar 12 05:29:21 np0005645166.novalocal python3[5576]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:22 np0005645166.novalocal python3[5603]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:22 np0005645166.novalocal python3[5627]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:22 np0005645166.novalocal python3[5651]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:23 np0005645166.novalocal python3[5675]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:23 np0005645166.novalocal python3[5699]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:25 np0005645166.novalocal python3[5723]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Mar 12 05:29:26 np0005645166.novalocal sshd-session[5726]: Accepted publickey for zuul-worker from 38.102.83.114 port 42338 ssh2: RSA SHA256:1rcGJd70oy+L6oOtaKoGLDmKuDn6pyLjecG5tLXGFT8 Mar 12 05:29:26 np0005645166.novalocal systemd-logind[814]: New session 3 of user zuul-worker. Mar 12 05:29:26 np0005645166.novalocal systemd[1]: Started Session 3 of User zuul-worker. Mar 12 05:29:26 np0005645166.novalocal sshd-session[5726]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Mar 12 05:29:28 np0005645166.novalocal sshd-session[5729]: Received disconnect from 38.102.83.114 port 42338:11: disconnected by user Mar 12 05:29:28 np0005645166.novalocal sshd-session[5729]: Disconnected from user zuul-worker 38.102.83.114 port 42338 Mar 12 05:29:28 np0005645166.novalocal sshd-session[5726]: pam_unix(sshd:session): session closed for user zuul-worker Mar 12 05:29:28 np0005645166.novalocal systemd[1]: session-3.scope: Deactivated successfully. Mar 12 05:29:28 np0005645166.novalocal systemd[1]: session-3.scope: Consumed 1.432s CPU time. Mar 12 05:29:28 np0005645166.novalocal systemd-logind[814]: Session 3 logged out. Waiting for processes to exit. Mar 12 05:29:28 np0005645166.novalocal systemd-logind[814]: Removed session 3. Mar 12 05:29:28 np0005645166.novalocal python3[5777]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:29 np0005645166.novalocal python3[5801]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:29 np0005645166.novalocal python3[5825]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:29 np0005645166.novalocal python3[5849]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:29 np0005645166.novalocal python3[5873]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:30 np0005645166.novalocal python3[5897]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:30 np0005645166.novalocal python3[5922]: ansible-ansible.legacy.command Invoked with _raw_params=sudo -n true zuul_log_id=fa163ef9-e89a-334f-9502-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:29:30 np0005645166.novalocal sudo[5923]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/true Mar 12 05:29:30 np0005645166.novalocal sudo[5923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:29:30 np0005645166.novalocal sudo[5923]: pam_unix(sudo:session): session closed for user root Mar 12 05:29:31 np0005645166.novalocal python3[5951]: ansible-file Invoked with path=/home/zuul-worker/.pydistutils.cfg state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:31 np0005645166.novalocal sudo[6027]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fbdcnyasrsaarengvbgzixwetrzzllsv ; /usr/bin/python3' Mar 12 05:29:31 np0005645166.novalocal sudo[6027]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:29:31 np0005645166.novalocal python3[6029]: ansible-ansible.legacy.stat Invoked with path=/etc/pip.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Mar 12 05:29:31 np0005645166.novalocal sudo[6027]: pam_unix(sudo:session): session closed for user root Mar 12 05:29:31 np0005645166.novalocal sudo[6100]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-aitocwnecamihvsmhgzjveajloinxkhf ; /usr/bin/python3' Mar 12 05:29:32 np0005645166.novalocal sudo[6100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:29:32 np0005645166.novalocal python3[6102]: ansible-ansible.legacy.copy Invoked with dest=/etc/pip.conf group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1773307771.4723763-91-53755035110346/source follow=False _original_basename=pip.conf.j2 checksum=5b65c9094402b8db60a77928be1f816342638afe backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:32 np0005645166.novalocal sudo[6100]: pam_unix(sudo:session): session closed for user root Mar 12 05:29:32 np0005645166.novalocal sudo[6202]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vmbfrehwowauftjfsqteockxsohigrzt ; /usr/bin/python3' Mar 12 05:29:32 np0005645166.novalocal sudo[6202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:29:32 np0005645166.novalocal python3[6204]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Mar 12 05:29:32 np0005645166.novalocal sudo[6202]: pam_unix(sudo:session): session closed for user root Mar 12 05:29:33 np0005645166.novalocal sudo[6277]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ybjwngghaqpuctxebiyncbpbegfzdehs ; /usr/bin/python3' Mar 12 05:29:33 np0005645166.novalocal sudo[6277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:29:33 np0005645166.novalocal python3[6279]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1773307772.5168507-103-234017106416948/source follow=False _original_basename=centos.repo.j2 checksum=0268eb1686bc9b047a2096dbaf287658b0d20a19 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:33 np0005645166.novalocal sudo[6277]: pam_unix(sudo:session): session closed for user root Mar 12 05:29:33 np0005645166.novalocal sudo[6379]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ebrrqdwxkjppzcmcxdmmimrjyddirgmi ; /usr/bin/python3' Mar 12 05:29:33 np0005645166.novalocal sudo[6379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:29:33 np0005645166.novalocal python3[6381]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos-addons.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Mar 12 05:29:33 np0005645166.novalocal sudo[6379]: pam_unix(sudo:session): session closed for user root Mar 12 05:29:33 np0005645166.novalocal sudo[6454]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-tmfrzuqbvpbvbqeafsdgyfcdweccqswt ; /usr/bin/python3' Mar 12 05:29:33 np0005645166.novalocal sudo[6454]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:29:34 np0005645166.novalocal python3[6456]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos-addons.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1773307773.4596355-103-158457080668435/source follow=False _original_basename=centos-addons.repo.j2 checksum=2917e612982cadeb3009a3bf37bf30cbcd7f2044 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:34 np0005645166.novalocal sudo[6454]: pam_unix(sudo:session): session closed for user root Mar 12 05:29:34 np0005645166.novalocal sudo[6504]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wkzdkpzyszptagljcaoqlrvxrcivtdru ; /usr/bin/python3' Mar 12 05:29:34 np0005645166.novalocal sudo[6504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:29:34 np0005645166.novalocal python3[6506]: ansible-ini_file Invoked with path=/etc/dnf.conf section=main option=deltarpm value=0 mode=420 backup=False state=present exclusive=True no_extra_spaces=False ignore_spaces=False allow_no_value=False create=True follow=False unsafe_writes=False values=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:34 np0005645166.novalocal python3[6506]: ansible-ini_file [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Mar 12 05:29:34 np0005645166.novalocal sudo[6504]: pam_unix(sudo:session): session closed for user root Mar 12 05:29:34 np0005645166.novalocal sudo[6530]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bsibkqdltlazlxcqobwhtcoetmxayphx ; /usr/bin/python3' Mar 12 05:29:34 np0005645166.novalocal sudo[6530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:29:35 np0005645166.novalocal python3[6532]: ansible-ansible.legacy.command Invoked with _raw_params=dnf clean all zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:29:35 np0005645166.novalocal sudo[6530]: pam_unix(sudo:session): session closed for user root Mar 12 05:29:35 np0005645166.novalocal sudo[6558]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uthvdcfdoospotcmrpmamzjrqohwnzur ; /usr/bin/python3' Mar 12 05:29:35 np0005645166.novalocal sudo[6558]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:29:35 np0005645166.novalocal python3[6560]: ansible-ansible.legacy.command Invoked with _raw_params=dnf makecache -v zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:29:41 np0005645166.novalocal irqbalance[808]: Cannot change IRQ 27 affinity: Operation not permitted Mar 12 05:29:41 np0005645166.novalocal irqbalance[808]: IRQ 27 affinity is now unmanaged Mar 12 05:29:46 np0005645166.novalocal sudo[6558]: pam_unix(sudo:session): session closed for user root Mar 12 05:29:48 np0005645166.novalocal python3[6601]: ansible-file Invoked with path=/home/zuul-worker/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:29:48 np0005645166.novalocal python3[6626]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=PYTHON2=0 PYTHON3=1 # Not all platforms install a `pip` when installing python # specific pip packages. We first check if pip$VERSION is # available and if not fallback to checking if just `pip` # is present. if [ "$PYTHON2" -eq "1" ] ; then command -v pip2 || command -v pip || exit 1 python2 -m wheel --help || exit 1 fi if [ "$PYTHON3" -eq "1" ] ; then command -v pip3 || command -v pip || exit 1 python3 -m wheel --help || exit 1 fi _uses_shell=True zuul_log_id=fa163ef9-e89a-0125-8764-000000000097-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Mar 12 05:29:49 np0005645166.novalocal sudo[6654]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jvotfazevtjwbyppgsesucwmiwqijxzr ; /usr/bin/python3' Mar 12 05:29:49 np0005645166.novalocal sudo[6654]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:29:49 np0005645166.novalocal python3[6656]: ansible-ansible.legacy.dnf Invoked with name=['python3-pip', 'python3-setuptools'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 12 05:29:50 np0005645166.novalocal sudo[6654]: pam_unix(sudo:session): session closed for user root Mar 12 05:29:50 np0005645166.novalocal sudo[6681]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hqovfadhyjwvedtegnigbbvsgpsplphn ; /usr/bin/python3' Mar 12 05:29:50 np0005645166.novalocal sudo[6681]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:29:50 np0005645166.novalocal python3[6683]: ansible-ansible.legacy.dnf Invoked with name=['python3-wheel'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 12 05:29:52 np0005645166.novalocal sudo[6681]: pam_unix(sudo:session): session closed for user root Mar 12 05:29:53 np0005645166.novalocal python3[6715]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v python3 _uses_shell=True zuul_log_id=fa163ef9-e89a-0125-8764-0000000000a1-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Mar 12 05:29:53 np0005645166.novalocal python3[6743]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v tox /home/zuul-worker/.local/tox/bin/tox || exit 1 _uses_shell=True zuul_log_id=fa163ef9-e89a-0125-8764-00000000002b-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Mar 12 05:29:54 np0005645166.novalocal python3[6771]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/bin/python3 -m venv /home/zuul-worker/.local/tox zuul_log_id=fa163ef9-e89a-0125-8764-00000000002e-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:29:57 np0005645166.novalocal python3[6803]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/pip install tox zuul_log_id=fa163ef9-e89a-0125-8764-00000000002f-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:30:00 np0005645166.novalocal python3[6833]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/tox --version zuul_log_id=fa163ef9-e89a-0125-8764-000000000032-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:30:01 np0005645166.novalocal sudo[6860]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yvxpjysgutffusdhezbdteoguaifubfa ; /usr/bin/python3' Mar 12 05:30:01 np0005645166.novalocal sudo[6860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:30:01 np0005645166.novalocal python3[6862]: ansible-file Invoked with state=link src=/home/zuul-worker/.local/tox/bin/tox dest=/usr/local/bin/tox path=/usr/local/bin/tox recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:30:01 np0005645166.novalocal sudo[6860]: pam_unix(sudo:session): session closed for user root Mar 12 05:30:01 np0005645166.novalocal irqbalance[808]: Cannot change IRQ 26 affinity: Operation not permitted Mar 12 05:30:01 np0005645166.novalocal irqbalance[808]: IRQ 26 affinity is now unmanaged Mar 12 05:30:01 np0005645166.novalocal python3[6887]: ansible-ansible.legacy.command Invoked with _raw_params=export WBASE="/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo"; mkdir -p $WBASE/playbooks/roles ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-common" $WBASE/playbooks/roles/common; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-logs" $WBASE/playbooks/roles/logs; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-kolla" $WBASE/playbooks/roles/kolla; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-packstack" $WBASE/playbooks/roles/packstack; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-puppet-openstack" $WBASE/playbooks/roles/puppet-openstack; # noqa 204 ln -s "/home/zuul-worker/src/github.com/openstack-k8s-operators/ci-framework/roles/build_containers" $WBASE/playbooks/roles/build_containers; # noqa 204 _uses_shell=True zuul_log_id=fa163ef9-e89a-0125-8764-000000000049-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:30:01 np0005645166.novalocal sudo[6920]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yzpkpoddsnoqxqyfhbtnccvohwztkqxi ; /usr/bin/python3' Mar 12 05:30:01 np0005645166.novalocal sudo[6920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:30:02 np0005645166.novalocal python3[6922]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:30:02 np0005645166.novalocal sudo[6920]: pam_unix(sudo:session): session closed for user root Mar 12 05:30:02 np0005645166.novalocal sudo[6998]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jayrqqeslxlowdlqzfeivnelzkophuzq ; /usr/bin/python3' Mar 12 05:30:02 np0005645166.novalocal sudo[6998]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:30:02 np0005645166.novalocal python3[7000]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Mar 12 05:30:02 np0005645166.novalocal sudo[6998]: pam_unix(sudo:session): session closed for user root Mar 12 05:30:02 np0005645166.novalocal sudo[7071]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ovcgijsghezvsaiwjrdhthihrgnkhllh ; /usr/bin/python3' Mar 12 05:30:02 np0005645166.novalocal sudo[7071]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:30:03 np0005645166.novalocal python3[7073]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1773307802.1782627-86-178489946563881/source follow=False _original_basename=mirror_info.sh.j2 checksum=ea5d641d750b2605d80a15d4106dfb6027081c92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Mar 12 05:30:03 np0005645166.novalocal sudo[7071]: pam_unix(sudo:session): session closed for user root Mar 12 05:30:03 np0005645166.novalocal sudo[7122]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-prkymcfqxxawshkfkeickhllklmdaahx ; /usr/bin/python3' Mar 12 05:30:03 np0005645166.novalocal sudo[7122]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:30:03 np0005645166.novalocal python3[7124]: ansible-ansible.legacy.command Invoked with _raw_params=dnf install -y python3-pip rpmlint python3-rpm _uses_shell=True zuul_log_id=fa163ef9-e89a-0125-8764-00000000005c-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:30:04 np0005645166.novalocal sudo[7122]: pam_unix(sudo:session): session closed for user root Mar 12 05:30:04 np0005645166.novalocal python3[7151]: ansible-pip Invoked with name=['rdopkg'] virtualenv=/home/zuul-worker/rdopkg-venv virtualenv_command=/usr/bin/python3 -m venv virtualenv_site_packages=True state=present editable=False version=None requirements=None virtualenv_python=None extra_args=None chdir=None executable=None umask=None Mar 12 05:30:10 np0005645166.novalocal python3[7184]: ansible-ansible.legacy.command Invoked with _raw_params=set -x export CENTOS_RELEASE="centos9" logs=https://logserver.rdoproject.org/28b/rdoproject.org/28b63325377147a7b3db83fcb4f72869/buildset source '/home/zuul-worker/rdopkg-venv/bin/activate' # Use the latest repository hash # If DLRN built multiple packages, there will be multiple repositories. # We want the latest repository which contains all of the packages that were just built. repository="${logs}/centos/current" if [ ${CENTOS_RELEASE} = "centos8" ]; then repository="${logs}/centos8/current" elif [ ${CENTOS_RELEASE} = "centos9" ]; then repository="${logs}/centos9/current" fi # The rdoinfo-DLRN-check job may create different repos when it builds packages for more than # one release. In that case, let us try to find the right one curl -o /dev/null -sIf "${repository}" if [ $? -ne 0 ]; then STABLE_RELEASES="$(rdopkg release | grep -e 'name:' | awk '{print $2}' | tail -n +2 | awk 1 ORS='-rdo ')" releases="rpm-master $STABLE_RELEASES" for release in $releases; do repository="${logs}/centos-${release}/current" curl -o /dev/null -sIf "${repository}" || continue break done fi # If we could not find a working repository, give up curl -o /dev/null -sIf "${repository}" || exit 1 _uses_shell=True zuul_log_id=fa163ef9-e89a-0125-8764-000000000008-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:30:15 np0005645166.novalocal python3[7237]: ansible-ansible.legacy.command Invoked with _raw_params=# This builder, when run from a child job of a DLRN based job, # configures the DLRN repository that was uploaded as an artifact # of the parent DLRN-rpmbuild job. # This allows to install the packages in that repository and test # them. set +ex export CENTOS_RELEASE="centos9" logs=https://logserver.rdoproject.org/28b/rdoproject.org/28b63325377147a7b3db83fcb4f72869/buildset source '/home/zuul-worker/rdopkg-venv/bin/activate' # Use the latest repository hash # If DLRN built multiple packages, there will be multiple repositories. # We want the latest repository which contains all of the packages that were just built. repository="${logs}/centos/current" if [ ${CENTOS_RELEASE} = "centos8" ]; then repository="${logs}/centos8/current" elif [ ${CENTOS_RELEASE} = "centos9" ]; then repository="${logs}/centos9/current" fi # The rdoinfo-DLRN-check job may create different repos when it builds packages for more than # one release. In that case, let us try to find the right one curl -o /dev/null -sIf "${repository}" if [ $? -ne 0 ]; then STABLE_RELEASES="$(rdopkg release | grep -e 'name:' | awk '{print $2}' | tail -n +2 | awk 1 ORS='-rdo ')" releases="rpm-master $STABLE_RELEASES" for release in $releases; do repository="${logs}/centos-${release}/current" curl -o /dev/null -sIf "${repository}" || continue break done fi # If we could not find a working repository, give up curl -o /dev/null -sIf "${repository}" || exit 1 # Configure the repository name="delorean-zuul-repo" sudo bash -c "cat << EOF > /etc/yum.repos.d/${name}.repo [${name}] name=${name} baseurl=${repository} enabled=1 gpgcheck=0 priority=1 EOF" _uses_shell=True zuul_log_id=fa163ef9-e89a-0125-8764-000000000009-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:30:17 np0005645166.novalocal sudo[7238]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/bash -c 'cat << EOF > /etc/yum.repos.d/delorean-zuul-repo.repo#012[delorean-zuul-repo]#012name=delorean-zuul-repo#012baseurl=https://logserver.rdoproject.org/28b/rdoproject.org/28b63325377147a7b3db83fcb4f72869/buildset/centos-epoxy-rdo/current#012enabled=1#012gpgcheck=0#012priority=1#012EOF' Mar 12 05:30:17 np0005645166.novalocal sudo[7238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:30:17 np0005645166.novalocal sudo[7238]: pam_unix(sudo:session): session closed for user root Mar 12 05:30:18 np0005645166.novalocal python3[7283]: ansible-ansible.legacy.command Invoked with _raw_params=# WeIRDO uses ARA for ansible-playbook run visualization export WORKSPACE="/home/zuul-worker/workspace" mkdir -p $WORKSPACE export ARA_DATABASE_NAME="$WORKSPACE/ara.sqlite" source /home/zuul-worker/rdopkg-venv/bin/activate # Detecting if projects where removed status_report_url="https://trunk.rdoproject.org/centos9-epoxy/status_report.csv" status_report_dir="/home/zuul-worker/src/review.rdoproject.org/rdoinfo" wget "$status_report_url" -P "$status_report_dir" pushd "/home/zuul-worker/src/review.rdoproject.org/rdoinfo/rdoinfo" removed_projects=$(git diff HEAD~ | grep -e "^-- project:" | sort | uniq | awk '{print $3}') popd if [ -n "$removed_projects" ]; then while IFS= read -r project; do # translate projects into proper package names project_name=$(rdopkg findpkg "$project" | grep name: | awk '{print $2}') dependent_pkgs=$(grep "$project_name," "$status_report_dir/status_report.csv" | sed -e "s/,/ /g" | awk '{print $8}' | sed -e "s/|/\n/g" | grep -v ".src.rpm") exlude_pkgs=$(while IFS= read -r pkg; do basename $pkg | sed 's|-[0-9]*\..*||g'; done <<< "$dependent_pkgs" | uniq) total_pkgs_to_exclude+=$exlude_pkgs echo Project "$project_name" has following packages to exclude: $exlude_pkgs done <<< "$removed_projects" fi cmd=$(echo exclude=$total_pkgs_to_exclude) sudo sh -c "echo $cmd >> /etc/dnf/dnf.conf" sudo cat /etc/dnf/dnf.conf # Backwards compat for project and openstack_release # (dmsimard) TODO: Clean this up ASAP if [[ "weirdo-dlrn-epoxy-puppet-scenario005-centos9" == *"puppet"* ]]; then project="puppet-openstack" elif [[ "weirdo-dlrn-epoxy-puppet-scenario005-centos9" == *"tcib-container-build"* ]]; then project="tcib-container-build" else project="packstack" fi scenario="scenario005" if [[ "epoxy" != "master" ]]; then version="$(rdopkg release -r epoxy | grep upstream_branch | awk '{print $2}')" else version="epoxy" fi delorean_deps_url="https://trunk.rdoproject.org/centos9-epoxy/delorean-deps.repo" if [[ "check" =~ "experimental" ]]; then delorean_url="https://trunk.rdoproject.org/centos9-epoxy/current/delorean.repo" elif [[ "epoxy" == "master" ]]; then delorean_url="https://trunk.rdoproject.org/centos9-epoxy/puppet-passed-ci/delorean.repo" else delorean_url="https://trunk.rdoproject.org/centos9-epoxy/puppet-passed-ci/delorean.repo" fi cd "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo" # Prepare Ansible inventory to use localhost cat <hosts localhost ansible_connection=local ansible_python_interpreter=/usr/bin/python3 [openstack_nodes] localhost log_destination=/var/log/weirdo EOF tox -e ansible-playbook -- -vv -b -i hosts playbooks/$project-$scenario.yml \ -e version=$version \ -e openstack_release="epoxy" \ -e selinux_enforcing="true" \ -e delorean_url=$delorean_url \ -e delorean_deps_url=$delorean_deps_url \ -e enable_puppet_modules_rpm=true _uses_shell=True zuul_log_id=fa163ef9-e89a-0125-8764-00000000000a-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:30:18 np0005645166.novalocal sudo[7295]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo exclude= >> /etc/dnf/dnf.conf' Mar 12 05:30:18 np0005645166.novalocal sudo[7295]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:30:18 np0005645166.novalocal sudo[7295]: pam_unix(sudo:session): session closed for user root Mar 12 05:30:18 np0005645166.novalocal sudo[7298]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/cat /etc/dnf/dnf.conf Mar 12 05:30:18 np0005645166.novalocal sudo[7298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:30:18 np0005645166.novalocal sudo[7298]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:21 np0005645166.novalocal systemd[4794]: Starting Mark boot as successful... Mar 12 05:31:21 np0005645166.novalocal systemd[4794]: Finished Mark boot as successful. Mar 12 05:31:21 np0005645166.novalocal sudo[7622]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dhfsfajvqlbfhvaounhxgiicppxotlru ; /usr/bin/python3' Mar 12 05:31:21 np0005645166.novalocal sudo[7622]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:21 np0005645166.novalocal python3[7624]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=* fact_path=/etc/ansible/facts.d Mar 12 05:31:21 np0005645166.novalocal sudo[7622]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:21 np0005645166.novalocal sudo[7662]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xfrxxctmpiyypovwtorhtwuuxvbfsfep ; /usr/bin/python3' Mar 12 05:31:21 np0005645166.novalocal sudo[7662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:22 np0005645166.novalocal python3[7664]: ansible-command Invoked with _raw_params=sudo dnf config-manager --enable crb _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:31:22 np0005645166.novalocal python3[7664]: ansible-command [WARNING] Consider using 'become', 'become_method', and 'become_user' rather than running sudo Mar 12 05:31:22 np0005645166.novalocal sudo[7665]: root : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/dnf config-manager --enable crb Mar 12 05:31:22 np0005645166.novalocal sudo[7665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:31:22 np0005645166.novalocal sudo[7665]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:22 np0005645166.novalocal sudo[7662]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:22 np0005645166.novalocal sudo[7675]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lujzpcdwsgabdezavbhofqlprkilqnpl ; /usr/bin/python3' Mar 12 05:31:22 np0005645166.novalocal sudo[7675]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:22 np0005645166.novalocal python3[7677]: ansible-systemd Invoked with name=firewalld state=stopped daemon_reload=False daemon_reexec=False no_block=False enabled=None force=None masked=None user=None scope=None Mar 12 05:31:22 np0005645166.novalocal sudo[7675]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:23 np0005645166.novalocal sudo[7686]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ijdouyuumkbkzrjflowvgnvovjhjloey ; /usr/bin/python3' Mar 12 05:31:23 np0005645166.novalocal sudo[7686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:23 np0005645166.novalocal python3[7688]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 12 05:31:24 np0005645166.novalocal sudo[7686]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:24 np0005645166.novalocal sudo[7707]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dnqdcmfywgcnnnecioelvzbuxypdxgzc ; /usr/bin/python3' Mar 12 05:31:24 np0005645166.novalocal sudo[7707]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:24 np0005645166.novalocal python3[7709]: ansible-dnf Invoked with name=['tuned', 'subscription-manager'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 12 05:31:26 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:31:26 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:31:27 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:31:27 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:31:27 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:31:27 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:31:27 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:31:27 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:31:27 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:31:27 np0005645166.novalocal systemd-rc-local-generator[7785]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:31:27 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:31:29 np0005645166.novalocal sudo[7707]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:29 np0005645166.novalocal sudo[9655]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hcjmyygxbxjoqfwvclmqwpsmnocumojp ; /usr/bin/python3' Mar 12 05:31:29 np0005645166.novalocal sudo[9655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:29 np0005645166.novalocal python3[9685]: ansible-systemd Invoked with name=tuned enabled=True state=started daemon_reload=False daemon_reexec=False no_block=False force=None masked=None user=None scope=None Mar 12 05:31:29 np0005645166.novalocal systemd[1]: Starting Dynamic System Tuning Daemon... Mar 12 05:31:30 np0005645166.novalocal systemd[1]: Starting Authorization Manager... Mar 12 05:31:30 np0005645166.novalocal systemd[1]: Started Dynamic System Tuning Daemon. Mar 12 05:31:30 np0005645166.novalocal sudo[9655]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:30 np0005645166.novalocal polkitd[10918]: Started polkitd version 0.117 Mar 12 05:31:30 np0005645166.novalocal polkitd[10918]: Loading rules from directory /etc/polkit-1/rules.d Mar 12 05:31:30 np0005645166.novalocal polkitd[10918]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 12 05:31:30 np0005645166.novalocal polkitd[10918]: Finished loading, compiling and executing 2 rules Mar 12 05:31:30 np0005645166.novalocal systemd[1]: Started Authorization Manager. Mar 12 05:31:30 np0005645166.novalocal polkitd[10918]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Mar 12 05:31:30 np0005645166.novalocal sudo[11060]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ohgzatqsvjwvhypyksbiwmyaxtqejqhy ; /usr/bin/python3' Mar 12 05:31:30 np0005645166.novalocal sudo[11060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:30 np0005645166.novalocal python3[11094]: ansible-command Invoked with _raw_params=tuned-adm active warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:31:30 np0005645166.novalocal sudo[11060]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:30 np0005645166.novalocal sudo[11578]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lsjbjxbgtxeujtwtumltncgdjsqnmync ; /usr/bin/python3' Mar 12 05:31:30 np0005645166.novalocal sudo[11578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:30 np0005645166.novalocal python3[11592]: ansible-command Invoked with _raw_params=tuned-adm profile throughput-performance warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:31:31 np0005645166.novalocal sudo[11578]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:32 np0005645166.novalocal sudo[12989]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lzbuaweptuulwfripufooiszoytgkfco ; /usr/bin/python3' Mar 12 05:31:32 np0005645166.novalocal sudo[12989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:32 np0005645166.novalocal python3[13002]: ansible-file Invoked with path=/var/log/weirdo state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Mar 12 05:31:32 np0005645166.novalocal sudo[12989]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:32 np0005645166.novalocal sudo[13237]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ljbvyuttlfqcphozdcbmndwjnupaufyf ; /usr/bin/python3' Mar 12 05:31:32 np0005645166.novalocal sudo[13237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:32 np0005645166.novalocal python3[13251]: ansible-file Invoked with path=/var/log/weirdo-project state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Mar 12 05:31:32 np0005645166.novalocal sudo[13237]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:32 np0005645166.novalocal sudo[13642]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zqveexzogjintuohsusseahhrrletaox ; /usr/bin/python3' Mar 12 05:31:32 np0005645166.novalocal sudo[13642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:33 np0005645166.novalocal python3[13644]: ansible-get_url Invoked with url=https://trunk.rdoproject.org/centos9-epoxy/puppet-passed-ci/delorean.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Mar 12 05:31:33 np0005645166.novalocal sudo[13642]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:33 np0005645166.novalocal sudo[13701]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qpomltjriqathixctgjzmtdmvlpbztpt ; /usr/bin/python3' Mar 12 05:31:33 np0005645166.novalocal sudo[13701]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:33 np0005645166.novalocal python3[13710]: ansible-get_url Invoked with url=https://trunk.rdoproject.org/centos9-epoxy/delorean-deps.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Mar 12 05:31:33 np0005645166.novalocal sudo[13701]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:33 np0005645166.novalocal sudo[13745]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hzcxhhajkqphgypzigzgutyhxvsnwgxs ; /usr/bin/python3' Mar 12 05:31:33 np0005645166.novalocal sudo[13745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:33 np0005645166.novalocal python3[13747]: ansible-command Invoked with _raw_params=if [ -f /etc/ci/mirror_info.sh ]; then source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|${NODEPOOL_RDO_PROXY}|g" /etc/yum.repos.d/*.repo # For CentOS8 sed -i -e "s|http://mirror.centos.org/centos|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo # For CentOS9 sed -i -e "s|http://mirror.stream.centos.org|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo fi _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:31:33 np0005645166.novalocal sudo[13745]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:33 np0005645166.novalocal sudo[14000]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ffeoifxofkrbqpdfwaqlhaaotbtxmxwh ; /usr/bin/python3' Mar 12 05:31:33 np0005645166.novalocal sudo[14000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:34 np0005645166.novalocal python3[14015]: ansible-command Invoked with _raw_params=repoquery --disablerepo='*' --enablerepo='delorean*' -a --qf '%{sourcerpm}'|sort -u|sed 's/.src.rpm//g' >/var/log/weirdo/rdo-trunk-deps-start.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:31:36 np0005645166.novalocal sudo[14000]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:37 np0005645166.novalocal sudo[15810]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cyulssrrefzmrhdkiffzjpogryhwiqng ; /usr/bin/python3' Mar 12 05:31:37 np0005645166.novalocal sudo[15810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:37 np0005645166.novalocal python3[15823]: ansible-command Invoked with _raw_params=dnf clean all _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:31:37 np0005645166.novalocal python3[15823]: ansible-command [WARNING] Consider using the dnf module rather than running 'dnf'. If you need to use command because dnf is insufficient you can add 'warn: false' to this command task or set 'command_warnings=False' in ansible.cfg to get rid of this message. Mar 12 05:31:37 np0005645166.novalocal sudo[15810]: pam_unix(sudo:session): session closed for user root Mar 12 05:31:37 np0005645166.novalocal sudo[16200]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lcykgnkuklqvptotkpgfkyvwkennvsar ; /usr/bin/python3' Mar 12 05:31:37 np0005645166.novalocal sudo[16200]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:31:37 np0005645166.novalocal python3[16215]: ansible-dnf Invoked with name=['*'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 12 05:32:00 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:32:00 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:32:00 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Consumed 38.105s CPU time. Mar 12 05:32:00 np0005645166.novalocal systemd[1]: run-ref34c1b857e74083add63d9f5e0a1c00.service: Deactivated successfully. Mar 12 05:32:01 np0005645166.novalocal sshd-session[28150]: Invalid user joao from 175.12.108.55 port 42442 Mar 12 05:32:01 np0005645166.novalocal sshd-session[28150]: Received disconnect from 175.12.108.55 port 42442:11: Bye Bye [preauth] Mar 12 05:32:01 np0005645166.novalocal sshd-session[28150]: Disconnected from invalid user joao 175.12.108.55 port 42442 [preauth] Mar 12 05:32:05 np0005645166.novalocal sudo[16200]: pam_unix(sudo:session): session closed for user root Mar 12 05:32:06 np0005645166.novalocal sudo[28461]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qkrdfjjieiocydxsxkigiagobyvnyfvz ; /usr/bin/python3' Mar 12 05:32:06 np0005645166.novalocal sudo[28461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:32:06 np0005645166.novalocal python3[28463]: ansible-dnf Invoked with name=['gettext', 'diffstat', 'doxygen', 'patch', 'patchutils', 'subversion', 'systemtap', 'git', 'wget', 'python3-libselinux', 'python3-setuptools', 'rubygem-rexml'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 12 05:32:23 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:32:23 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:32:59 np0005645166.novalocal groupadd[45577]: group added to /etc/group: name=rtkit, GID=172 Mar 12 05:32:59 np0005645166.novalocal groupadd[45577]: group added to /etc/gshadow: name=rtkit Mar 12 05:32:59 np0005645166.novalocal groupadd[45577]: new group: name=rtkit, GID=172 Mar 12 05:32:59 np0005645166.novalocal useradd[45585]: new user: name=rtkit, UID=172, GID=172, home=/, shell=/sbin/nologin, from=none Mar 12 05:32:59 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:32:59 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:32:59 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:33:00 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:33:00 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:33:10 np0005645166.novalocal kernel: SELinux: Converting 448 SID table entries... Mar 12 05:33:10 np0005645166.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 12 05:33:10 np0005645166.novalocal kernel: SELinux: policy capability open_perms=1 Mar 12 05:33:10 np0005645166.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 12 05:33:10 np0005645166.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 12 05:33:10 np0005645166.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 12 05:33:10 np0005645166.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 12 05:33:10 np0005645166.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 12 05:33:18 np0005645166.novalocal groupadd[45656]: group added to /etc/group: name=geoclue, GID=994 Mar 12 05:33:18 np0005645166.novalocal groupadd[45656]: group added to /etc/gshadow: name=geoclue Mar 12 05:33:18 np0005645166.novalocal groupadd[45656]: new group: name=geoclue, GID=994 Mar 12 05:33:18 np0005645166.novalocal useradd[45663]: new user: name=geoclue, UID=993, GID=994, home=/var/lib/geoclue, shell=/sbin/nologin, from=none Mar 12 05:33:18 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:33:18 np0005645166.novalocal dbus-broker-launch[791]: avc: op=load_policy lsm=selinux seqno=2 res=1 Mar 12 05:33:18 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:33:18 np0005645166.novalocal polkitd[10918]: Reloading rules Mar 12 05:33:18 np0005645166.novalocal polkitd[10918]: Collecting garbage unconditionally... Mar 12 05:33:18 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:33:18 np0005645166.novalocal polkitd[10918]: Loading rules from directory /etc/polkit-1/rules.d Mar 12 05:33:18 np0005645166.novalocal polkitd[10918]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 12 05:33:18 np0005645166.novalocal polkitd[10918]: Finished loading, compiling and executing 3 rules Mar 12 05:33:18 np0005645166.novalocal polkitd[10918]: Reloading rules Mar 12 05:33:18 np0005645166.novalocal polkitd[10918]: Collecting garbage unconditionally... Mar 12 05:33:18 np0005645166.novalocal polkitd[10918]: Loading rules from directory /etc/polkit-1/rules.d Mar 12 05:33:18 np0005645166.novalocal polkitd[10918]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 12 05:33:18 np0005645166.novalocal polkitd[10918]: Finished loading, compiling and executing 3 rules Mar 12 05:33:18 np0005645166.novalocal groupadd[45675]: group added to /etc/group: name=flatpak, GID=993 Mar 12 05:33:18 np0005645166.novalocal groupadd[45675]: group added to /etc/gshadow: name=flatpak Mar 12 05:33:18 np0005645166.novalocal groupadd[45675]: new group: name=flatpak, GID=993 Mar 12 05:33:18 np0005645166.novalocal useradd[45682]: new user: name=flatpak, UID=992, GID=993, home=/, shell=/usr/sbin/nologin, from=none Mar 12 05:33:18 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:33:18 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:33:19 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:33:19 np0005645166.novalocal polkitd[10918]: Reloading rules Mar 12 05:33:19 np0005645166.novalocal polkitd[10918]: Collecting garbage unconditionally... Mar 12 05:33:19 np0005645166.novalocal polkitd[10918]: Loading rules from directory /etc/polkit-1/rules.d Mar 12 05:33:19 np0005645166.novalocal polkitd[10918]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 12 05:33:19 np0005645166.novalocal polkitd[10918]: Finished loading, compiling and executing 4 rules Mar 12 05:33:19 np0005645166.novalocal polkitd[10918]: Reloading rules Mar 12 05:33:19 np0005645166.novalocal polkitd[10918]: Collecting garbage unconditionally... Mar 12 05:33:19 np0005645166.novalocal polkitd[10918]: Loading rules from directory /etc/polkit-1/rules.d Mar 12 05:33:19 np0005645166.novalocal polkitd[10918]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 12 05:33:19 np0005645166.novalocal polkitd[10918]: Finished loading, compiling and executing 4 rules Mar 12 05:33:20 np0005645166.novalocal systemd[1]: Stopping OpenSSH server daemon... Mar 12 05:33:20 np0005645166.novalocal sshd[1014]: Received signal 15; terminating. Mar 12 05:33:20 np0005645166.novalocal systemd[1]: sshd.service: Deactivated successfully. Mar 12 05:33:20 np0005645166.novalocal systemd[1]: Stopped OpenSSH server daemon. Mar 12 05:33:20 np0005645166.novalocal systemd[1]: Stopped target sshd-keygen.target. Mar 12 05:33:20 np0005645166.novalocal systemd[1]: Stopping sshd-keygen.target... Mar 12 05:33:20 np0005645166.novalocal systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Mar 12 05:33:20 np0005645166.novalocal systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Mar 12 05:33:20 np0005645166.novalocal systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Mar 12 05:33:20 np0005645166.novalocal systemd[1]: Reached target sshd-keygen.target. Mar 12 05:33:20 np0005645166.novalocal systemd[1]: Starting OpenSSH server daemon... Mar 12 05:33:20 np0005645166.novalocal sshd[45723]: Server listening on 0.0.0.0 port 22. Mar 12 05:33:20 np0005645166.novalocal sshd[45723]: Server listening on :: port 22. Mar 12 05:33:20 np0005645166.novalocal systemd[1]: Started OpenSSH server daemon. Mar 12 05:33:20 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:33:20 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:33:21 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:33:21 np0005645166.novalocal systemd-rc-local-generator[45940]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:33:21 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:33:24 np0005645166.novalocal sudo[28461]: pam_unix(sudo:session): session closed for user root Mar 12 05:33:24 np0005645166.novalocal sudo[50669]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pdbtwbnltbeandxsllijowtmipemrclr ; /usr/bin/python3' Mar 12 05:33:24 np0005645166.novalocal sudo[50669]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:33:24 np0005645166.novalocal python3[50716]: ansible-dnf Invoked with name=['net-tools', 'lsof', 'sysstat', 'psmisc', 'dnf-utils'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 12 05:33:27 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:33:27 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:33:27 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Consumed 7.696s CPU time. Mar 12 05:33:27 np0005645166.novalocal systemd[1]: run-ra6731034997e4496865ad4b9d8e9e894.service: Deactivated successfully. Mar 12 05:33:29 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:33:29 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:33:29 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:33:29 np0005645166.novalocal systemd-rc-local-generator[53995]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:33:29 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:33:30 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:33:30 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:33:30 np0005645166.novalocal sudo[50669]: pam_unix(sudo:session): session closed for user root Mar 12 05:33:30 np0005645166.novalocal systemd[1]: run-r3c771e13ba5d4aa9ad98ab67382addbe.service: Deactivated successfully. Mar 12 05:33:30 np0005645166.novalocal sudo[54401]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cmwrsbuqgvenitqjlchzfibdyvscbihg ; /usr/bin/python3' Mar 12 05:33:30 np0005645166.novalocal sudo[54401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:33:30 np0005645166.novalocal python3[54403]: ansible-replace Invoked with dest=/usr/lib/systemd/system/sysstat-collect.timer regexp=10 replace=1 path=/usr/lib/systemd/system/sysstat-collect.timer backup=False encoding=utf-8 follow=False unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Mar 12 05:33:30 np0005645166.novalocal sudo[54401]: pam_unix(sudo:session): session closed for user root Mar 12 05:33:30 np0005645166.novalocal sudo[54410]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fnpxermdbpwaefjbarpltrojziamdhwu ; /usr/bin/python3' Mar 12 05:33:30 np0005645166.novalocal sudo[54410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:33:31 np0005645166.novalocal python3[54412]: ansible-systemd Invoked with name=sysstat enabled=True daemon_reload=True state=started daemon_reexec=False no_block=False force=None masked=None user=None scope=None Mar 12 05:33:31 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:33:31 np0005645166.novalocal systemd-rc-local-generator[54438]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:33:31 np0005645166.novalocal systemd[1]: Started Run system activity accounting tool every 1 minutes. Mar 12 05:33:31 np0005645166.novalocal systemd[1]: Started Generate summary of yesterday's process accounting. Mar 12 05:33:31 np0005645166.novalocal systemd[1]: Starting Resets System Activity Logs... Mar 12 05:33:31 np0005645166.novalocal systemd[1]: Finished Resets System Activity Logs. Mar 12 05:33:31 np0005645166.novalocal sudo[54410]: pam_unix(sudo:session): session closed for user root Mar 12 05:33:31 np0005645166.novalocal sudo[54469]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ffjpmorlgrqshwxpplfmhfjlxahqsswh ; /usr/bin/python3' Mar 12 05:33:31 np0005645166.novalocal sudo[54469]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:33:31 np0005645166.novalocal python3[54471]: ansible-lineinfile Invoked with dest=/etc/hosts line=127.0.0.1 np0005645166 np0005645166.novalocal state=present path=/etc/hosts backrefs=False create=False backup=False firstmatch=False follow=False unsafe_writes=False regexp=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Mar 12 05:33:31 np0005645166.novalocal sudo[54469]: pam_unix(sudo:session): session closed for user root Mar 12 05:33:31 np0005645166.novalocal sudo[54478]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zdaiionzrrfdmsxcmtgytkjhwznaockv ; /usr/bin/python3' Mar 12 05:33:31 np0005645166.novalocal sudo[54478]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:33:32 np0005645166.novalocal python3[54480]: ansible-dnf Invoked with name=['libxml2-devel', 'libxslt-devel', 'ruby-devel', 'rubygems', 'qemu-img'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 12 05:33:33 np0005645166.novalocal sshd-session[54481]: Connection closed by authenticating user root 45.129.231.10 port 40844 [preauth] Mar 12 05:33:33 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:33:33 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:33:34 np0005645166.novalocal sudo[54478]: pam_unix(sudo:session): session closed for user root Mar 12 05:33:34 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:33:34 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:33:34 np0005645166.novalocal systemd[1]: run-r2625fd12a4d94d2495a93f072ceeb89e.service: Deactivated successfully. Mar 12 05:33:34 np0005645166.novalocal sudo[54818]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-sqdgyciqwthdkdpfaussucgbaxyyqmrq ; /usr/bin/python3' Mar 12 05:33:34 np0005645166.novalocal sudo[54818]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:33:34 np0005645166.novalocal python3[54820]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Mar 12 05:33:34 np0005645166.novalocal python3[54820]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Mar 12 05:33:34 np0005645166.novalocal sudo[54818]: pam_unix(sudo:session): session closed for user root Mar 12 05:33:34 np0005645166.novalocal sudo[54831]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cmfrinyedaivmtrecgzqrasudlenfldh ; /usr/bin/python3' Mar 12 05:33:34 np0005645166.novalocal sudo[54831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:33:34 np0005645166.novalocal python3[54833]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Mar 12 05:33:34 np0005645166.novalocal python3[54833]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Mar 12 05:33:34 np0005645166.novalocal sudo[54831]: pam_unix(sudo:session): session closed for user root Mar 12 05:33:35 np0005645166.novalocal sudo[54842]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-byvyhacpngniepubomyjhkibzgtpihzz ; /usr/bin/python3' Mar 12 05:33:35 np0005645166.novalocal sudo[54842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:33:35 np0005645166.novalocal python3[54844]: ansible-git Invoked with repo=https://review.opendev.org/openstack/puppet-openstack-integration dest=/tmp/puppet-openstack version=stable/2025.1 force=True remote=origin clone=True update=True verify_commit=False gpg_whitelist=[] accept_hostkey=False bare=False recursive=True track_submodules=False refspec=None reference=None depth=None key_file=None ssh_opts=None executable=None umask=None archive=None separate_git_dir=None Mar 12 05:33:36 np0005645166.novalocal sudo[54842]: pam_unix(sudo:session): session closed for user root Mar 12 05:33:36 np0005645166.novalocal sudo[54875]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vsklzwfmqgiiwrxvmodvplshuyewctqj ; /usr/bin/python3' Mar 12 05:33:36 np0005645166.novalocal sudo[54875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:33:36 np0005645166.novalocal python3[54877]: ansible-file Invoked with path=/tmp/puppet-openstack/.bundled_gems state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Mar 12 05:33:36 np0005645166.novalocal sudo[54875]: pam_unix(sudo:session): session closed for user root Mar 12 05:33:36 np0005645166.novalocal sudo[54884]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vzywfdihlbiuhyavnwtrtlmpcofcptyl ; /usr/bin/python3' Mar 12 05:33:36 np0005645166.novalocal sudo[54884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:33:36 np0005645166.novalocal python3[54886]: ansible-command Invoked with _raw_params=grep ^mod /tmp/puppet-openstack/Puppetfile |egrep -v 'cloudkitty|monasca|apt|python|postgresql|ssh_keygen|git_resource' |awk '{print $2}'|sed "s/[,']//g"|while read p; do printf puppet-$p,; done|sed 's/,$//' _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 12 05:33:36 np0005645166.novalocal sudo[54884]: pam_unix(sudo:session): session closed for user root Mar 12 05:33:36 np0005645166.novalocal sudo[54901]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ddznprnzyctppnoqebjtxfgvuwcabost ; /usr/bin/python3' Mar 12 05:33:36 np0005645166.novalocal sudo[54901]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:33:37 np0005645166.novalocal python3[54903]: ansible-dnf Invoked with name=['puppet-aodh', 'puppet-barbican', 'puppet-ceilometer', 'puppet-ceph', 'puppet-cinder', 'puppet-designate', 'puppet-glance', 'puppet-gnocchi', 'puppet-heat', 'puppet-horizon', 'puppet-ironic', 'puppet-keystone', 'puppet-magnum', 'puppet-manila', 'puppet-mistral', 'puppet-neutron', 'puppet-nova', 'puppet-octavia', 'puppet-openstack_extras', 'puppet-openstacklib', 'puppet-oslo', 'puppet-ovn', 'puppet-placement', 'puppet-swift', 'puppet-tempest', 'puppet-trove', 'puppet-vswitch', 'puppet-vitrage', 'puppet-watcher', 'puppet-zaqar', 'puppet-kmod', 'puppet-apache', 'puppet-concat', 'puppet-firewall', 'puppet-inifile', 'puppet-mysql', 'puppet-rabbitmq', 'puppet-rsync', 'puppet-stdlib', 'puppet-vcsrepo', 'puppet-xinetd', 'puppet-memcached', 'puppet-dns', 'puppet-archive', 'puppet-redis', 'puppet-systemd'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 12 05:33:39 np0005645166.novalocal groupadd[54913]: group added to /etc/group: name=puppet, GID=52 Mar 12 05:33:39 np0005645166.novalocal groupadd[54913]: group added to /etc/gshadow: name=puppet Mar 12 05:33:39 np0005645166.novalocal groupadd[54913]: new group: name=puppet, GID=52 Mar 12 05:33:40 np0005645166.novalocal useradd[54920]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Mar 12 05:33:46 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:33:46 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:33:46 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:33:46 np0005645166.novalocal systemd-rc-local-generator[54957]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:33:46 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:33:47 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:33:47 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:33:47 np0005645166.novalocal systemd[1]: run-r7e16cc82feff46f9ac4e71bfe424e323.service: Deactivated successfully. Mar 12 05:33:47 np0005645166.novalocal sudo[54901]: pam_unix(sudo:session): session closed for user root Mar 12 05:33:47 np0005645166.novalocal sudo[55667]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pwnbvxeqclzcjlezlscsslrhmxwushoa ; /usr/bin/python3' Mar 12 05:33:47 np0005645166.novalocal sudo[55667]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:33:47 np0005645166.novalocal python3[55669]: ansible-file Invoked with path=/etc/puppet/environments state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Mar 12 05:33:47 np0005645166.novalocal sudo[55667]: pam_unix(sudo:session): session closed for user root Mar 12 05:33:47 np0005645166.novalocal sudo[55676]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uvjiqmkobyzeihqzyipgncdmbbqkfefx ; /usr/bin/python3' Mar 12 05:33:47 np0005645166.novalocal sudo[55676]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:33:48 np0005645166.novalocal python3[55678]: ansible-file Invoked with path=/usr/zuul-env/bin/zuul-cloner state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Mar 12 05:33:48 np0005645166.novalocal sudo[55676]: pam_unix(sudo:session): session closed for user root Mar 12 05:33:48 np0005645166.novalocal sudo[55685]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hndtbsxemznwleagbxvfhgwueblmczso ; MANAGE_REPOS=false SCENARIO=scenario005 GEM_HOME=/tmp/puppet-openstack/.bundled_gems TEMPEST_VERSION=\'\' WORKSPACE=/var/log/weirdo-project TEMPEST_FROM_SOURCE=false PUPPETFILE_DIR=/etc/puppet/modules PUPPET_PKG=puppet PUPPET_ARGS=--modulepath=/usr/share/openstack-puppet/modules:/etc/puppet/modules SWAP_SIZE_GB=8 /usr/bin/python3' Mar 12 05:33:48 np0005645166.novalocal sudo[55685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:33:48 np0005645166.novalocal python3[55687]: ansible-command Invoked with chdir=/tmp/puppet-openstack _raw_params=./run_tests.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None creates=None removes=None stdin=None Mar 12 05:34:21 np0005645166.novalocal systemd[4794]: Created slice User Background Tasks Slice. Mar 12 05:34:21 np0005645166.novalocal systemd[4794]: Starting Cleanup of User's Temporary Files and Directories... Mar 12 05:34:21 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:34:21 np0005645166.novalocal systemd[4794]: Finished Cleanup of User's Temporary Files and Directories. Mar 12 05:34:21 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:34:21 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:34:21 np0005645166.novalocal sshd-session[55720]: Invalid user sky from 89.110.93.178 port 55278 Mar 12 05:34:21 np0005645166.novalocal sshd-session[55720]: Received disconnect from 89.110.93.178 port 55278:11: Bye Bye [preauth] Mar 12 05:34:21 np0005645166.novalocal sshd-session[55720]: Disconnected from invalid user sky 89.110.93.178 port 55278 [preauth] Mar 12 05:34:33 np0005645166.novalocal kernel: Adding 8388604k swap on /swapfile. Priority:-2 extents:5 across:13410216k Mar 12 05:34:56 np0005645166.novalocal kernel: SELinux: Converting 479 SID table entries... Mar 12 05:34:56 np0005645166.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 12 05:34:56 np0005645166.novalocal kernel: SELinux: policy capability open_perms=1 Mar 12 05:34:56 np0005645166.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 12 05:34:56 np0005645166.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 12 05:34:56 np0005645166.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 12 05:34:56 np0005645166.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 12 05:34:56 np0005645166.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 12 05:34:58 np0005645166.novalocal dbus-broker-launch[791]: avc: op=load_policy lsm=selinux seqno=3 res=1 Mar 12 05:34:58 np0005645166.novalocal systemd[1]: Starting PCP Reboot Initialization Helper Service... Mar 12 05:34:58 np0005645166.novalocal systemd[1]: Finished PCP Reboot Initialization Helper Service. Mar 12 05:34:58 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:34:58 np0005645166.novalocal systemd-rc-local-generator[56376]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:34:59 np0005645166.novalocal sshd-session[56558]: Invalid user zhj from 165.227.152.183 port 40570 Mar 12 05:34:59 np0005645166.novalocal sshd-session[56558]: Received disconnect from 165.227.152.183 port 40570:11: Bye Bye [preauth] Mar 12 05:34:59 np0005645166.novalocal sshd-session[56558]: Disconnected from invalid user zhj 165.227.152.183 port 40570 [preauth] Mar 12 05:35:05 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:35:05 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:35:05 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:35:05 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:35:05 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:35:07 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:35:07 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:35:07 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:35:07 np0005645166.novalocal systemd-rc-local-generator[56682]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:35:08 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:35:11 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:35:11 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:35:11 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Consumed 3.926s CPU time. Mar 12 05:35:11 np0005645166.novalocal systemd[1]: run-r06764c260cf24fb69a6f2e071a9f7a86.service: Deactivated successfully. Mar 12 05:35:23 np0005645166.novalocal sshd-session[60861]: Invalid user real from 14.103.203.191 port 37068 Mar 12 05:35:23 np0005645166.novalocal sshd-session[60861]: Received disconnect from 14.103.203.191 port 37068:11: Bye Bye [preauth] Mar 12 05:35:23 np0005645166.novalocal sshd-session[60861]: Disconnected from invalid user real 14.103.203.191 port 37068 [preauth] Mar 12 05:35:48 np0005645166.novalocal sshd-session[61779]: Invalid user mgmt from 152.32.129.186 port 62980 Mar 12 05:35:48 np0005645166.novalocal sshd-session[61779]: Received disconnect from 152.32.129.186 port 62980:11: Bye Bye [preauth] Mar 12 05:35:48 np0005645166.novalocal sshd-session[61779]: Disconnected from invalid user mgmt 152.32.129.186 port 62980 [preauth] Mar 12 05:36:07 np0005645166.novalocal dbus-broker-launch[791]: avc: op=setenforce lsm=selinux enforcing=0 res=1 Mar 12 05:36:07 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:36:07 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:36:07 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:36:26 np0005645166.novalocal setsebool[62828]: The virt_use_nfs policy boolean was changed to 1 by root Mar 12 05:36:26 np0005645166.novalocal setsebool[62828]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Mar 12 05:36:37 np0005645166.novalocal kernel: SELinux: Converting 517 SID table entries... Mar 12 05:36:37 np0005645166.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 12 05:36:37 np0005645166.novalocal kernel: SELinux: policy capability open_perms=1 Mar 12 05:36:37 np0005645166.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 12 05:36:37 np0005645166.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 12 05:36:37 np0005645166.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 12 05:36:37 np0005645166.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 12 05:36:37 np0005645166.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 12 05:37:21 np0005645166.novalocal dbus-broker-launch[791]: avc: op=load_policy lsm=selinux seqno=5 res=1 Mar 12 05:37:21 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:37:21 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:37:21 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:37:33 np0005645166.novalocal kernel: SELinux: Converting 2742 SID table entries... Mar 12 05:37:33 np0005645166.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 12 05:37:33 np0005645166.novalocal kernel: SELinux: policy capability open_perms=1 Mar 12 05:37:33 np0005645166.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 12 05:37:33 np0005645166.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 12 05:37:33 np0005645166.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 12 05:37:33 np0005645166.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 12 05:37:33 np0005645166.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 12 05:37:57 np0005645166.novalocal sshd-session[63797]: Received disconnect from 165.227.152.183 port 56970:11: Bye Bye [preauth] Mar 12 05:37:57 np0005645166.novalocal sshd-session[63797]: Disconnected from authenticating user root 165.227.152.183 port 56970 [preauth] Mar 12 05:38:16 np0005645166.novalocal dbus-broker-launch[791]: avc: op=load_policy lsm=selinux seqno=7 res=1 Mar 12 05:38:16 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:38:16 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:38:16 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:38:16 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:38:16 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:38:17 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:38:17 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:38:17 np0005645166.novalocal systemd[1]: run-raee2127da47f4b47b0288a5e423b25e8.service: Deactivated successfully. Mar 12 05:38:29 np0005645166.novalocal kernel: SELinux: Converting 2742 SID table entries... Mar 12 05:38:29 np0005645166.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 12 05:38:29 np0005645166.novalocal kernel: SELinux: policy capability open_perms=1 Mar 12 05:38:29 np0005645166.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 12 05:38:29 np0005645166.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 12 05:38:29 np0005645166.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 12 05:38:29 np0005645166.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 12 05:38:29 np0005645166.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 12 05:38:29 np0005645166.novalocal groupadd[63905]: group added to /etc/group: name=memcached, GID=989 Mar 12 05:38:29 np0005645166.novalocal groupadd[63905]: group added to /etc/gshadow: name=memcached Mar 12 05:38:29 np0005645166.novalocal groupadd[63905]: new group: name=memcached, GID=989 Mar 12 05:38:29 np0005645166.novalocal useradd[63912]: new user: name=memcached, UID=989, GID=989, home=/, shell=/sbin/nologin, from=none Mar 12 05:38:30 np0005645166.novalocal dbus-broker-launch[791]: avc: op=load_policy lsm=selinux seqno=8 res=1 Mar 12 05:38:30 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:38:30 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:38:30 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:38:30 np0005645166.novalocal systemd-rc-local-generator[64345]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:38:31 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:38:32 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:38:32 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:38:32 np0005645166.novalocal systemd[1]: run-r0b6897e932ec4b51a995c822b99c7837.service: Deactivated successfully. Mar 12 05:38:32 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:38:32 np0005645166.novalocal systemd-rc-local-generator[64534]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:38:32 np0005645166.novalocal systemd[1]: Started memcached daemon. Mar 12 05:38:32 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:38:32 np0005645166.novalocal systemd-rc-local-generator[64593]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:38:33 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:38:33 np0005645166.novalocal systemd-rc-local-generator[64632]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:38:39 np0005645166.novalocal sshd-session[64691]: Invalid user zhj from 152.32.129.186 port 25978 Mar 12 05:38:39 np0005645166.novalocal sshd-session[64691]: Received disconnect from 152.32.129.186 port 25978:11: Bye Bye [preauth] Mar 12 05:38:39 np0005645166.novalocal sshd-session[64691]: Disconnected from invalid user zhj 152.32.129.186 port 25978 [preauth] Mar 12 05:38:40 np0005645166.novalocal groupadd[64740]: group added to /etc/group: name=epmd, GID=988 Mar 12 05:38:40 np0005645166.novalocal groupadd[64740]: group added to /etc/gshadow: name=epmd Mar 12 05:38:40 np0005645166.novalocal groupadd[64740]: new group: name=epmd, GID=988 Mar 12 05:38:40 np0005645166.novalocal useradd[64747]: new user: name=epmd, UID=988, GID=988, home=/dev/null, shell=/sbin/nologin, from=none Mar 12 05:38:41 np0005645166.novalocal groupadd[64756]: group added to /etc/group: name=rabbitmq, GID=987 Mar 12 05:38:41 np0005645166.novalocal groupadd[64756]: group added to /etc/gshadow: name=rabbitmq Mar 12 05:38:41 np0005645166.novalocal groupadd[64756]: new group: name=rabbitmq, GID=987 Mar 12 05:38:41 np0005645166.novalocal useradd[64763]: new user: name=rabbitmq, UID=987, GID=987, home=/var/lib/rabbitmq, shell=/sbin/nologin, from=none Mar 12 05:38:42 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:38:43 np0005645166.novalocal systemd-rc-local-generator[64791]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:38:43 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:38:43 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:38:43 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:38:43 np0005645166.novalocal systemd-rc-local-generator[64842]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:38:43 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:38:44 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:38:44 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:38:44 np0005645166.novalocal systemd[1]: run-rdc2bf89cd5d4437b88dbe5e042c94651.service: Deactivated successfully. Mar 12 05:38:47 np0005645166.novalocal runuser[65614]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:38:47 np0005645166.novalocal runuser[65614]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:39:02 np0005645166.novalocal kernel: SELinux: Converting 2748 SID table entries... Mar 12 05:39:02 np0005645166.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 12 05:39:02 np0005645166.novalocal kernel: SELinux: policy capability open_perms=1 Mar 12 05:39:02 np0005645166.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 12 05:39:02 np0005645166.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 12 05:39:02 np0005645166.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 12 05:39:02 np0005645166.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 12 05:39:02 np0005645166.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 12 05:39:02 np0005645166.novalocal dbus-broker-launch[791]: avc: op=load_policy lsm=selinux seqno=9 res=1 Mar 12 05:39:02 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:39:02 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:39:02 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:39:02 np0005645166.novalocal groupadd[66125]: group added to /etc/group: name=mysql, GID=27 Mar 12 05:39:02 np0005645166.novalocal groupadd[66125]: group added to /etc/gshadow: name=mysql Mar 12 05:39:02 np0005645166.novalocal groupadd[66125]: new group: name=mysql, GID=27 Mar 12 05:39:02 np0005645166.novalocal useradd[66132]: new user: name=mysql, UID=27, GID=27, home=/var/lib/mysql, shell=/sbin/nologin, from=none Mar 12 05:39:03 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:39:03 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:39:03 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:39:04 np0005645166.novalocal systemd-rc-local-generator[66611]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:39:04 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:39:07 np0005645166.novalocal groupadd[69640]: group added to /etc/group: name=redis, GID=986 Mar 12 05:39:07 np0005645166.novalocal groupadd[69640]: group added to /etc/gshadow: name=redis Mar 12 05:39:07 np0005645166.novalocal groupadd[69640]: new group: name=redis, GID=986 Mar 12 05:39:07 np0005645166.novalocal useradd[69702]: new user: name=redis, UID=986, GID=986, home=/var/lib/redis, shell=/sbin/nologin, from=none Mar 12 05:39:08 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:39:08 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:39:08 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.459s CPU time. Mar 12 05:39:08 np0005645166.novalocal systemd[1]: run-r2937058761cf42ce8e9f34774125f106.service: Deactivated successfully. Mar 12 05:39:08 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:39:08 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:39:08 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:39:08 np0005645166.novalocal systemd-rc-local-generator[70018]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:39:08 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:39:08 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:39:08 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:39:08 np0005645166.novalocal systemd[1]: run-ra5e8561db3bd40379c57902050b75461.service: Deactivated successfully. Mar 12 05:39:20 np0005645166.novalocal kernel: SELinux: Converting 2751 SID table entries... Mar 12 05:39:20 np0005645166.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 12 05:39:20 np0005645166.novalocal kernel: SELinux: policy capability open_perms=1 Mar 12 05:39:20 np0005645166.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 12 05:39:20 np0005645166.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 12 05:39:20 np0005645166.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 12 05:39:20 np0005645166.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 12 05:39:20 np0005645166.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 12 05:39:21 np0005645166.novalocal groupadd[70069]: group added to /etc/group: name=unbound, GID=985 Mar 12 05:39:21 np0005645166.novalocal groupadd[70069]: group added to /etc/gshadow: name=unbound Mar 12 05:39:21 np0005645166.novalocal groupadd[70069]: new group: name=unbound, GID=985 Mar 12 05:39:21 np0005645166.novalocal useradd[70076]: new user: name=unbound, UID=985, GID=985, home=/var/lib/unbound, shell=/sbin/nologin, from=none Mar 12 05:39:21 np0005645166.novalocal dbus-broker-launch[791]: avc: op=load_policy lsm=selinux seqno=10 res=1 Mar 12 05:39:21 np0005645166.novalocal systemd[1]: Started daily update of the root trust anchor for DNSSEC. Mar 12 05:39:21 np0005645166.novalocal groupadd[70089]: group added to /etc/group: name=openvswitch, GID=984 Mar 12 05:39:21 np0005645166.novalocal groupadd[70089]: group added to /etc/gshadow: name=openvswitch Mar 12 05:39:21 np0005645166.novalocal groupadd[70089]: new group: name=openvswitch, GID=984 Mar 12 05:39:21 np0005645166.novalocal useradd[70096]: new user: name=openvswitch, UID=984, GID=984, home=/, shell=/sbin/nologin, from=none Mar 12 05:39:21 np0005645166.novalocal groupadd[70104]: group added to /etc/group: name=hugetlbfs, GID=983 Mar 12 05:39:21 np0005645166.novalocal groupadd[70104]: group added to /etc/gshadow: name=hugetlbfs Mar 12 05:39:21 np0005645166.novalocal groupadd[70104]: new group: name=hugetlbfs, GID=983 Mar 12 05:39:21 np0005645166.novalocal usermod[70112]: add 'openvswitch' to group 'hugetlbfs' Mar 12 05:39:21 np0005645166.novalocal usermod[70112]: add 'openvswitch' to shadow group 'hugetlbfs' Mar 12 05:39:23 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:39:23 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:39:23 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:39:23 np0005645166.novalocal systemd-rc-local-generator[70592]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:39:23 np0005645166.novalocal systemd-sysv-generator[70596]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:39:24 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:39:24 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:39:24 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:39:24 np0005645166.novalocal systemd[1]: run-ra415cd6b25d84172ad5ac545e05412ac.service: Deactivated successfully. Mar 12 05:39:25 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:39:25 np0005645166.novalocal systemd-rc-local-generator[71281]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:39:25 np0005645166.novalocal systemd-sysv-generator[71284]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:39:25 np0005645166.novalocal systemd[1]: Starting Open vSwitch Database Unit... Mar 12 05:39:25 np0005645166.novalocal chown[71299]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Mar 12 05:39:25 np0005645166.novalocal ovs-ctl[71304]: /etc/openvswitch/conf.db does not exist ... (warning). Mar 12 05:39:25 np0005645166.novalocal ovs-ctl[71304]: Creating empty database /etc/openvswitch/conf.db [ OK ] Mar 12 05:39:25 np0005645166.novalocal ovs-ctl[71304]: Starting ovsdb-server [ OK ] Mar 12 05:39:25 np0005645166.novalocal ovs-vsctl[71353]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.8.0 Mar 12 05:39:25 np0005645166.novalocal ovs-vsctl[71373]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.4.4-99.el9s "external-ids:system-id=\"b36be248-7982-4c3c-9791-8269f52c446d\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"centos\"" "system-version=\"9\"" Mar 12 05:39:25 np0005645166.novalocal ovs-ctl[71304]: Configuring Open vSwitch system IDs [ OK ] Mar 12 05:39:25 np0005645166.novalocal ovs-vsctl[71378]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005645166 Mar 12 05:39:25 np0005645166.novalocal ovs-ctl[71304]: Enabling remote OVSDB managers [ OK ] Mar 12 05:39:25 np0005645166.novalocal systemd[1]: Started Open vSwitch Database Unit. Mar 12 05:39:25 np0005645166.novalocal systemd[1]: Starting Open vSwitch Delete Transient Ports... Mar 12 05:39:25 np0005645166.novalocal systemd[1]: Finished Open vSwitch Delete Transient Ports. Mar 12 05:39:25 np0005645166.novalocal systemd[1]: Starting Open vSwitch Forwarding Unit... Mar 12 05:39:25 np0005645166.novalocal kernel: openvswitch: Open vSwitch switching datapath Mar 12 05:39:25 np0005645166.novalocal ovs-ctl[71423]: Inserting openvswitch module [ OK ] Mar 12 05:39:25 np0005645166.novalocal ovs-ctl[71392]: Starting ovs-vswitchd [ OK ] Mar 12 05:39:25 np0005645166.novalocal ovs-vsctl[71439]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005645166 Mar 12 05:39:25 np0005645166.novalocal ovs-ctl[71392]: Enabling remote OVSDB managers [ OK ] Mar 12 05:39:25 np0005645166.novalocal systemd[1]: Started Open vSwitch Forwarding Unit. Mar 12 05:39:25 np0005645166.novalocal systemd[1]: Starting Open vSwitch... Mar 12 05:39:25 np0005645166.novalocal systemd[1]: Finished Open vSwitch. Mar 12 05:39:25 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:39:26 np0005645166.novalocal systemd-rc-local-generator[71465]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:39:26 np0005645166.novalocal systemd-sysv-generator[71468]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:39:26 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:39:26 np0005645166.novalocal systemd-sysv-generator[71507]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:39:26 np0005645166.novalocal systemd-rc-local-generator[71504]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:39:26 np0005645166.novalocal ovs-vsctl[71527]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl add-br br-ex Mar 12 05:39:26 np0005645166.novalocal kernel: ovs-system: entered promiscuous mode Mar 12 05:39:26 np0005645166.novalocal NetworkManager[869]: [1773308366.5946] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Mar 12 05:39:26 np0005645166.novalocal NetworkManager[869]: [1773308366.5959] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/3) Mar 12 05:39:26 np0005645166.novalocal kernel: Timeout policy base is empty Mar 12 05:39:26 np0005645166.novalocal systemd-udevd[71364]: Network interface NamePolicy= disabled on kernel command line. Mar 12 05:39:26 np0005645166.novalocal NetworkManager[869]: [1773308366.6165] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Mar 12 05:39:26 np0005645166.novalocal kernel: br-ex: entered promiscuous mode Mar 12 05:39:26 np0005645166.novalocal NetworkManager[869]: [1773308366.6174] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Mar 12 05:39:26 np0005645166.novalocal NetworkManager[869]: [1773308366.6352] device (br-ex): carrier: link connected Mar 12 05:39:26 np0005645166.novalocal NetworkManager[869]: [1773308366.6606] manager: (loop1): new Dummy device (/org/freedesktop/NetworkManager/Devices/5) Mar 12 05:39:26 np0005645166.novalocal systemd-udevd[71551]: Network interface NamePolicy= disabled on kernel command line. Mar 12 05:39:26 np0005645166.novalocal NetworkManager[869]: [1773308366.7967] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71562 uid=0 result="success" Mar 12 05:39:26 np0005645166.novalocal ifdown[71563]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Mar 12 05:39:26 np0005645166.novalocal ifdown[71564]: 'network-scripts' will be removed from distribution in near future. Mar 12 05:39:26 np0005645166.novalocal ifdown[71565]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Mar 12 05:39:26 np0005645166.novalocal NetworkManager[869]: [1773308366.8222] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71571 uid=0 result="success" Mar 12 05:39:26 np0005645166.novalocal NetworkManager[869]: [1773308366.8522] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71579 uid=0 result="success" Mar 12 05:39:26 np0005645166.novalocal NetworkManager[869]: [1773308366.8749] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71588 uid=0 result="success" Mar 12 05:39:26 np0005645166.novalocal NetworkManager[869]: [1773308366.9403] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71611 uid=0 result="success" Mar 12 05:39:26 np0005645166.novalocal ovs-vsctl[71616]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-br br-ex Mar 12 05:39:26 np0005645166.novalocal kernel: br-ex: left promiscuous mode Mar 12 05:39:26 np0005645166.novalocal kernel: ovs-system: left promiscuous mode Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.0266] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71634 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal ifdown[71638]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Mar 12 05:39:27 np0005645166.novalocal ifdown[71639]: 'network-scripts' will be removed from distribution in near future. Mar 12 05:39:27 np0005645166.novalocal ifdown[71640]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.0510] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71646 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.0798] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71657 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.1063] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71669 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.1738] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71695 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal ovs-vsctl[71703]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.2296] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71710 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal ifup[71714]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Mar 12 05:39:27 np0005645166.novalocal ifup[71715]: 'network-scripts' will be removed from distribution in near future. Mar 12 05:39:27 np0005645166.novalocal ifup[71716]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.2588] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71722 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.3040] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71734 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal ifup[71735]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Mar 12 05:39:27 np0005645166.novalocal ifup[71736]: 'network-scripts' will be removed from distribution in near future. Mar 12 05:39:27 np0005645166.novalocal ifup[71737]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.3333] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71743 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal ovs-vsctl[71745]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Mar 12 05:39:27 np0005645166.novalocal kernel: ovs-system: entered promiscuous mode Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.3517] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Mar 12 05:39:27 np0005645166.novalocal kernel: No such timeout policy "ovs_test_tp" Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.3528] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Mar 12 05:39:27 np0005645166.novalocal systemd-udevd[71550]: Network interface NamePolicy= disabled on kernel command line. Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.3563] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Mar 12 05:39:27 np0005645166.novalocal kernel: br-ex: entered promiscuous mode Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.3573] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.3807] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71766 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.4132] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71777 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.4628] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71795 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal ovs-vsctl[71815]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 -- add-port br-ex loop1 Mar 12 05:39:27 np0005645166.novalocal kernel: loop1: entered promiscuous mode Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.5557] device (loop1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.5570] device (loop1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.5768] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71822 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal ifup[71823]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Mar 12 05:39:27 np0005645166.novalocal ifup[71824]: 'network-scripts' will be removed from distribution in near future. Mar 12 05:39:27 np0005645166.novalocal ifup[71825]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.5997] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71831 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal ovs-vsctl[71835]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.6524] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71842 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal ifup[71843]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Mar 12 05:39:27 np0005645166.novalocal ifup[71844]: 'network-scripts' will be removed from distribution in near future. Mar 12 05:39:27 np0005645166.novalocal ifup[71845]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.6812] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71851 uid=0 result="success" Mar 12 05:39:27 np0005645166.novalocal ovs-vsctl[71855]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Mar 12 05:39:27 np0005645166.novalocal NetworkManager[869]: [1773308367.7239] device (br-ex): carrier: link connected Mar 12 05:39:30 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:39:30 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:39:30 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:39:30 np0005645166.novalocal systemd-sysv-generator[71930]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:39:30 np0005645166.novalocal systemd-rc-local-generator[71926]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:39:30 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:39:30 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:39:30 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:39:30 np0005645166.novalocal systemd[1]: run-r9b8585485a88459e80610ebb94fdec2b.service: Deactivated successfully. Mar 12 05:39:33 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:39:33 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:39:33 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:39:33 np0005645166.novalocal systemd-rc-local-generator[72378]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:39:33 np0005645166.novalocal systemd-sysv-generator[72381]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:39:33 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:39:33 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:39:33 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:39:33 np0005645166.novalocal systemd[1]: run-rbeecc75d34014873ab7eb02951680ad6.service: Deactivated successfully. Mar 12 05:39:34 np0005645166.novalocal ovs-vsctl[72465]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:[::1]:6642 Mar 12 05:39:34 np0005645166.novalocal ovs-vsctl[72467]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Mar 12 05:39:34 np0005645166.novalocal ovs-vsctl[72469]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=::1 Mar 12 05:39:34 np0005645166.novalocal ovs-vsctl[72472]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005645166.novalocal Mar 12 05:39:34 np0005645166.novalocal ovs-vsctl[72474]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Mar 12 05:39:34 np0005645166.novalocal ovs-vsctl[72476]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Mar 12 05:39:35 np0005645166.novalocal ovs-vsctl[72478]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=false Mar 12 05:39:35 np0005645166.novalocal ovs-vsctl[72480]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Mar 12 05:39:35 np0005645166.novalocal ovs-vsctl[72484]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-cms-options=enable-chassis-as-gw Mar 12 05:39:35 np0005645166.novalocal ovs-vsctl[72488]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=external:br-ex Mar 12 05:39:35 np0005645166.novalocal ovs-vsctl[72492]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Mar 12 05:39:45 np0005645166.novalocal groupadd[72514]: group added to /etc/group: name=keystone, GID=163 Mar 12 05:39:45 np0005645166.novalocal groupadd[72514]: group added to /etc/gshadow: name=keystone Mar 12 05:39:45 np0005645166.novalocal groupadd[72514]: new group: name=keystone, GID=163 Mar 12 05:39:45 np0005645166.novalocal useradd[72521]: new user: name=keystone, UID=163, GID=163, home=/var/lib/keystone, shell=/sbin/nologin, from=none Mar 12 05:39:45 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:39:45 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:39:46 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:39:46 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:39:46 np0005645166.novalocal systemd[1]: run-rb207c70e1a8d43e8a928c9ee38132aa7.service: Deactivated successfully. Mar 12 05:39:48 np0005645166.novalocal sshd-session[72694]: Received disconnect from 165.227.152.183 port 54892:11: Bye Bye [preauth] Mar 12 05:39:48 np0005645166.novalocal sshd-session[72694]: Disconnected from authenticating user root 165.227.152.183 port 54892 [preauth] Mar 12 05:39:52 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:39:52 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:39:52 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:39:52 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:39:52 np0005645166.novalocal systemd[1]: run-r10276215b38f4dd19b85861ceb96cf5a.service: Deactivated successfully. Mar 12 05:39:58 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:39:59 np0005645166.novalocal systemd-rc-local-generator[72925]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:39:59 np0005645166.novalocal systemd-sysv-generator[72929]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:39:59 np0005645166.novalocal systemd[1]: Listening on Device-mapper event daemon FIFOs. Mar 12 05:39:59 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:39:59 np0005645166.novalocal systemd-rc-local-generator[72959]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:39:59 np0005645166.novalocal systemd-sysv-generator[72963]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:39:59 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:39:59 np0005645166.novalocal systemd-rc-local-generator[73003]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:39:59 np0005645166.novalocal systemd-sysv-generator[73006]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:40:00 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:40:00 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:40:00 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:40:00 np0005645166.novalocal systemd-logind[814]: Watching system buttons on /dev/input/event0 (Power Button) Mar 12 05:40:00 np0005645166.novalocal systemd-logind[814]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Mar 12 05:40:02 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:40:02 np0005645166.novalocal systemd-rc-local-generator[73111]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:40:02 np0005645166.novalocal systemd-sysv-generator[73114]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:40:02 np0005645166.novalocal systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Mar 12 05:40:02 np0005645166.novalocal systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Mar 12 05:40:02 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:40:02 np0005645166.novalocal systemd-rc-local-generator[73152]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:40:02 np0005645166.novalocal systemd-sysv-generator[73157]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:40:02 np0005645166.novalocal systemd[1]: Listening on LVM2 poll daemon socket. Mar 12 05:40:05 np0005645166.novalocal groupadd[73176]: group added to /etc/group: name=cinder, GID=165 Mar 12 05:40:05 np0005645166.novalocal groupadd[73176]: group added to /etc/gshadow: name=cinder Mar 12 05:40:05 np0005645166.novalocal groupadd[73176]: new group: name=cinder, GID=165 Mar 12 05:40:05 np0005645166.novalocal useradd[73183]: new user: name=cinder, UID=165, GID=165, home=/var/lib/cinder, shell=/sbin/nologin, from=none Mar 12 05:40:05 np0005645166.novalocal useradd[73183]: add 'cinder' to group 'nobody' Mar 12 05:40:05 np0005645166.novalocal useradd[73183]: add 'cinder' to group 'cinder' Mar 12 05:40:05 np0005645166.novalocal useradd[73183]: add 'cinder' to shadow group 'nobody' Mar 12 05:40:05 np0005645166.novalocal useradd[73183]: add 'cinder' to shadow group 'cinder' Mar 12 05:40:06 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:40:06 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:40:06 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:40:06 np0005645166.novalocal systemd-rc-local-generator[73230]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:40:06 np0005645166.novalocal systemd-sysv-generator[73235]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:40:06 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:40:08 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:40:08 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:40:08 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Consumed 2.263s CPU time. Mar 12 05:40:08 np0005645166.novalocal systemd[1]: run-re424532b88c44ef0a1d215b94188a53f.service: Deactivated successfully. Mar 12 05:40:08 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:40:08 np0005645166.novalocal systemd-sysv-generator[75465]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:40:08 np0005645166.novalocal systemd-rc-local-generator[75461]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:40:08 np0005645166.novalocal systemd[1]: One time configuration for iscsi.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/iscsi/initiatorname.iscsi). Mar 12 05:40:08 np0005645166.novalocal systemd[1]: Starting Open-iSCSI... Mar 12 05:40:08 np0005645166.novalocal kernel: Loading iSCSI transport class v2.0-870. Mar 12 05:40:08 np0005645166.novalocal systemd[1]: Started Open-iSCSI. Mar 12 05:40:08 np0005645166.novalocal systemd[1]: Starting Logout off all iSCSI sessions on shutdown... Mar 12 05:40:08 np0005645166.novalocal systemd[1]: Finished Logout off all iSCSI sessions on shutdown. Mar 12 05:40:08 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:40:09 np0005645166.novalocal systemd-sysv-generator[75517]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:40:09 np0005645166.novalocal systemd-rc-local-generator[75514]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:40:09 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:40:09 np0005645166.novalocal systemd-rc-local-generator[75553]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:40:09 np0005645166.novalocal systemd-sysv-generator[75558]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:40:11 np0005645166.novalocal groupadd[75582]: group added to /etc/group: name=glance, GID=161 Mar 12 05:40:11 np0005645166.novalocal groupadd[75582]: group added to /etc/gshadow: name=glance Mar 12 05:40:11 np0005645166.novalocal groupadd[75582]: new group: name=glance, GID=161 Mar 12 05:40:11 np0005645166.novalocal useradd[75589]: new user: name=glance, UID=161, GID=161, home=/var/lib/glance, shell=/sbin/nologin, from=none Mar 12 05:40:12 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:40:12 np0005645166.novalocal systemd-rc-local-generator[75626]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:40:12 np0005645166.novalocal systemd-sysv-generator[75632]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:40:12 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:40:20 np0005645166.novalocal groupadd[75672]: group added to /etc/group: name=radvd, GID=75 Mar 12 05:40:20 np0005645166.novalocal groupadd[75672]: group added to /etc/gshadow: name=radvd Mar 12 05:40:20 np0005645166.novalocal groupadd[75672]: new group: name=radvd, GID=75 Mar 12 05:40:20 np0005645166.novalocal useradd[75681]: new user: name=radvd, UID=75, GID=75, home=/, shell=/sbin/nologin, from=none Mar 12 05:40:20 np0005645166.novalocal groupadd[75696]: group added to /etc/group: name=haproxy, GID=982 Mar 12 05:40:20 np0005645166.novalocal groupadd[75696]: group added to /etc/gshadow: name=haproxy Mar 12 05:40:20 np0005645166.novalocal groupadd[75696]: new group: name=haproxy, GID=982 Mar 12 05:40:20 np0005645166.novalocal useradd[75703]: new user: name=haproxy, UID=983, GID=982, home=/var/lib/haproxy, shell=/usr/sbin/nologin, from=none Mar 12 05:40:20 np0005645166.novalocal groupadd[75715]: group added to /etc/group: name=dnsmasq, GID=981 Mar 12 05:40:20 np0005645166.novalocal groupadd[75715]: group added to /etc/gshadow: name=dnsmasq Mar 12 05:40:20 np0005645166.novalocal groupadd[75715]: new group: name=dnsmasq, GID=981 Mar 12 05:40:20 np0005645166.novalocal useradd[75722]: new user: name=dnsmasq, UID=982, GID=981, home=/var/lib/dnsmasq, shell=/usr/sbin/nologin, from=none Mar 12 05:40:20 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:40:20 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:40:23 np0005645166.novalocal groupadd[75734]: group added to /etc/group: name=neutron, GID=980 Mar 12 05:40:23 np0005645166.novalocal groupadd[75734]: group added to /etc/gshadow: name=neutron Mar 12 05:40:23 np0005645166.novalocal groupadd[75734]: new group: name=neutron, GID=980 Mar 12 05:40:23 np0005645166.novalocal useradd[75741]: new user: name=neutron, UID=981, GID=980, home=/var/lib/neutron, shell=/sbin/nologin, from=none Mar 12 05:40:24 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:40:24 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:40:24 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:40:24 np0005645166.novalocal systemd-rc-local-generator[75794]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:40:24 np0005645166.novalocal systemd-sysv-generator[75799]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:40:24 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:40:25 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:40:25 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:40:25 np0005645166.novalocal systemd[1]: run-r9620d0f404ce4db2a8801e4967e1955c.service: Deactivated successfully. Mar 12 05:40:27 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:40:27 np0005645166.novalocal systemd-rc-local-generator[76142]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:40:27 np0005645166.novalocal systemd-sysv-generator[76145]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:40:27 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:40:30 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:40:30 np0005645166.novalocal systemd-sysv-generator[76196]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:40:30 np0005645166.novalocal systemd-rc-local-generator[76193]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:40:30 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:40:34 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:40:34 np0005645166.novalocal systemd-rc-local-generator[76247]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:40:34 np0005645166.novalocal systemd-sysv-generator[76251]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:40:34 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:40:35 np0005645166.novalocal ovs-vsctl[76270]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set-manager ptcp:6640:127.0.0.1 Mar 12 05:40:37 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:40:37 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:40:37 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:40:38 np0005645166.novalocal systemd-sysv-generator[76317]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:40:38 np0005645166.novalocal systemd-rc-local-generator[76314]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:40:38 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:40:39 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:40:39 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:40:39 np0005645166.novalocal systemd[1]: run-rdafb2d8036764345bf7c528ddfebe902.service: Deactivated successfully. Mar 12 05:40:40 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:40:40 np0005645166.novalocal systemd-rc-local-generator[76765]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:40:40 np0005645166.novalocal systemd-sysv-generator[76769]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:40:41 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:40:42 np0005645166.novalocal sshd-session[76783]: Invalid user ubuntu from 103.159.207.2 port 43372 Mar 12 05:40:42 np0005645166.novalocal sshd-session[76783]: Received disconnect from 103.159.207.2 port 43372:11: [preauth] Mar 12 05:40:42 np0005645166.novalocal sshd-session[76783]: Disconnected from invalid user ubuntu 103.159.207.2 port 43372 [preauth] Mar 12 05:40:43 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:40:43 np0005645166.novalocal systemd-rc-local-generator[76819]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:40:43 np0005645166.novalocal systemd-sysv-generator[76824]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:40:43 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:40:43 np0005645166.novalocal sshd-session[76838]: Connection closed by 115.190.238.64 port 54388 Mar 12 05:40:44 np0005645166.novalocal sshd-session[76795]: Invalid user wilson from 152.32.129.186 port 60310 Mar 12 05:40:44 np0005645166.novalocal sshd-session[76795]: Received disconnect from 152.32.129.186 port 60310:11: Bye Bye [preauth] Mar 12 05:40:44 np0005645166.novalocal sshd-session[76795]: Disconnected from invalid user wilson 152.32.129.186 port 60310 [preauth] Mar 12 05:40:47 np0005645166.novalocal sshd-session[76843]: Invalid user teste from 185.156.73.233 port 31290 Mar 12 05:40:47 np0005645166.novalocal sshd-session[76843]: Connection closed by invalid user teste 185.156.73.233 port 31290 [preauth] Mar 12 05:40:50 np0005645166.novalocal groupadd[76858]: group added to /etc/group: name=placement, GID=979 Mar 12 05:40:50 np0005645166.novalocal groupadd[76858]: group added to /etc/gshadow: name=placement Mar 12 05:40:50 np0005645166.novalocal groupadd[76858]: new group: name=placement, GID=979 Mar 12 05:40:50 np0005645166.novalocal useradd[76865]: new user: name=placement, UID=980, GID=979, home=/, shell=/bin/bash, from=none Mar 12 05:40:56 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:40:56 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:40:57 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:40:57 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:40:57 np0005645166.novalocal systemd[1]: run-r867018dfa3be426bb7232442f20aeca8.service: Deactivated successfully. Mar 12 05:40:58 np0005645166.novalocal groupadd[77239]: group added to /etc/group: name=nova, GID=162 Mar 12 05:40:58 np0005645166.novalocal groupadd[77239]: group added to /etc/gshadow: name=nova Mar 12 05:40:58 np0005645166.novalocal groupadd[77239]: new group: name=nova, GID=162 Mar 12 05:40:59 np0005645166.novalocal useradd[77246]: new user: name=nova, UID=162, GID=162, home=/var/lib/nova, shell=/sbin/nologin, from=none Mar 12 05:40:59 np0005645166.novalocal useradd[77246]: add 'nova' to group 'nobody' Mar 12 05:40:59 np0005645166.novalocal useradd[77246]: add 'nova' to group 'nova' Mar 12 05:40:59 np0005645166.novalocal useradd[77246]: add 'nova' to shadow group 'nobody' Mar 12 05:40:59 np0005645166.novalocal useradd[77246]: add 'nova' to shadow group 'nova' Mar 12 05:41:20 np0005645166.novalocal kernel: SELinux: Converting 2779 SID table entries... Mar 12 05:41:20 np0005645166.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 12 05:41:20 np0005645166.novalocal kernel: SELinux: policy capability open_perms=1 Mar 12 05:41:20 np0005645166.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 12 05:41:20 np0005645166.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 12 05:41:20 np0005645166.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 12 05:41:20 np0005645166.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 12 05:41:20 np0005645166.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 12 05:41:32 np0005645166.novalocal kernel: SELinux: Converting 2779 SID table entries... Mar 12 05:41:32 np0005645166.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 12 05:41:32 np0005645166.novalocal kernel: SELinux: policy capability open_perms=1 Mar 12 05:41:32 np0005645166.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 12 05:41:32 np0005645166.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 12 05:41:32 np0005645166.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 12 05:41:32 np0005645166.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 12 05:41:32 np0005645166.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 12 05:41:33 np0005645166.novalocal dbus-broker-launch[791]: avc: op=load_policy lsm=selinux seqno=12 res=1 Mar 12 05:41:33 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:41:33 np0005645166.novalocal sshd-session[77365]: Invalid user mgmt from 165.227.152.183 port 50962 Mar 12 05:41:33 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:41:33 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:41:33 np0005645166.novalocal sshd-session[77365]: Received disconnect from 165.227.152.183 port 50962:11: Bye Bye [preauth] Mar 12 05:41:33 np0005645166.novalocal sshd-session[77365]: Disconnected from invalid user mgmt 165.227.152.183 port 50962 [preauth] Mar 12 05:41:43 np0005645166.novalocal kernel: SELinux: Converting 2779 SID table entries... Mar 12 05:41:43 np0005645166.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 12 05:41:43 np0005645166.novalocal kernel: SELinux: policy capability open_perms=1 Mar 12 05:41:43 np0005645166.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 12 05:41:43 np0005645166.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 12 05:41:43 np0005645166.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 12 05:41:43 np0005645166.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 12 05:41:43 np0005645166.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 12 05:41:46 np0005645166.novalocal sshd-session[77382]: Received disconnect from 89.110.93.178 port 53284:11: Bye Bye [preauth] Mar 12 05:41:46 np0005645166.novalocal sshd-session[77382]: Disconnected from authenticating user root 89.110.93.178 port 53284 [preauth] Mar 12 05:41:57 np0005645166.novalocal kernel: SELinux: Converting 2783 SID table entries... Mar 12 05:41:57 np0005645166.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 12 05:41:57 np0005645166.novalocal kernel: SELinux: policy capability open_perms=1 Mar 12 05:41:57 np0005645166.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 12 05:41:57 np0005645166.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 12 05:41:57 np0005645166.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 12 05:41:57 np0005645166.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 12 05:41:57 np0005645166.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 12 05:41:57 np0005645166.novalocal groupadd[77402]: group added to /etc/group: name=qemu, GID=107 Mar 12 05:41:57 np0005645166.novalocal groupadd[77402]: group added to /etc/gshadow: name=qemu Mar 12 05:41:57 np0005645166.novalocal groupadd[77402]: new group: name=qemu, GID=107 Mar 12 05:41:57 np0005645166.novalocal useradd[77409]: new user: name=qemu, UID=107, GID=107, home=/, shell=/sbin/nologin, from=none Mar 12 05:41:57 np0005645166.novalocal useradd[77409]: add 'qemu' to group 'kvm' Mar 12 05:41:57 np0005645166.novalocal useradd[77409]: add 'qemu' to shadow group 'kvm' Mar 12 05:41:58 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:41:58 np0005645166.novalocal dbus-broker-launch[791]: avc: op=load_policy lsm=selinux seqno=14 res=1 Mar 12 05:41:58 np0005645166.novalocal dbus-broker-launch[785]: Noticed file-system modification, trigger reload. Mar 12 05:41:58 np0005645166.novalocal groupadd[77447]: group added to /etc/group: name=libvirt, GID=978 Mar 12 05:41:58 np0005645166.novalocal groupadd[77447]: group added to /etc/gshadow: name=libvirt Mar 12 05:41:58 np0005645166.novalocal groupadd[77447]: new group: name=libvirt, GID=978 Mar 12 05:41:58 np0005645166.novalocal polkitd[10918]: Reloading rules Mar 12 05:41:58 np0005645166.novalocal polkitd[10918]: Collecting garbage unconditionally... Mar 12 05:41:58 np0005645166.novalocal polkitd[10918]: Loading rules from directory /etc/polkit-1/rules.d Mar 12 05:41:58 np0005645166.novalocal polkitd[10918]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 12 05:41:58 np0005645166.novalocal polkitd[10918]: Finished loading, compiling and executing 5 rules Mar 12 05:41:58 np0005645166.novalocal polkitd[10918]: Reloading rules Mar 12 05:41:58 np0005645166.novalocal polkitd[10918]: Collecting garbage unconditionally... Mar 12 05:41:58 np0005645166.novalocal polkitd[10918]: Loading rules from directory /etc/polkit-1/rules.d Mar 12 05:41:58 np0005645166.novalocal polkitd[10918]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 12 05:41:58 np0005645166.novalocal polkitd[10918]: Finished loading, compiling and executing 5 rules Mar 12 05:42:00 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:42:00 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:42:00 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:42:02 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:42:02 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:42:02 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:42:02 np0005645166.novalocal systemd-sysv-generator[78169]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:42:02 np0005645166.novalocal systemd-rc-local-generator[78165]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:42:03 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:42:07 np0005645166.novalocal groupadd[81522]: group added to /etc/group: name=octavia, GID=977 Mar 12 05:42:07 np0005645166.novalocal groupadd[81522]: group added to /etc/gshadow: name=octavia Mar 12 05:42:07 np0005645166.novalocal groupadd[81522]: new group: name=octavia, GID=977 Mar 12 05:42:07 np0005645166.novalocal useradd[81577]: new user: name=octavia, UID=979, GID=977, home=/var/lib/octavia, shell=/sbin/nologin, from=none Mar 12 05:42:08 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:42:08 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:42:08 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Consumed 5.329s CPU time. Mar 12 05:42:08 np0005645166.novalocal systemd[1]: run-r29a0154676e047aca52ae6504a34c8c7.service: Deactivated successfully. Mar 12 05:42:12 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:42:13 np0005645166.novalocal systemd-rc-local-generator[81863]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:42:13 np0005645166.novalocal systemd-sysv-generator[81866]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:42:13 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:42:13 np0005645166.novalocal sshd[45723]: Timeout before authentication for connection from 175.12.108.55 to 38.102.83.224, pid = 75574 Mar 12 05:42:15 np0005645166.novalocal sshd[45723]: Timeout before authentication for connection from 14.103.203.191 to 38.102.83.224, pid = 75644 Mar 12 05:42:18 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:42:18 np0005645166.novalocal systemd-sysv-generator[81921]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:42:18 np0005645166.novalocal systemd-rc-local-generator[81918]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:42:18 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:42:21 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:42:21 np0005645166.novalocal systemd-rc-local-generator[81966]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:42:21 np0005645166.novalocal systemd-sysv-generator[81971]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:42:21 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:42:24 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:42:24 np0005645166.novalocal systemd-rc-local-generator[82016]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:42:24 np0005645166.novalocal systemd-sysv-generator[82021]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:42:24 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:42:27 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:42:27 np0005645166.novalocal systemd-sysv-generator[82077]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:42:27 np0005645166.novalocal systemd-rc-local-generator[82074]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:42:27 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:42:38 np0005645166.novalocal groupadd[82107]: group added to /etc/group: name=apache, GID=48 Mar 12 05:42:38 np0005645166.novalocal groupadd[82107]: group added to /etc/gshadow: name=apache Mar 12 05:42:38 np0005645166.novalocal groupadd[82107]: new group: name=apache, GID=48 Mar 12 05:42:38 np0005645166.novalocal useradd[82116]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Mar 12 05:42:40 np0005645166.novalocal sshd-session[82126]: Invalid user n8n from 152.32.129.186 port 35312 Mar 12 05:42:40 np0005645166.novalocal sshd-session[82126]: Received disconnect from 152.32.129.186 port 35312:11: Bye Bye [preauth] Mar 12 05:42:40 np0005645166.novalocal sshd-session[82126]: Disconnected from invalid user n8n 152.32.129.186 port 35312 [preauth] Mar 12 05:42:43 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:42:43 np0005645166.novalocal systemd-rc-local-generator[82153]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:42:43 np0005645166.novalocal systemd-sysv-generator[82156]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:42:44 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:42:44 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:42:44 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:42:44 np0005645166.novalocal systemd-rc-local-generator[82301]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:42:44 np0005645166.novalocal systemd-sysv-generator[82305]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:42:44 np0005645166.novalocal systemd[1]: Starting dnf makecache... Mar 12 05:42:44 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: Updating Subscription Management repositories. Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: Unable to read consumer identity Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: This system is not registered with an entitlement server. You can use subscription-manager to register. Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: Failed determining last makecache time. Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-openstack-barbican-3416cdce80f63f3e499 101 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-python-sushy-tools-946da041c16ec4d0a3c 210 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-openstack-cinder-677cc07bb5ec96f917e6a 231 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-python-openstackclient-bc1930c20ede201 275 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-openstack-ceilometer-f1d638faa195647f1 235 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-os-net-config-cffedba144566723de2b7bbf 234 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-openstack-nova-f42ab681bb43d178091da1f 192 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-openstack-designate-a891d81974a4c3aa56 200 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-openstack-glance-d70e40e4cc993dacb8833 209 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-openstack-keystone-0bfe3957e979d226bdf 215 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-openstack-manila-36b202934e53c3f8d7219 197 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-openstack-neutron-d9269bcf1bae33ecc9b1 245 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-openstack-octavia-46251e4d6ccad5a750cb 211 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-openstack-watcher-024815af711553739b46 213 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-edpm-image-builder-c093c533dacc587eed6 265 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-puppet-ceph-86cd31762d0b927abd628ca554 261 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-openstack-swift-2ea8b7ab1a203e53e6976c 208 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-python-tempestconf-8515371b7cceebd4282 256 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-openstack-trove-ui-89d0b782a402fb594a5 241 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: delorean-zuul-repo 79 kB/s | 3.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:42:45 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:42:45 np0005645166.novalocal systemd[1]: run-rc83ae2a7c78245c5a059e7492eef4cc7.service: Deactivated successfully. Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: CentOS-9 - RabbitMQ 38 50 kB/s | 8.0 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: CentOS Stream 9 - BaseOS 965 kB/s | 3.9 kB 00:00 Mar 12 05:42:45 np0005645166.novalocal dnf[82483]: CentOS Stream 9 - AppStream 1.2 MB/s | 4.4 kB 00:00 Mar 12 05:42:46 np0005645166.novalocal dnf[82483]: CentOS Stream 9 - CRB 1.2 MB/s | 4.3 kB 00:00 Mar 12 05:42:46 np0005645166.novalocal dnf[82483]: CentOS Stream 9 - Extras packages 788 kB/s | 3.0 kB 00:00 Mar 12 05:42:46 np0005645166.novalocal dnf[82483]: dlrn-epoxy-testing 243 kB/s | 3.0 kB 00:00 Mar 12 05:42:46 np0005645166.novalocal dnf[82483]: dlrn-epoxy-build-deps 190 kB/s | 3.0 kB 00:00 Mar 12 05:42:46 np0005645166.novalocal dnf[82483]: centos9-rabbitmq 799 kB/s | 3.0 kB 00:00 Mar 12 05:42:46 np0005645166.novalocal dnf[82483]: centos9-storage 883 kB/s | 3.0 kB 00:00 Mar 12 05:42:46 np0005645166.novalocal dnf[82483]: centos9-opstools 734 kB/s | 3.0 kB 00:00 Mar 12 05:42:46 np0005645166.novalocal dnf[82483]: NFV SIG OpenvSwitch 1.0 MB/s | 3.0 kB 00:00 Mar 12 05:42:46 np0005645166.novalocal dnf[82483]: Extra Packages for Enterprise Linux 9 - x86_64 212 kB/s | 29 kB 00:00 Mar 12 05:42:46 np0005645166.novalocal dnf[82483]: Metadata cache created. Mar 12 05:42:46 np0005645166.novalocal systemd[1]: dnf-makecache.service: Deactivated successfully. Mar 12 05:42:46 np0005645166.novalocal systemd[1]: Finished dnf makecache. Mar 12 05:42:46 np0005645166.novalocal systemd[1]: dnf-makecache.service: Consumed 1.367s CPU time. Mar 12 05:42:53 np0005645166.novalocal groupadd[82595]: group added to /etc/group: name=manila, GID=976 Mar 12 05:42:53 np0005645166.novalocal groupadd[82595]: group added to /etc/gshadow: name=manila Mar 12 05:42:53 np0005645166.novalocal groupadd[82595]: new group: name=manila, GID=976 Mar 12 05:42:53 np0005645166.novalocal useradd[82602]: new user: name=manila, UID=978, GID=976, home=/var/lib/manila, shell=/sbin/nologin, from=none Mar 12 05:42:53 np0005645166.novalocal useradd[82602]: add 'manila' to group 'nobody' Mar 12 05:42:53 np0005645166.novalocal useradd[82602]: add 'manila' to group 'manila' Mar 12 05:42:53 np0005645166.novalocal useradd[82602]: add 'manila' to shadow group 'nobody' Mar 12 05:42:53 np0005645166.novalocal useradd[82602]: add 'manila' to shadow group 'manila' Mar 12 05:42:54 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:42:54 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:42:54 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:42:54 np0005645166.novalocal systemd-rc-local-generator[82642]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:42:54 np0005645166.novalocal systemd-sysv-generator[82645]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:42:54 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:42:55 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:42:55 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:42:55 np0005645166.novalocal systemd[1]: run-ra3a798d19cf743d0afb351d620962eb7.service: Deactivated successfully. Mar 12 05:42:59 np0005645166.novalocal groupadd[82841]: group added to /etc/group: name=printadmin, GID=975 Mar 12 05:42:59 np0005645166.novalocal groupadd[82841]: group added to /etc/gshadow: name=printadmin Mar 12 05:42:59 np0005645166.novalocal groupadd[82841]: new group: name=printadmin, GID=975 Mar 12 05:43:00 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:43:00 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:43:00 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:43:00 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:43:00 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:43:00 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:00 np0005645166.novalocal systemd-rc-local-generator[82894]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:01 np0005645166.novalocal systemd-sysv-generator[82898]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:01 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:43:01 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:43:01 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:43:01 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.166s CPU time. Mar 12 05:43:02 np0005645166.novalocal systemd[1]: run-rf867cae197fc488e8d9f78472724fa1e.service: Deactivated successfully. Mar 12 05:43:02 np0005645166.novalocal kernel: loop: module loaded Mar 12 05:43:02 np0005645166.novalocal kernel: loop3: detected capacity change from 0 to 31457280 Mar 12 05:43:03 np0005645166.novalocal lvm[83536]: PV /dev/loop3 not used. Mar 12 05:43:12 np0005645166.novalocal sshd-session[83556]: Invalid user wilson from 165.227.152.183 port 45508 Mar 12 05:43:12 np0005645166.novalocal sshd-session[83556]: Received disconnect from 165.227.152.183 port 45508:11: Bye Bye [preauth] Mar 12 05:43:12 np0005645166.novalocal sshd-session[83556]: Disconnected from invalid user wilson 165.227.152.183 port 45508 [preauth] Mar 12 05:43:20 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:43:20 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:43:20 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:43:20 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:43:20 np0005645166.novalocal systemd[1]: run-r1d290337ba924298baa9104b01816ddf.service: Deactivated successfully. Mar 12 05:43:28 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:29 np0005645166.novalocal systemd-sysv-generator[83854]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:29 np0005645166.novalocal systemd-rc-local-generator[83849]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:29 np0005645166.novalocal systemd[1]: Starting MariaDB 10.5 database server... Mar 12 05:43:29 np0005645166.novalocal mariadb-prepare-db-dir[83890]: Database MariaDB is probably initialized in /var/lib/mysql already, nothing is done. Mar 12 05:43:29 np0005645166.novalocal mariadb-prepare-db-dir[83890]: If this is not the case, make sure the /var/lib/mysql is empty before running mariadb-prepare-db-dir. Mar 12 05:43:29 np0005645166.novalocal systemd[1]: Started MariaDB 10.5 database server. Mar 12 05:43:29 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:29 np0005645166.novalocal systemd-rc-local-generator[84003]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:29 np0005645166.novalocal systemd-sysv-generator[84008]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:30 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:30 np0005645166.novalocal systemd-sysv-generator[84047]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:30 np0005645166.novalocal systemd-rc-local-generator[84041]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:30 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:30 np0005645166.novalocal systemd-rc-local-generator[84086]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:30 np0005645166.novalocal systemd-sysv-generator[84090]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:31 np0005645166.novalocal systemd[1]: Starting Redis persistent key-value database... Mar 12 05:43:31 np0005645166.novalocal systemd[1]: Started Redis persistent key-value database. Mar 12 05:43:31 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:31 np0005645166.novalocal systemd-rc-local-generator[84133]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:31 np0005645166.novalocal systemd-sysv-generator[84138]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:31 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:31 np0005645166.novalocal systemd-rc-local-generator[84172]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:31 np0005645166.novalocal systemd-sysv-generator[84177]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:31 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:32 np0005645166.novalocal systemd-rc-local-generator[84214]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:32 np0005645166.novalocal systemd-sysv-generator[84221]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:32 np0005645166.novalocal systemd[1]: Starting Redis Sentinel... Mar 12 05:43:32 np0005645166.novalocal systemd[1]: Started Redis Sentinel. Mar 12 05:43:32 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:32 np0005645166.novalocal systemd-rc-local-generator[84260]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:32 np0005645166.novalocal systemd-sysv-generator[84265]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:32 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:32 np0005645166.novalocal systemd-rc-local-generator[84299]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:32 np0005645166.novalocal systemd-sysv-generator[84304]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:33 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:33 np0005645166.novalocal systemd-rc-local-generator[84389]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:33 np0005645166.novalocal systemd-sysv-generator[84392]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:33 np0005645166.novalocal systemd[1]: Starting OVN northd management daemon... Mar 12 05:43:33 np0005645166.novalocal chown[84408]: /usr/bin/chown: cannot access '/var/lib/ovn': No such file or directory Mar 12 05:43:34 np0005645166.novalocal ovn-ctl[84409]: /var/lib/ovn/ovnnb_db.db does not exist ... (warning). Mar 12 05:43:34 np0005645166.novalocal ovn-ctl[84409]: Creating empty database /var/lib/ovn/ovnnb_db.db [ OK ] Mar 12 05:43:34 np0005645166.novalocal ovsdb-server[84511]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Mar 12 05:43:34 np0005645166.novalocal ovsdb-server[84513]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.4.4-99.el9s Mar 12 05:43:34 np0005645166.novalocal ovsdb-server[84512]: ovs|00002|vlog(monitor)|INFO|closing log file Mar 12 05:43:34 np0005645166.novalocal ovsdb-server[84512]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Mar 12 05:43:34 np0005645166.novalocal ovn-ctl[84409]: Starting ovsdb-nb [ OK ] Mar 12 05:43:34 np0005645166.novalocal ovn-nbctl[84517]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl --no-leader-only --db=unix:/run/ovn/ovnnb_db.sock init Mar 12 05:43:34 np0005645166.novalocal ovn-ctl[84409]: /var/lib/ovn/ovnsb_db.db does not exist ... (warning). Mar 12 05:43:34 np0005645166.novalocal ovn-ctl[84409]: Creating empty database /var/lib/ovn/ovnsb_db.db [ OK ] Mar 12 05:43:34 np0005645166.novalocal ovsdb-server[84537]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Mar 12 05:43:34 np0005645166.novalocal ovsdb-server[84539]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.4.4-99.el9s Mar 12 05:43:34 np0005645166.novalocal ovsdb-server[84538]: ovs|00002|vlog(monitor)|INFO|closing log file Mar 12 05:43:34 np0005645166.novalocal ovsdb-server[84538]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Mar 12 05:43:34 np0005645166.novalocal ovn-ctl[84409]: Starting ovsdb-sb [ OK ] Mar 12 05:43:34 np0005645166.novalocal ovn-sbctl[84543]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl --no-leader-only --db=unix:/run/ovn/ovnsb_db.sock init Mar 12 05:43:34 np0005645166.novalocal ovn-ctl[84409]: Starting ovn-northd [ OK ] Mar 12 05:43:34 np0005645166.novalocal systemd[1]: Finished OVN northd management daemon. Mar 12 05:43:34 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:34 np0005645166.novalocal systemd-rc-local-generator[84583]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:34 np0005645166.novalocal systemd-sysv-generator[84586]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:34 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:35 np0005645166.novalocal systemd-rc-local-generator[84620]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:35 np0005645166.novalocal systemd-sysv-generator[84625]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:35 np0005645166.novalocal ovn-nbctl[84641]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set-connection pssl:6641:[::1] Mar 12 05:43:35 np0005645166.novalocal ovn-sbctl[84645]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set-connection pssl:6642:[::1] Mar 12 05:43:35 np0005645166.novalocal sudo[84647]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get connection . inactivity_probe Mar 12 05:43:35 np0005645166.novalocal sudo[84647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:43:35 np0005645166.novalocal sudo[84647]: pam_unix(sudo:session): session closed for user root Mar 12 05:43:35 np0005645166.novalocal ovn-nbctl[84650]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set connection . inactivity_probe=0 Mar 12 05:43:35 np0005645166.novalocal sudo[84652]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get connection . inactivity_probe Mar 12 05:43:35 np0005645166.novalocal sudo[84652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:43:35 np0005645166.novalocal sudo[84652]: pam_unix(sudo:session): session closed for user root Mar 12 05:43:35 np0005645166.novalocal ovn-sbctl[84655]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set connection . inactivity_probe=0 Mar 12 05:43:35 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:43:35 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:43:35 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:43:35 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:36 np0005645166.novalocal systemd-rc-local-generator[84702]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:36 np0005645166.novalocal systemd-sysv-generator[84707]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:36 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:43:36 np0005645166.novalocal systemd[1]: Starting OVN controller daemon... Mar 12 05:43:36 np0005645166.novalocal ovn-ctl[84723]: Starting ovn-controller [ OK ] Mar 12 05:43:36 np0005645166.novalocal systemd[1]: Started OVN controller daemon. Mar 12 05:43:36 np0005645166.novalocal kernel: br-int: entered promiscuous mode Mar 12 05:43:36 np0005645166.novalocal NetworkManager[869]: [1773308616.4861] manager: (br-int): 'openvswitch' plugin not available; creating generic device Mar 12 05:43:36 np0005645166.novalocal NetworkManager[869]: [1773308616.4882] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Mar 12 05:43:36 np0005645166.novalocal systemd-udevd[84780]: Network interface NamePolicy= disabled on kernel command line. Mar 12 05:43:36 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:36 np0005645166.novalocal systemd-rc-local-generator[84805]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:36 np0005645166.novalocal systemd-sysv-generator[84810]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:36 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:43:36 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:37 np0005645166.novalocal systemd-rc-local-generator[84842]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:37 np0005645166.novalocal systemd-sysv-generator[84845]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:37 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:43:38 np0005645166.novalocal kernel: SELinux: Converting 2808 SID table entries... Mar 12 05:43:38 np0005645166.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 12 05:43:38 np0005645166.novalocal kernel: SELinux: policy capability open_perms=1 Mar 12 05:43:38 np0005645166.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 12 05:43:38 np0005645166.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 12 05:43:38 np0005645166.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 12 05:43:38 np0005645166.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 12 05:43:38 np0005645166.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 12 05:43:38 np0005645166.novalocal setsebool[84862]: The os_neutron_dac_override policy boolean was changed to on by root Mar 12 05:43:41 np0005645166.novalocal kernel: loop2: detected capacity change from 0 to 31457280 Mar 12 05:43:41 np0005645166.novalocal dbus-broker-launch[791]: avc: op=load_policy lsm=selinux seqno=16 res=1 Mar 12 05:43:41 np0005645166.novalocal lvm[84882]: PV /dev/loop2 not used. Mar 12 05:43:44 np0005645166.novalocal ovsdb-server[84513]: ovs|00003|memory|INFO|10556 kB peak resident set size after 10.1 seconds Mar 12 05:43:44 np0005645166.novalocal ovsdb-server[84513]: ovs|00004|memory|INFO|atoms:44 cells:43 json-caches:1 monitors:2 n-weak-refs:0 sessions:1 Mar 12 05:43:44 np0005645166.novalocal ovsdb-server[84539]: ovs|00003|memory|INFO|11324 kB peak resident set size after 10.0 seconds Mar 12 05:43:44 np0005645166.novalocal ovsdb-server[84539]: ovs|00004|memory|INFO|atoms:451 cells:355 json-caches:1 monitors:3 n-weak-refs:11 sessions:2 Mar 12 05:43:46 np0005645166.novalocal sshd[45723]: Timeout before authentication for connection from 14.103.203.191 to 38.102.83.224, pid = 77379 Mar 12 05:43:47 np0005645166.novalocal systemd[1]: Starting Cleanup of Temporary Directories... Mar 12 05:43:47 np0005645166.novalocal systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Mar 12 05:43:47 np0005645166.novalocal systemd[1]: Finished Cleanup of Temporary Directories. Mar 12 05:43:47 np0005645166.novalocal systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Mar 12 05:43:53 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:53 np0005645166.novalocal systemd-rc-local-generator[84927]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:53 np0005645166.novalocal systemd-sysv-generator[84930]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:53 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:43:53 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:43:56 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:43:56 np0005645166.novalocal systemd-rc-local-generator[84976]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:43:56 np0005645166.novalocal systemd-sysv-generator[84980]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:43:56 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:43:56 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:43:58 np0005645166.novalocal sshd[45723]: Timeout before authentication for connection from 175.12.108.55 to 38.102.83.224, pid = 77396 Mar 12 05:44:01 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:44:01 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:44:01 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:44:01 np0005645166.novalocal groupadd[85055]: group added to /etc/group: name=clevis, GID=974 Mar 12 05:44:01 np0005645166.novalocal groupadd[85055]: group added to /etc/gshadow: name=clevis Mar 12 05:44:01 np0005645166.novalocal groupadd[85055]: new group: name=clevis, GID=974 Mar 12 05:44:01 np0005645166.novalocal useradd[85062]: new user: name=clevis, UID=977, GID=974, home=/var/cache/clevis, shell=/usr/sbin/nologin, from=none Mar 12 05:44:01 np0005645166.novalocal usermod[85072]: add 'clevis' to group 'tss' Mar 12 05:44:01 np0005645166.novalocal usermod[85072]: add 'clevis' to shadow group 'tss' Mar 12 05:44:01 np0005645166.novalocal usermod[85088]: add 'nova' to group 'qemu' Mar 12 05:44:01 np0005645166.novalocal usermod[85088]: add 'nova' to shadow group 'qemu' Mar 12 05:44:01 np0005645166.novalocal usermod[85095]: add 'nova' to group 'libvirt' Mar 12 05:44:01 np0005645166.novalocal usermod[85095]: add 'nova' to shadow group 'libvirt' Mar 12 05:44:02 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:44:02 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:44:02 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:44:03 np0005645166.novalocal systemd-sysv-generator[85182]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:44:03 np0005645166.novalocal systemd-rc-local-generator[85177]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:44:03 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:44:03 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:44:06 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:44:06 np0005645166.novalocal systemd-rc-local-generator[87937]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:44:06 np0005645166.novalocal systemd-sysv-generator[87940]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:44:06 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:44:06 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:44:07 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:44:07 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:44:07 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Consumed 5.704s CPU time. Mar 12 05:44:07 np0005645166.novalocal systemd[1]: run-r724b021849c74d45a3b01a358176b257.service: Deactivated successfully. Mar 12 05:44:09 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:44:09 np0005645166.novalocal systemd-rc-local-generator[89198]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:44:09 np0005645166.novalocal systemd-sysv-generator[89203]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:44:09 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:44:09 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:44:13 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:44:13 np0005645166.novalocal systemd-sysv-generator[89242]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:44:13 np0005645166.novalocal systemd-rc-local-generator[89239]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:44:13 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:44:34 np0005645166.novalocal sshd-session[89302]: Received disconnect from 152.32.129.186 port 41790:11: Bye Bye [preauth] Mar 12 05:44:34 np0005645166.novalocal sshd-session[89302]: Disconnected from authenticating user root 152.32.129.186 port 41790 [preauth] Mar 12 05:44:39 np0005645166.novalocal crontab[89315]: (root) LIST (root) Mar 12 05:44:39 np0005645166.novalocal crontab[89316]: (root) LIST (keystone) Mar 12 05:44:39 np0005645166.novalocal crontab[89317]: (root) LIST (cinder) Mar 12 05:44:39 np0005645166.novalocal crontab[89318]: (root) LIST (glance) Mar 12 05:44:39 np0005645166.novalocal crontab[89319]: (root) LIST (nova) Mar 12 05:44:39 np0005645166.novalocal crontab[89320]: (root) LIST (manila) Mar 12 05:44:39 np0005645166.novalocal crontab[89321]: (root) REPLACE (cinder) Mar 12 05:44:39 np0005645166.novalocal crontab[89322]: (root) REPLACE (glance) Mar 12 05:44:39 np0005645166.novalocal crontab[89323]: (root) REPLACE (glance) Mar 12 05:44:44 np0005645166.novalocal sshd-session[89335]: Invalid user n8n from 89.110.93.178 port 58638 Mar 12 05:44:44 np0005645166.novalocal sshd-session[89335]: Received disconnect from 89.110.93.178 port 58638:11: Bye Bye [preauth] Mar 12 05:44:44 np0005645166.novalocal sshd-session[89335]: Disconnected from invalid user n8n 89.110.93.178 port 58638 [preauth] Mar 12 05:44:45 np0005645166.novalocal crontab[89342]: (root) REPLACE (glance) Mar 12 05:44:45 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:44:45 np0005645166.novalocal systemd-rc-local-generator[89362]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:44:45 np0005645166.novalocal systemd-sysv-generator[89365]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:44:46 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:44:55 np0005645166.novalocal sshd-session[89393]: Invalid user nasuser from 165.227.152.183 port 37424 Mar 12 05:44:55 np0005645166.novalocal sshd-session[89393]: Received disconnect from 165.227.152.183 port 37424:11: Bye Bye [preauth] Mar 12 05:44:55 np0005645166.novalocal sshd-session[89393]: Disconnected from invalid user nasuser 165.227.152.183 port 37424 [preauth] Mar 12 05:45:00 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:45:00 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:45:00 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:45:23 np0005645166.novalocal crontab[89444]: (root) REPLACE (nova) Mar 12 05:45:26 np0005645166.novalocal sshd[45723]: drop connection #0 from [175.12.108.55]:58932 on [38.102.83.224]:22 penalty: exceeded LoginGraceTime Mar 12 05:45:31 np0005645166.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 12 05:45:31 np0005645166.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 12 05:45:31 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:45:31 np0005645166.novalocal systemd-rc-local-generator[89493]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:45:31 np0005645166.novalocal systemd-sysv-generator[89496]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:45:31 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:45:31 np0005645166.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 12 05:45:31 np0005645166.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 12 05:45:31 np0005645166.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 12 05:45:31 np0005645166.novalocal systemd[1]: run-r55e6884b563e4fc394b0b88523e0a651.service: Deactivated successfully. Mar 12 05:45:41 np0005645166.novalocal crontab[89605]: (root) REPLACE (manila) Mar 12 05:45:41 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:45:41 np0005645166.novalocal systemd-sysv-generator[89632]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:45:41 np0005645166.novalocal systemd-rc-local-generator[89629]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:45:41 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:45:41 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:45:42 np0005645166.novalocal systemd-rc-local-generator[89673]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:45:42 np0005645166.novalocal systemd-sysv-generator[89677]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:45:42 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:45:42 np0005645166.novalocal systemd[89688]: epmd.socket: Failed to create listening socket ([::]:4369): Address already in use Mar 12 05:45:42 np0005645166.novalocal systemd[1]: epmd.socket: Failed to receive listening socket ([::]:4369): Input/output error Mar 12 05:45:42 np0005645166.novalocal systemd[1]: epmd.socket: Failed to listen on sockets: Input/output error Mar 12 05:45:42 np0005645166.novalocal systemd[1]: epmd.socket: Failed with result 'resources'. Mar 12 05:45:42 np0005645166.novalocal systemd[1]: Failed to listen on Erlang Port Mapper Daemon Activation Socket. Mar 12 05:45:42 np0005645166.novalocal systemd[1]: Starting RabbitMQ broker... Mar 12 05:45:42 np0005645166.novalocal rabbitmq-server[89689]: 2026-03-12 05:45:42.762020-04:00 [warning] <0.129.0> Both old (.config) and new (.conf) format config files exist. Mar 12 05:45:42 np0005645166.novalocal rabbitmq-server[89689]: 2026-03-12 05:45:42.774322-04:00 [warning] <0.129.0> Using the old format config file: /etc/rabbitmq/rabbitmq.config Mar 12 05:45:42 np0005645166.novalocal rabbitmq-server[89689]: 2026-03-12 05:45:42.774359-04:00 [warning] <0.129.0> Please update your config files to the new format and remove the old file. Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: 2026-03-12 05:45:44.411728-04:00 [info] <0.229.0> Feature flags: list of feature flags found: Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: 2026-03-12 05:45:44.411847-04:00 [info] <0.229.0> Feature flags: [ ] implicit_default_bindings Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: 2026-03-12 05:45:44.411889-04:00 [info] <0.229.0> Feature flags: [ ] maintenance_mode_status Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: 2026-03-12 05:45:44.411943-04:00 [info] <0.229.0> Feature flags: [ ] quorum_queue Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: 2026-03-12 05:45:44.412076-04:00 [info] <0.229.0> Feature flags: [ ] stream_queue Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: 2026-03-12 05:45:44.412109-04:00 [info] <0.229.0> Feature flags: [ ] user_limits Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: 2026-03-12 05:45:44.412148-04:00 [info] <0.229.0> Feature flags: [ ] virtual_host_metadata Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: 2026-03-12 05:45:44.412241-04:00 [info] <0.229.0> Feature flags: feature flag states written to disk: yes Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: 2026-03-12 05:45:44.676567-04:00 [notice] <0.44.0> Application syslog exited with reason: stopped Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: 2026-03-12 05:45:44.676737-04:00 [notice] <0.229.0> Logging: switching to configured handler(s); following messages may not be visible in this log output Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: ## ## RabbitMQ 3.9.21 Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: ## ## Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: ########## Copyright (c) 2007-2022 VMware, Inc. or its affiliates. Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: ###### ## Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: ########## Licensed under the MPL 2.0. Website: https://rabbitmq.com Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: Erlang: 24.3.4.2 [jit] Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: TLS Library: OpenSSL - OpenSSL 3.5.5 27 Jan 2026 Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: Doc guides: https://rabbitmq.com/documentation.html Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: Support: https://rabbitmq.com/contact.html Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: Tutorials: https://rabbitmq.com/getstarted.html Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: Monitoring: https://rabbitmq.com/monitoring.html Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: Logs: /var/log/rabbitmq/rabbit@localhost6.log Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: /var/log/rabbitmq/rabbit@localhost6_upgrade.log Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: Mar 12 05:45:44 np0005645166.novalocal rabbitmq-server[89689]: Config file(s): /etc/rabbitmq/rabbitmq.config Mar 12 05:45:47 np0005645166.novalocal rabbitmq-server[89689]: Starting broker... completed with 3 plugins. Mar 12 05:45:47 np0005645166.novalocal systemd[1]: Started RabbitMQ broker. Mar 12 05:45:47 np0005645166.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 12 05:45:47 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:45:47 np0005645166.novalocal systemd-sysv-generator[89797]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:45:47 np0005645166.novalocal systemd-rc-local-generator[89793]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:45:48 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:45:48 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:45:48 np0005645166.novalocal systemd-sysv-generator[89837]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:45:48 np0005645166.novalocal systemd-rc-local-generator[89834]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:45:48 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:45:48 np0005645166.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 12 05:45:48 np0005645166.novalocal runuser[89853]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:45:48 np0005645166.novalocal setroubleshoot[89772]: failed to retrieve rpm info for path '/proc/net/if_inet6': Mar 12 05:45:48 np0005645166.novalocal systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Mar 12 05:45:48 np0005645166.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Mar 12 05:45:49 np0005645166.novalocal runuser[89853]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:45:49 np0005645166.novalocal runuser[89918]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:45:49 np0005645166.novalocal setroubleshoot[89772]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. For complete SELinux messages run: sealert -l 4c6a8468-0a27-4114-9278-7b5ad5288fe9 Mar 12 05:45:49 np0005645166.novalocal setroubleshoot[89772]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that inet_gethost should be allowed read access on the if_inet6 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'inet_gethost' --raw | audit2allow -M my-inetgethost # semodule -X 300 -i my-inetgethost.pp Mar 12 05:45:50 np0005645166.novalocal runuser[89918]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:45:50 np0005645166.novalocal runuser[89971]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:45:50 np0005645166.novalocal runuser[89971]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:45:51 np0005645166.novalocal runuser[90025]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:45:51 np0005645166.novalocal runuser[90025]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:45:51 np0005645166.novalocal runuser[90079]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:45:52 np0005645166.novalocal runuser[90079]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:45:52 np0005645166.novalocal runuser[90131]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:45:53 np0005645166.novalocal runuser[90131]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:45:53 np0005645166.novalocal runuser[90183]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:45:54 np0005645166.novalocal runuser[90183]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:45:54 np0005645166.novalocal runuser[90235]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:45:54 np0005645166.novalocal runuser[90235]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:45:54 np0005645166.novalocal runuser[90287]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:45:55 np0005645166.novalocal runuser[90287]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:45:55 np0005645166.novalocal runuser[90341]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:45:56 np0005645166.novalocal runuser[90341]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:45:56 np0005645166.novalocal runuser[90393]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:45:57 np0005645166.novalocal runuser[90393]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:45:57 np0005645166.novalocal runuser[90447]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:45:57 np0005645166.novalocal runuser[90447]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:45:57 np0005645166.novalocal runuser[90499]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:45:58 np0005645166.novalocal runuser[90499]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:45:58 np0005645166.novalocal runuser[90551]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:45:59 np0005645166.novalocal runuser[90551]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:45:59 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Mar 12 05:45:59 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.267s CPU time. Mar 12 05:45:59 np0005645166.novalocal runuser[90603]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:45:59 np0005645166.novalocal runuser[90603]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:00 np0005645166.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 12 05:46:00 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:46:00 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:46:00 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:46:00 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:00 np0005645166.novalocal systemd-rc-local-generator[90687]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:00 np0005645166.novalocal systemd-sysv-generator[90692]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:00 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:01 np0005645166.novalocal systemd[1]: Started OpenStack Cinder Scheduler Server. Mar 12 05:46:01 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:01 np0005645166.novalocal systemd-sysv-generator[90730]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:01 np0005645166.novalocal systemd-rc-local-generator[90726]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:01 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:01 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:01 np0005645166.novalocal systemd-rc-local-generator[90766]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:01 np0005645166.novalocal systemd-sysv-generator[90769]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:01 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:02 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:02 np0005645166.novalocal systemd-sysv-generator[90814]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:02 np0005645166.novalocal systemd-rc-local-generator[90810]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:02 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:02 np0005645166.novalocal systemd[1]: Started OpenStack Cinder Volume Server. Mar 12 05:46:02 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:03 np0005645166.novalocal systemd-rc-local-generator[90852]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:03 np0005645166.novalocal systemd-sysv-generator[90857]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:03 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:03 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:03 np0005645166.novalocal systemd-sysv-generator[90894]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:03 np0005645166.novalocal systemd-rc-local-generator[90890]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:03 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:04 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:04 np0005645166.novalocal systemd-rc-local-generator[90936]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:04 np0005645166.novalocal systemd-sysv-generator[90941]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:04 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:04 np0005645166.novalocal systemd[1]: Started OpenStack Cinder Backup Server. Mar 12 05:46:04 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:04 np0005645166.novalocal systemd-rc-local-generator[90989]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:04 np0005645166.novalocal systemd-sysv-generator[90992]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:04 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:04 np0005645166.novalocal sudo[90967]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings -o name cinder-volumes Mar 12 05:46:04 np0005645166.novalocal systemd[1]: Created slice User Slice of UID 0. Mar 12 05:46:04 np0005645166.novalocal systemd[1]: Starting User Runtime Directory /run/user/0... Mar 12 05:46:04 np0005645166.novalocal systemd[1]: Finished User Runtime Directory /run/user/0. Mar 12 05:46:05 np0005645166.novalocal systemd[1]: Starting User Manager for UID 0... Mar 12 05:46:05 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:05 np0005645166.novalocal systemd-sysv-generator[91033]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:05 np0005645166.novalocal systemd-rc-local-generator[91030]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:05 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: pam_unix(systemd-user:session): session opened for user root(uid=0) by root(uid=0) Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: Queued start job for default target Main User Target. Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: Created slice User Application Slice. Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: Started Daily Cleanup of User's Temporary Directories. Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: Reached target Paths. Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: Reached target Timers. Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: Starting D-Bus User Message Bus Socket... Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: PipeWire PulseAudio was skipped because of an unmet condition check (ConditionUser=!root). Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: PipeWire Multimedia System Sockets was skipped because of an unmet condition check (ConditionUser=!root). Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: Starting Create User's Volatile Files and Directories... Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: Finished Create User's Volatile Files and Directories. Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: Listening on D-Bus User Message Bus Socket. Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: Reached target Sockets. Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: Reached target Basic System. Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: Reached target Main User Target. Mar 12 05:46:05 np0005645166.novalocal systemd[91006]: Startup finished in 196ms. Mar 12 05:46:05 np0005645166.novalocal systemd[1]: Started User Manager for UID 0. Mar 12 05:46:05 np0005645166.novalocal systemd[1]: Started Session c1 of User root. Mar 12 05:46:05 np0005645166.novalocal sudo[90967]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:05 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:05 np0005645166.novalocal systemd-sysv-generator[91083]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:05 np0005645166.novalocal systemd-rc-local-generator[91080]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:05 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:05 np0005645166.novalocal sudo[90967]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:05 np0005645166.novalocal systemd[1]: session-c1.scope: Deactivated successfully. Mar 12 05:46:05 np0005645166.novalocal sudo[91098]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Mar 12 05:46:06 np0005645166.novalocal systemd[1]: Started Session c2 of User root. Mar 12 05:46:06 np0005645166.novalocal sudo[91098]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:06 np0005645166.novalocal systemd[1]: Starting Restore LIO kernel target configuration... Mar 12 05:46:06 np0005645166.novalocal kernel: Rounding down aligned max_sectors from 4294967295 to 4294967288 Mar 12 05:46:06 np0005645166.novalocal target[91102]: No saved config file at /etc/target/saveconfig.json, ok, exiting Mar 12 05:46:06 np0005645166.novalocal systemd[1]: Finished Restore LIO kernel target configuration. Mar 12 05:46:06 np0005645166.novalocal sudo[91098]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:06 np0005645166.novalocal systemd[1]: session-c2.scope: Deactivated successfully. Mar 12 05:46:06 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:06 np0005645166.novalocal systemd-rc-local-generator[91135]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:06 np0005645166.novalocal systemd-sysv-generator[91138]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:06 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:06 np0005645166.novalocal sudo[91113]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:46:06 np0005645166.novalocal systemd[1]: Started Session c3 of User root. Mar 12 05:46:06 np0005645166.novalocal sudo[91113]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:06 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:06 np0005645166.novalocal systemd-sysv-generator[91180]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:06 np0005645166.novalocal systemd-rc-local-generator[91175]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:07 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:07 np0005645166.novalocal sudo[91113]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:07 np0005645166.novalocal systemd[1]: session-c3.scope: Deactivated successfully. Mar 12 05:46:07 np0005645166.novalocal sudo[91196]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -L 14.25g cinder-volumes/cinder-volumes-pool Mar 12 05:46:07 np0005645166.novalocal systemd[1]: Started Session c4 of User root. Mar 12 05:46:07 np0005645166.novalocal sudo[91196]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:07 np0005645166.novalocal runuser[91198]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:07 np0005645166.novalocal systemd[1]: Started Device-mapper event daemon. Mar 12 05:46:07 np0005645166.novalocal dmeventd[91275]: dmeventd ready for processing. Mar 12 05:46:07 np0005645166.novalocal dmeventd[91275]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Mar 12 05:46:07 np0005645166.novalocal sudo[91196]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:07 np0005645166.novalocal systemd[1]: session-c4.scope: Deactivated successfully. Mar 12 05:46:07 np0005645166.novalocal sudo[91286]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/cinder-volumes-pool Mar 12 05:46:07 np0005645166.novalocal runuser[91198]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:07 np0005645166.novalocal systemd[1]: Started Session c5 of User root. Mar 12 05:46:07 np0005645166.novalocal sudo[91286]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:07 np0005645166.novalocal runuser[91292]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:08 np0005645166.novalocal sudo[91286]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:08 np0005645166.novalocal systemd[1]: session-c5.scope: Deactivated successfully. Mar 12 05:46:08 np0005645166.novalocal sudo[91340]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C pvs --noheadings --unit=g -o vg_name,name,size,free --separator | --nosuffix --ignoreskippedcluster Mar 12 05:46:08 np0005645166.novalocal systemd[1]: Started Session c6 of User root. Mar 12 05:46:08 np0005645166.novalocal sudo[91340]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:08 np0005645166.novalocal runuser[91292]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:08 np0005645166.novalocal runuser[91351]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:08 np0005645166.novalocal sudo[91340]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:08 np0005645166.novalocal systemd[1]: session-c6.scope: Deactivated successfully. Mar 12 05:46:08 np0005645166.novalocal sudo[91397]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:46:08 np0005645166.novalocal systemd[1]: Started Session c7 of User root. Mar 12 05:46:08 np0005645166.novalocal sudo[91397]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:09 np0005645166.novalocal sudo[91397]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:09 np0005645166.novalocal systemd[1]: session-c7.scope: Deactivated successfully. Mar 12 05:46:09 np0005645166.novalocal sudo[91403]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:46:09 np0005645166.novalocal systemd[1]: Started Session c8 of User root. Mar 12 05:46:09 np0005645166.novalocal sudo[91403]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:09 np0005645166.novalocal runuser[91351]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:09 np0005645166.novalocal runuser[91411]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:09 np0005645166.novalocal sudo[91403]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:09 np0005645166.novalocal systemd[1]: session-c8.scope: Deactivated successfully. Mar 12 05:46:09 np0005645166.novalocal sudo[91457]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:46:09 np0005645166.novalocal systemd[1]: Started Session c9 of User root. Mar 12 05:46:09 np0005645166.novalocal sudo[91457]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:09 np0005645166.novalocal sudo[91457]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:09 np0005645166.novalocal systemd[1]: session-c9.scope: Deactivated successfully. Mar 12 05:46:09 np0005645166.novalocal sudo[91466]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 12 05:46:09 np0005645166.novalocal runuser[91411]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:09 np0005645166.novalocal systemd[1]: Started Session c10 of User root. Mar 12 05:46:09 np0005645166.novalocal sudo[91466]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:10 np0005645166.novalocal sudo[91466]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:10 np0005645166.novalocal systemd[1]: session-c10.scope: Deactivated successfully. Mar 12 05:46:10 np0005645166.novalocal runuser[91475]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:10 np0005645166.novalocal sudo[91487]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Mar 12 05:46:10 np0005645166.novalocal systemd[1]: Started Session c11 of User root. Mar 12 05:46:10 np0005645166.novalocal sudo[91487]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:10 np0005645166.novalocal sudo[91487]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:10 np0005645166.novalocal systemd[1]: session-c11.scope: Deactivated successfully. Mar 12 05:46:10 np0005645166.novalocal sudo[91526]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Mar 12 05:46:10 np0005645166.novalocal systemd[1]: Started Session c12 of User root. Mar 12 05:46:10 np0005645166.novalocal sudo[91526]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:10 np0005645166.novalocal runuser[91475]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:10 np0005645166.novalocal runuser[91536]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:11 np0005645166.novalocal sudo[91526]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:11 np0005645166.novalocal systemd[1]: session-c12.scope: Deactivated successfully. Mar 12 05:46:11 np0005645166.novalocal sudo[91583]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:46:11 np0005645166.novalocal systemd[1]: Started Session c13 of User root. Mar 12 05:46:11 np0005645166.novalocal sudo[91583]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:11 np0005645166.novalocal sudo[91583]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:11 np0005645166.novalocal systemd[1]: session-c13.scope: Deactivated successfully. Mar 12 05:46:11 np0005645166.novalocal sudo[91591]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:46:11 np0005645166.novalocal systemd[1]: Started Session c14 of User root. Mar 12 05:46:11 np0005645166.novalocal sudo[91591]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:11 np0005645166.novalocal runuser[91536]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:11 np0005645166.novalocal runuser[91597]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:11 np0005645166.novalocal sudo[91591]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:11 np0005645166.novalocal systemd[1]: session-c14.scope: Deactivated successfully. Mar 12 05:46:11 np0005645166.novalocal sudo[91643]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 12 05:46:11 np0005645166.novalocal systemd[1]: Started Session c15 of User root. Mar 12 05:46:11 np0005645166.novalocal sudo[91643]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:12 np0005645166.novalocal sudo[91643]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:12 np0005645166.novalocal systemd[1]: session-c15.scope: Deactivated successfully. Mar 12 05:46:12 np0005645166.novalocal sudo[91647]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:46:12 np0005645166.novalocal systemd[1]: Started Session c16 of User root. Mar 12 05:46:12 np0005645166.novalocal sudo[91647]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:12 np0005645166.novalocal runuser[91597]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:12 np0005645166.novalocal runuser[91657]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:12 np0005645166.novalocal sudo[91647]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:12 np0005645166.novalocal systemd[1]: session-c16.scope: Deactivated successfully. Mar 12 05:46:12 np0005645166.novalocal sudo[91703]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:46:12 np0005645166.novalocal systemd[1]: Started Session c17 of User root. Mar 12 05:46:12 np0005645166.novalocal sudo[91703]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:12 np0005645166.novalocal runuser[91657]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:13 np0005645166.novalocal sudo[91703]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:13 np0005645166.novalocal systemd[1]: session-c17.scope: Deactivated successfully. Mar 12 05:46:13 np0005645166.novalocal sudo[91716]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:46:13 np0005645166.novalocal systemd[1]: Started Session c18 of User root. Mar 12 05:46:13 np0005645166.novalocal sudo[91716]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:13 np0005645166.novalocal sudo[91716]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:13 np0005645166.novalocal systemd[1]: session-c18.scope: Deactivated successfully. Mar 12 05:46:13 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:13 np0005645166.novalocal systemd-rc-local-generator[91746]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:13 np0005645166.novalocal systemd-sysv-generator[91749]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:13 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:13 np0005645166.novalocal sudo[91725]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 12 05:46:14 np0005645166.novalocal systemd[1]: Started Session c19 of User root. Mar 12 05:46:14 np0005645166.novalocal sudo[91725]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:14 np0005645166.novalocal systemd[1]: Starting OpenStack Neutron (RPC only) Server... Mar 12 05:46:14 np0005645166.novalocal sudo[91725]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:14 np0005645166.novalocal systemd[1]: session-c19.scope: Deactivated successfully. Mar 12 05:46:14 np0005645166.novalocal sudo[91769]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:46:14 np0005645166.novalocal systemd[1]: Started Session c20 of User root. Mar 12 05:46:14 np0005645166.novalocal sudo[91769]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:14 np0005645166.novalocal neutron-rpc-server[91767]: This program is using eventlet and has been monkey_patched Mar 12 05:46:14 np0005645166.novalocal sudo[91769]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:14 np0005645166.novalocal systemd[1]: session-c20.scope: Deactivated successfully. Mar 12 05:46:15 np0005645166.novalocal sudo[91778]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:46:15 np0005645166.novalocal systemd[1]: Started Session c21 of User root. Mar 12 05:46:15 np0005645166.novalocal sudo[91778]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:15 np0005645166.novalocal sudo[91778]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:15 np0005645166.novalocal systemd[1]: session-c21.scope: Deactivated successfully. Mar 12 05:46:15 np0005645166.novalocal sudo[91782]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:46:15 np0005645166.novalocal systemd[1]: Started Session c22 of User root. Mar 12 05:46:15 np0005645166.novalocal sudo[91782]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:15 np0005645166.novalocal sudo[91782]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:15 np0005645166.novalocal systemd[1]: session-c22.scope: Deactivated successfully. Mar 12 05:46:15 np0005645166.novalocal sudo[91786]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 12 05:46:15 np0005645166.novalocal systemd[1]: Started Session c23 of User root. Mar 12 05:46:15 np0005645166.novalocal sudo[91786]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:16 np0005645166.novalocal sudo[91786]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:16 np0005645166.novalocal systemd[1]: session-c23.scope: Deactivated successfully. Mar 12 05:46:16 np0005645166.novalocal sudo[91791]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:46:16 np0005645166.novalocal systemd[1]: Started Session c24 of User root. Mar 12 05:46:16 np0005645166.novalocal sudo[91791]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:46:16 np0005645166.novalocal systemd[1]: Started OpenStack Neutron (RPC only) Server. Mar 12 05:46:16 np0005645166.novalocal sudo[91791]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:16 np0005645166.novalocal systemd[1]: session-c24.scope: Deactivated successfully. Mar 12 05:46:16 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:16 np0005645166.novalocal systemd-sysv-generator[91827]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:16 np0005645166.novalocal systemd-rc-local-generator[91823]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:16 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:17 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:17 np0005645166.novalocal systemd-sysv-generator[91866]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:17 np0005645166.novalocal systemd-rc-local-generator[91861]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:17 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:17 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:18 np0005645166.novalocal systemd-sysv-generator[91910]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:18 np0005645166.novalocal systemd-rc-local-generator[91905]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:18 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:18 np0005645166.novalocal systemd[1]: Starting OpenStack Neutron Periodic Workers... Mar 12 05:46:18 np0005645166.novalocal neutron-periodic-workers[91922]: This program is using eventlet and has been monkey_patched Mar 12 05:46:21 np0005645166.novalocal systemd[1]: Started OpenStack Neutron Periodic Workers. Mar 12 05:46:21 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:21 np0005645166.novalocal systemd-sysv-generator[91953]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:21 np0005645166.novalocal systemd-rc-local-generator[91950]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:21 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:21 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:22 np0005645166.novalocal systemd-rc-local-generator[91989]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:22 np0005645166.novalocal systemd-sysv-generator[91994]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:22 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:22 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:22 np0005645166.novalocal systemd-rc-local-generator[92033]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:22 np0005645166.novalocal systemd-sysv-generator[92037]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:22 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:23 np0005645166.novalocal systemd[1]: Started OpenStack Neutron OVN Agent. Mar 12 05:46:23 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:23 np0005645166.novalocal systemd-rc-local-generator[92077]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:23 np0005645166.novalocal systemd-sysv-generator[92082]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:23 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:23 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:23 np0005645166.novalocal systemd-rc-local-generator[92118]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:23 np0005645166.novalocal systemd-sysv-generator[92121]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:23 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:24 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:24 np0005645166.novalocal systemd-sysv-generator[92161]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:24 np0005645166.novalocal systemd-rc-local-generator[92158]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:24 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:24 np0005645166.novalocal systemd[1]: Started OpenStack Neutron VPNaaS support for OVN. Mar 12 05:46:24 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:25 np0005645166.novalocal systemd-rc-local-generator[92207]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:25 np0005645166.novalocal systemd-sysv-generator[92210]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:25 np0005645166.novalocal neutron-ovn-vpn-agent[92177]: This program is using eventlet and has been monkey_patched Mar 12 05:46:25 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:25 np0005645166.novalocal sudo[92227]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmp2axnj1rj/privsep.sock Mar 12 05:46:25 np0005645166.novalocal systemd[1]: Started Session c25 of User root. Mar 12 05:46:25 np0005645166.novalocal sudo[92227]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 12 05:46:25 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:25 np0005645166.novalocal systemd-rc-local-generator[92258]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:25 np0005645166.novalocal systemd-sysv-generator[92261]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:25 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:25 np0005645166.novalocal kernel: capability: warning: `privsep-helper' uses deprecated v2 capabilities in a way that may be insecure Mar 12 05:46:25 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:26 np0005645166.novalocal sudo[92227]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:26 np0005645166.novalocal systemd-rc-local-generator[92301]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:26 np0005645166.novalocal systemd-sysv-generator[92305]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:26 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:26 np0005645166.novalocal systemd[1]: Starting OpenStack Neutron OVN Maintenance Worker... Mar 12 05:46:26 np0005645166.novalocal neutron-ovn-maintenance-worker[92323]: This program is using eventlet and has been monkey_patched Mar 12 05:46:27 np0005645166.novalocal sudo[92336]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpr16fdywj/privsep.sock Mar 12 05:46:27 np0005645166.novalocal systemd[1]: Started Session c26 of User root. Mar 12 05:46:27 np0005645166.novalocal sudo[92336]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 12 05:46:28 np0005645166.novalocal sudo[92336]: pam_unix(sudo:session): session closed for user root Mar 12 05:46:29 np0005645166.novalocal systemd[1]: Started OpenStack Neutron OVN Maintenance Worker. Mar 12 05:46:29 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:29 np0005645166.novalocal systemd-rc-local-generator[92371]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:29 np0005645166.novalocal systemd-sysv-generator[92376]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:29 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:29 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:29 np0005645166.novalocal systemd-rc-local-generator[92416]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:29 np0005645166.novalocal systemd-sysv-generator[92421]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:30 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:30 np0005645166.novalocal runuser[92434]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:30 np0005645166.novalocal sshd-session[92350]: Invalid user nasuser from 152.32.129.186 port 29182 Mar 12 05:46:30 np0005645166.novalocal sshd-session[92350]: Received disconnect from 152.32.129.186 port 29182:11: Bye Bye [preauth] Mar 12 05:46:30 np0005645166.novalocal sshd-session[92350]: Disconnected from invalid user nasuser 152.32.129.186 port 29182 [preauth] Mar 12 05:46:30 np0005645166.novalocal runuser[92434]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:30 np0005645166.novalocal runuser[92486]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:31 np0005645166.novalocal runuser[92486]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:31 np0005645166.novalocal runuser[92539]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:32 np0005645166.novalocal runuser[92539]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:32 np0005645166.novalocal runuser[92591]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:33 np0005645166.novalocal runuser[92591]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:33 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:33 np0005645166.novalocal systemd-rc-local-generator[92669]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:33 np0005645166.novalocal systemd-sysv-generator[92675]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:33 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:34 np0005645166.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Mar 12 05:46:34 np0005645166.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Mar 12 05:46:34 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:34 np0005645166.novalocal systemd-sysv-generator[92714]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:34 np0005645166.novalocal systemd-rc-local-generator[92711]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:34 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:34 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:34 np0005645166.novalocal systemd-rc-local-generator[92750]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:34 np0005645166.novalocal systemd-sysv-generator[92754]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:34 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:35 np0005645166.novalocal sshd-session[92763]: Invalid user sky from 165.227.152.183 port 38410 Mar 12 05:46:35 np0005645166.novalocal sshd-session[92763]: Received disconnect from 165.227.152.183 port 38410:11: Bye Bye [preauth] Mar 12 05:46:35 np0005645166.novalocal sshd-session[92763]: Disconnected from invalid user sky 165.227.152.183 port 38410 [preauth] Mar 12 05:46:35 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:35 np0005645166.novalocal systemd-rc-local-generator[92797]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:35 np0005645166.novalocal systemd-sysv-generator[92801]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:35 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:36 np0005645166.novalocal systemd[1]: Listening on libvirt locking daemon socket. Mar 12 05:46:36 np0005645166.novalocal systemd[1]: Listening on libvirt locking daemon admin socket. Mar 12 05:46:36 np0005645166.novalocal systemd[1]: Starting libvirt locking daemon... Mar 12 05:46:36 np0005645166.novalocal systemd[1]: Started libvirt locking daemon. Mar 12 05:46:36 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:36 np0005645166.novalocal systemd-rc-local-generator[92844]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:36 np0005645166.novalocal systemd-sysv-generator[92849]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:36 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:36 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:36 np0005645166.novalocal systemd-sysv-generator[92882]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:36 np0005645166.novalocal systemd-rc-local-generator[92879]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:36 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:37 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:37 np0005645166.novalocal systemd-rc-local-generator[92923]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:37 np0005645166.novalocal systemd-sysv-generator[92928]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:37 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:37 np0005645166.novalocal systemd[1]: Listening on libvirt logging daemon socket. Mar 12 05:46:37 np0005645166.novalocal systemd[1]: Listening on libvirt logging daemon admin socket. Mar 12 05:46:37 np0005645166.novalocal systemd[1]: Starting libvirt logging daemon... Mar 12 05:46:37 np0005645166.novalocal systemd[1]: Started libvirt logging daemon. Mar 12 05:46:37 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:38 np0005645166.novalocal systemd-rc-local-generator[92963]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:38 np0005645166.novalocal systemd-sysv-generator[92967]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:38 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:38 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:38 np0005645166.novalocal systemd-sysv-generator[93007]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:38 np0005645166.novalocal systemd-rc-local-generator[93004]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:38 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:39 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:39 np0005645166.novalocal systemd-sysv-generator[93053]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:39 np0005645166.novalocal systemd-rc-local-generator[93048]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:39 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:39 np0005645166.novalocal systemd[1]: Listening on libvirt secret daemon socket. Mar 12 05:46:40 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:40 np0005645166.novalocal systemd-sysv-generator[93098]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:40 np0005645166.novalocal systemd-rc-local-generator[93093]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:40 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:40 np0005645166.novalocal systemd[1]: Listening on libvirt nodedev daemon socket. Mar 12 05:46:41 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:41 np0005645166.novalocal systemd-sysv-generator[93141]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:41 np0005645166.novalocal systemd-rc-local-generator[93137]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:41 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:41 np0005645166.novalocal systemd[1]: Listening on libvirt QEMU daemon socket. Mar 12 05:46:42 np0005645166.novalocal systemd[1]: virtproxyd-tcp.socket: Deactivated successfully. Mar 12 05:46:42 np0005645166.novalocal systemd[1]: Closed libvirt proxy daemon non-TLS IP socket. Mar 12 05:46:42 np0005645166.novalocal systemd[1]: Stopping libvirt proxy daemon non-TLS IP socket... Mar 12 05:46:42 np0005645166.novalocal systemd[1]: virtproxyd.socket: Deactivated successfully. Mar 12 05:46:42 np0005645166.novalocal systemd[1]: Closed libvirt proxy daemon socket. Mar 12 05:46:42 np0005645166.novalocal systemd[1]: Stopping libvirt proxy daemon socket... Mar 12 05:46:42 np0005645166.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Mar 12 05:46:42 np0005645166.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Mar 12 05:46:42 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:42 np0005645166.novalocal systemd-rc-local-generator[93190]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:42 np0005645166.novalocal systemd-sysv-generator[93195]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:42 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:42 np0005645166.novalocal systemd[1]: Listening on libvirt storage daemon socket. Mar 12 05:46:43 np0005645166.novalocal systemd[1]: Created slice Virtual Machine and Container Slice. Mar 12 05:46:43 np0005645166.novalocal systemd[1]: Listening on libvirt QEMU daemon admin socket. Mar 12 05:46:43 np0005645166.novalocal systemd[1]: Listening on libvirt QEMU daemon read-only socket. Mar 12 05:46:43 np0005645166.novalocal systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Mar 12 05:46:43 np0005645166.novalocal systemd[1]: Starting Virtual Machine and Container Registration Service... Mar 12 05:46:43 np0005645166.novalocal systemd[1]: Started Virtual Machine and Container Registration Service. Mar 12 05:46:43 np0005645166.novalocal systemd[1]: Starting libvirt QEMU daemon... Mar 12 05:46:43 np0005645166.novalocal systemd[1]: Started libvirt QEMU daemon. Mar 12 05:46:43 np0005645166.novalocal virtqemud[93214]: libvirt version: 11.10.0, package: 4.el9 (builder@centos.org, 2026-01-29-15:25:17, ) Mar 12 05:46:43 np0005645166.novalocal virtqemud[93214]: hostname: np0005645166.novalocal Mar 12 05:46:43 np0005645166.novalocal virtqemud[93214]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Mar 12 05:46:43 np0005645166.novalocal virtqemud[93214]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Mar 12 05:46:43 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:43 np0005645166.novalocal systemd-rc-local-generator[93262]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:43 np0005645166.novalocal systemd-sysv-generator[93267]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:43 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:44 np0005645166.novalocal systemd[1]: Reached target libvirt guests shutdown target. Mar 12 05:46:44 np0005645166.novalocal systemd[1]: Starting libvirt guests suspend/resume service... Mar 12 05:46:44 np0005645166.novalocal systemd[1]: Finished libvirt guests suspend/resume service. Mar 12 05:46:44 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:44 np0005645166.novalocal systemd-rc-local-generator[93310]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:44 np0005645166.novalocal systemd-sysv-generator[93315]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:44 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:44 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:44 np0005645166.novalocal systemd-rc-local-generator[93353]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:44 np0005645166.novalocal systemd-sysv-generator[93356]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:44 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:45 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:45 np0005645166.novalocal systemd-rc-local-generator[93394]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:45 np0005645166.novalocal systemd-sysv-generator[93399]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:45 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:46 np0005645166.novalocal systemd[1]: Started OpenStack Nova NoVNC Proxy Server. Mar 12 05:46:46 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:46 np0005645166.novalocal systemd-sysv-generator[93439]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:46 np0005645166.novalocal systemd-rc-local-generator[93435]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:46 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:46 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:46 np0005645166.novalocal systemd-rc-local-generator[93477]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:46 np0005645166.novalocal systemd-sysv-generator[93482]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:46 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:47 np0005645166.novalocal runuser[93495]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:47 np0005645166.novalocal runuser[93495]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:47 np0005645166.novalocal runuser[93585]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:48 np0005645166.novalocal runuser[93585]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:48 np0005645166.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 12 05:46:48 np0005645166.novalocal runuser[93639]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:48 np0005645166.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 12 05:46:48 np0005645166.novalocal runuser[93639]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:49 np0005645166.novalocal runuser[93693]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:49 np0005645166.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service. Mar 12 05:46:49 np0005645166.novalocal runuser[93693]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:50 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:50 np0005645166.novalocal systemd-rc-local-generator[93781]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:50 np0005645166.novalocal systemd-sysv-generator[93786]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 6517ba8b-b9c0-4e75-b06d-7c41235ae7ff Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l cfbf334c-a0f0-4047-8e1d-868da3c07dff Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 12 05:46:50 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 7759dd85-c7d7-4eb1-9fd8-3aac8c72ec4e Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l d5851dad-347f-4522-aac3-4ff08f6ba0f2 Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l c61883bc-32d5-4695-ad59-efd08173f758 Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 21a6c451-5b7b-4bad-bce8-54e2b8480c42 Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 91d4fbc4-44c2-432a-9264-9b9691e7be8d Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l af14c964-6f25-45d4-a2c2-6d83fe1fccea Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 06f23362-385e-408d-b5c7-0eefdd162716 Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 12 05:46:50 np0005645166.novalocal systemd[1]: Started OpenStack Octavia Health-Manager service. Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 3b0b33c8-ec03-454c-bf3b-1810d06c661b Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 242148f6-374c-4b48-9374-b72a085429de Mar 12 05:46:50 np0005645166.novalocal setroubleshoot[93638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 12 05:46:50 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:50 np0005645166.novalocal systemd-sysv-generator[93838]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:50 np0005645166.novalocal systemd-rc-local-generator[93835]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:51 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:51 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:51 np0005645166.novalocal systemd-rc-local-generator[93872]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:51 np0005645166.novalocal systemd-sysv-generator[93876]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:51 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:51 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:52 np0005645166.novalocal systemd-rc-local-generator[93915]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:52 np0005645166.novalocal systemd-sysv-generator[93918]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:52 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:52 np0005645166.novalocal systemd[1]: Started OpenStack Octavia Housekeeping service. Mar 12 05:46:52 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:52 np0005645166.novalocal systemd-rc-local-generator[93961]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:52 np0005645166.novalocal systemd-sysv-generator[93964]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:52 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:52 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:53 np0005645166.novalocal systemd-sysv-generator[94003]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:53 np0005645166.novalocal systemd-rc-local-generator[93998]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:53 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:53 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:53 np0005645166.novalocal systemd-sysv-generator[94043]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:53 np0005645166.novalocal systemd-rc-local-generator[94040]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:53 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:54 np0005645166.novalocal systemd[1]: Started OpenStack Octavia Driver Agent service. Mar 12 05:46:54 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:54 np0005645166.novalocal systemd-sysv-generator[94087]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:54 np0005645166.novalocal systemd-rc-local-generator[94084]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:54 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:54 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:54 np0005645166.novalocal systemd-rc-local-generator[94128]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:54 np0005645166.novalocal systemd-sysv-generator[94131]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:54 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:55 np0005645166.novalocal runuser[94143]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:55 np0005645166.novalocal runuser[94143]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:55 np0005645166.novalocal runuser[94195]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:56 np0005645166.novalocal runuser[94195]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:56 np0005645166.novalocal runuser[94255]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:57 np0005645166.novalocal runuser[94255]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:57 np0005645166.novalocal runuser[94307]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:46:57 np0005645166.novalocal runuser[94307]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:46:58 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:58 np0005645166.novalocal systemd-rc-local-generator[94408]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:58 np0005645166.novalocal systemd-sysv-generator[94413]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:58 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:58 np0005645166.novalocal systemd[1]: Started OpenStack Manila Scheduler. Mar 12 05:46:59 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:59 np0005645166.novalocal systemd-rc-local-generator[94450]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:59 np0005645166.novalocal systemd-sysv-generator[94453]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:59 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:46:59 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:46:59 np0005645166.novalocal systemd-sysv-generator[94494]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:46:59 np0005645166.novalocal systemd-rc-local-generator[94491]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:46:59 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:47:00 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:47:00 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:47:00 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:47:00 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:47:00 np0005645166.novalocal systemd-rc-local-generator[94534]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:47:00 np0005645166.novalocal systemd-sysv-generator[94539]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:47:00 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:47:00 np0005645166.novalocal systemd[1]: Started OpenStack Manila Share Service. Mar 12 05:47:00 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Mar 12 05:47:00 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Consumed 1.170s CPU time. Mar 12 05:47:00 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:47:00 np0005645166.novalocal systemd-rc-local-generator[94574]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:47:00 np0005645166.novalocal systemd-sysv-generator[94577]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:47:01 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:47:01 np0005645166.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 12 05:47:01 np0005645166.novalocal systemd[1]: setroubleshootd.service: Consumed 1.203s CPU time. Mar 12 05:47:01 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:47:01 np0005645166.novalocal systemd-sysv-generator[94618]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:47:01 np0005645166.novalocal systemd-rc-local-generator[94615]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:47:01 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:47:01 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:47:01 np0005645166.novalocal systemd-sysv-generator[94662]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:47:01 np0005645166.novalocal systemd-rc-local-generator[94659]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:47:02 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:47:02 np0005645166.novalocal systemd[1]: Started OpenStack Manila Data Server. Mar 12 05:47:02 np0005645166.novalocal sudo[94680]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/privsep-helper --config-file /usr/share/manila/manila-dist.conf --config-file /etc/manila/manila.conf --privsep_context manila.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpqnx7p0lf/privsep.sock Mar 12 05:47:02 np0005645166.novalocal systemd[1]: Started Session c27 of User root. Mar 12 05:47:02 np0005645166.novalocal sudo[94680]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=978) Mar 12 05:47:02 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:47:02 np0005645166.novalocal systemd-rc-local-generator[94706]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:47:02 np0005645166.novalocal systemd-sysv-generator[94709]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:47:02 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:47:02 np0005645166.novalocal sudo[94680]: pam_unix(sudo:session): session closed for user root Mar 12 05:47:02 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:47:02 np0005645166.novalocal systemd-sysv-generator[94749]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:47:02 np0005645166.novalocal systemd-rc-local-generator[94746]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:47:03 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:47:03 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:47:04 np0005645166.novalocal systemd-rc-local-generator[94795]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:47:04 np0005645166.novalocal systemd-sysv-generator[94800]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:47:04 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:47:04 np0005645166.novalocal systemd[1]: Starting One-time temporary TLS key generation for httpd.service... Mar 12 05:47:04 np0005645166.novalocal systemd[1]: httpd-init.service: Deactivated successfully. Mar 12 05:47:04 np0005645166.novalocal systemd[1]: Finished One-time temporary TLS key generation for httpd.service. Mar 12 05:47:04 np0005645166.novalocal systemd[1]: Starting The Apache HTTP Server... Mar 12 05:47:05 np0005645166.novalocal python3[94818]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Mar 12 05:47:05 np0005645166.novalocal python3[94818]: version_info = version.StrictVersion(__version__).version Mar 12 05:47:08 np0005645166.novalocal python3[94823]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Mar 12 05:47:08 np0005645166.novalocal python3[94823]: version_info = version.StrictVersion(__version__).version Mar 12 05:47:12 np0005645166.novalocal httpd[94834]: Server configured, listening on: ::1 port 9876, ... Mar 12 05:47:12 np0005645166.novalocal systemd[1]: Started The Apache HTTP Server. Mar 12 05:47:12 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:47:12 np0005645166.novalocal systemd-rc-local-generator[94953]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:47:12 np0005645166.novalocal systemd-sysv-generator[94959]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:47:12 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:47:12 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:47:12 np0005645166.novalocal systemd-sysv-generator[94999]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:47:12 np0005645166.novalocal systemd-rc-local-generator[94995]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:47:12 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:47:13 np0005645166.novalocal crontab[95010]: (root) REPLACE (keystone) Mar 12 05:47:15 np0005645166.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 12 05:47:15 np0005645166.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 12 05:47:15 np0005645166.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service. Mar 12 05:47:17 np0005645166.novalocal setroubleshoot[95017]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 05fc3404-5d38-4675-b255-0815e8866e4a Mar 12 05:47:17 np0005645166.novalocal setroubleshoot[95017]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:47:17 np0005645166.novalocal setroubleshoot[95017]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 26f5936f-ac5a-4da4-a728-5b55c6a606c8 Mar 12 05:47:17 np0005645166.novalocal setroubleshoot[95017]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:47:17 np0005645166.novalocal setroubleshoot[95017]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). For complete SELinux messages run: sealert -l e28c7749-0f8e-4a24-99e5-3ca510375bb2 Mar 12 05:47:17 np0005645166.novalocal setroubleshoot[95017]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:47:17 np0005645166.novalocal setroubleshoot[95017]: failed to retrieve rpm info for path '/var/lib/keystone/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16': Mar 12 05:47:17 np0005645166.novalocal setroubleshoot[95017]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. For complete SELinux messages run: sealert -l a984a86f-10f8-40cf-a015-712dcb7d9a83 Mar 12 05:47:17 np0005645166.novalocal setroubleshoot[95017]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:47:19 np0005645166.novalocal sudo[95039]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:47:19 np0005645166.novalocal systemd[1]: Started Session c28 of User root. Mar 12 05:47:19 np0005645166.novalocal sudo[95039]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:47:20 np0005645166.novalocal sudo[95039]: pam_unix(sudo:session): session closed for user root Mar 12 05:47:20 np0005645166.novalocal systemd[1]: session-c28.scope: Deactivated successfully. Mar 12 05:47:20 np0005645166.novalocal sudo[95043]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:47:20 np0005645166.novalocal systemd[1]: Started Session c29 of User root. Mar 12 05:47:20 np0005645166.novalocal sudo[95043]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:47:20 np0005645166.novalocal sudo[95043]: pam_unix(sudo:session): session closed for user root Mar 12 05:47:20 np0005645166.novalocal systemd[1]: session-c29.scope: Deactivated successfully. Mar 12 05:47:20 np0005645166.novalocal sudo[95048]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 12 05:47:20 np0005645166.novalocal systemd[1]: Started Session c30 of User root. Mar 12 05:47:20 np0005645166.novalocal sudo[95048]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:47:20 np0005645166.novalocal sudo[95048]: pam_unix(sudo:session): session closed for user root Mar 12 05:47:20 np0005645166.novalocal systemd[1]: session-c30.scope: Deactivated successfully. Mar 12 05:47:20 np0005645166.novalocal sudo[95052]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:47:20 np0005645166.novalocal systemd[1]: Started Session c31 of User root. Mar 12 05:47:20 np0005645166.novalocal sudo[95052]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:47:21 np0005645166.novalocal sudo[95052]: pam_unix(sudo:session): session closed for user root Mar 12 05:47:21 np0005645166.novalocal systemd[1]: session-c31.scope: Deactivated successfully. Mar 12 05:47:27 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Deactivated successfully. Mar 12 05:47:27 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Consumed 1.339s CPU time. Mar 12 05:47:27 np0005645166.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 12 05:47:27 np0005645166.novalocal systemd[1]: setroubleshootd.service: Consumed 1.032s CPU time. Mar 12 05:47:30 np0005645166.novalocal sshd[45723]: Timeout before authentication for connection from 14.103.203.191 to 38.102.83.224, pid = 89455 Mar 12 05:47:54 np0005645166.novalocal octavia-health-manager[94065]: /usr/lib/python3.9/site-packages/octavia/db/repositories.py:1661: SAWarning: Coercing Subquery object into a select() for use in IN(); please pass a select() construct explicitly Mar 12 05:47:54 np0005645166.novalocal octavia-health-manager[94065]: self.model_class.amphora_id.in_(expired_ids_query) Mar 12 05:48:01 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:48:01 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:48:01 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:48:11 np0005645166.novalocal sshd[45723]: Timeout before authentication for connection from 14.103.203.191 to 38.102.83.224, pid = 91554 Mar 12 05:48:13 np0005645166.novalocal sshd-session[95179]: Invalid user n8n from 165.227.152.183 port 42846 Mar 12 05:48:13 np0005645166.novalocal sshd-session[95179]: Received disconnect from 165.227.152.183 port 42846:11: Bye Bye [preauth] Mar 12 05:48:13 np0005645166.novalocal sshd-session[95179]: Disconnected from invalid user n8n 165.227.152.183 port 42846 [preauth] Mar 12 05:48:19 np0005645166.novalocal sudo[95194]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:48:19 np0005645166.novalocal systemd[1]: Started Session c32 of User root. Mar 12 05:48:19 np0005645166.novalocal sudo[95194]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:48:19 np0005645166.novalocal sshd-session[95189]: Invalid user bart from 152.32.129.186 port 11146 Mar 12 05:48:20 np0005645166.novalocal sshd-session[95189]: Received disconnect from 152.32.129.186 port 11146:11: Bye Bye [preauth] Mar 12 05:48:20 np0005645166.novalocal sshd-session[95189]: Disconnected from invalid user bart 152.32.129.186 port 11146 [preauth] Mar 12 05:48:20 np0005645166.novalocal sudo[95194]: pam_unix(sudo:session): session closed for user root Mar 12 05:48:20 np0005645166.novalocal systemd[1]: session-c32.scope: Deactivated successfully. Mar 12 05:48:20 np0005645166.novalocal sudo[95198]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:48:20 np0005645166.novalocal systemd[1]: Started Session c33 of User root. Mar 12 05:48:20 np0005645166.novalocal sudo[95198]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:48:20 np0005645166.novalocal sudo[95198]: pam_unix(sudo:session): session closed for user root Mar 12 05:48:20 np0005645166.novalocal systemd[1]: session-c33.scope: Deactivated successfully. Mar 12 05:48:20 np0005645166.novalocal sudo[95202]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 12 05:48:20 np0005645166.novalocal systemd[1]: Started Session c34 of User root. Mar 12 05:48:20 np0005645166.novalocal sudo[95202]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:48:20 np0005645166.novalocal sudo[95202]: pam_unix(sudo:session): session closed for user root Mar 12 05:48:20 np0005645166.novalocal systemd[1]: session-c34.scope: Deactivated successfully. Mar 12 05:48:21 np0005645166.novalocal sudo[95206]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:48:21 np0005645166.novalocal systemd[1]: Started Session c35 of User root. Mar 12 05:48:21 np0005645166.novalocal sudo[95206]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:48:21 np0005645166.novalocal sudo[95206]: pam_unix(sudo:session): session closed for user root Mar 12 05:48:21 np0005645166.novalocal systemd[1]: session-c35.scope: Deactivated successfully. Mar 12 05:48:39 np0005645166.novalocal sshd-session[95248]: Connection closed by 80.94.92.171 port 43696 Mar 12 05:48:42 np0005645166.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 12 05:48:42 np0005645166.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 12 05:48:43 np0005645166.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service. Mar 12 05:48:43 np0005645166.novalocal systemd[1]: virtqemud.service: Deactivated successfully. Mar 12 05:48:44 np0005645166.novalocal setroubleshoot[95255]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l f5bd0022-be73-4c9f-a5b1-36ec6a9050bb Mar 12 05:48:44 np0005645166.novalocal setroubleshoot[95255]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Mar 12 05:48:44 np0005645166.novalocal setroubleshoot[95255]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l c59622b9-959f-4202-9c74-99f2b6bed917 Mar 12 05:48:44 np0005645166.novalocal setroubleshoot[95255]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Mar 12 05:48:44 np0005645166.novalocal setroubleshoot[95255]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 9579d8c5-6f1b-4d19-9aba-4e9df851a4d7 Mar 12 05:48:44 np0005645166.novalocal setroubleshoot[95255]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Mar 12 05:48:54 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Deactivated successfully. Mar 12 05:48:54 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Consumed 1.253s CPU time. Mar 12 05:48:54 np0005645166.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 12 05:48:54 np0005645166.novalocal systemd[1]: setroubleshootd.service: Consumed 1.072s CPU time. Mar 12 05:49:01 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:49:01 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:49:01 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:49:13 np0005645166.novalocal sshd[45723]: Timeout before authentication for connection from 175.12.108.55 to 38.102.83.224, pid = 94830 Mar 12 05:49:19 np0005645166.novalocal sudo[95385]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58 cinder-volumes/cinder-volumes-pool Mar 12 05:49:19 np0005645166.novalocal systemd[1]: Started Session c36 of User root. Mar 12 05:49:19 np0005645166.novalocal sudo[95385]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:19 np0005645166.novalocal dmeventd[91275]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool. Mar 12 05:49:19 np0005645166.novalocal sudo[95401]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:49:19 np0005645166.novalocal systemd[1]: Started Session c37 of User root. Mar 12 05:49:19 np0005645166.novalocal sudo[95401]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:20 np0005645166.novalocal dmeventd[91275]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Mar 12 05:49:20 np0005645166.novalocal sudo[95385]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:20 np0005645166.novalocal systemd[1]: session-c36.scope: Deactivated successfully. Mar 12 05:49:20 np0005645166.novalocal sudo[95401]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:20 np0005645166.novalocal systemd[1]: session-c37.scope: Deactivated successfully. Mar 12 05:49:20 np0005645166.novalocal sudo[95445]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:49:20 np0005645166.novalocal systemd[1]: Started Session c38 of User root. Mar 12 05:49:20 np0005645166.novalocal sudo[95445]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:21 np0005645166.novalocal sudo[95445]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:21 np0005645166.novalocal systemd[1]: session-c38.scope: Deactivated successfully. Mar 12 05:49:21 np0005645166.novalocal sudo[95449]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 12 05:49:21 np0005645166.novalocal systemd[1]: Started Session c39 of User root. Mar 12 05:49:21 np0005645166.novalocal sudo[95449]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:21 np0005645166.novalocal sudo[95449]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:21 np0005645166.novalocal systemd[1]: session-c39.scope: Deactivated successfully. Mar 12 05:49:21 np0005645166.novalocal sudo[95453]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:49:21 np0005645166.novalocal systemd[1]: Started Session c40 of User root. Mar 12 05:49:21 np0005645166.novalocal sudo[95453]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:21 np0005645166.novalocal sudo[95453]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:21 np0005645166.novalocal systemd[1]: session-c40.scope: Deactivated successfully. Mar 12 05:49:22 np0005645166.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 12 05:49:22 np0005645166.novalocal sudo[95458]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmprw0vmu5j/privsep.sock Mar 12 05:49:22 np0005645166.novalocal systemd[1]: Started Session c41 of User root. Mar 12 05:49:22 np0005645166.novalocal sudo[95458]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 12 05:49:23 np0005645166.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 12 05:49:23 np0005645166.novalocal sudo[95458]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:23 np0005645166.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service. Mar 12 05:49:23 np0005645166.novalocal sudo[95492]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58 Mar 12 05:49:23 np0005645166.novalocal systemd[1]: Started Session c42 of User root. Mar 12 05:49:23 np0005645166.novalocal sudo[95492]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:24 np0005645166.novalocal sudo[95492]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:24 np0005645166.novalocal systemd[1]: session-c42.scope: Deactivated successfully. Mar 12 05:49:24 np0005645166.novalocal sudo[95498]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58 iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58 QMwVeJZYCf7oUxmSs5Y8 gHBVMdirWHZaGkL7 False -p3260 -a::1 Mar 12 05:49:24 np0005645166.novalocal systemd[1]: Started Session c43 of User root. Mar 12 05:49:24 np0005645166.novalocal sudo[95498]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:25 np0005645166.novalocal sudo[95498]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:25 np0005645166.novalocal systemd[1]: session-c43.scope: Deactivated successfully. Mar 12 05:49:25 np0005645166.novalocal sudo[95517]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 21b80a7d-191f-4cce-af26-6dde370bbb86 Mar 12 05:49:25 np0005645166.novalocal systemd[1]: Started Session c44 of User root. Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 12 05:49:25 np0005645166.novalocal sudo[95517]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 072aa9a9-44c2-491b-8f12-925a0388ba4f Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 51ca715f-2b95-4424-ba0c-f037f86ee58c Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 5e619993-9d07-41e5-9f76-05cd9babcd6d Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 608b4c3e-655e-41df-b9d1-606a6fefb177 Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 88c9e50e-4a01-43c5-9503-fc2fc7573753 Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 072aa9a9-44c2-491b-8f12-925a0388ba4f Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 51ca715f-2b95-4424-ba0c-f037f86ee58c Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 5e619993-9d07-41e5-9f76-05cd9babcd6d Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 2ecac211-cb1e-4da8-8a58-19f897b09410 Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 00a5ca78-86a9-482d-a184-e19ace3bddfa Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: failed to retrieve rpm info for path '/dev/vda1': Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l b2fb06b9-128c-4fcd-95c1-c1ecff22bc35 Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l d4a4b0bf-261f-4c41-9a4b-9a9c2de22030 Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 5b56d893-33e7-4d25-a824-6e8fde3a7ca3 Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2377ce81-4c2e-42f6-8409-7b51f19bc62c Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l e13ef345-03ce-4405-b9c7-b8a04bd1a225 Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 69c0fc82-8fab-461c-918a-1e1aa3bed51e Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 9861b6b3-6ae7-4bd1-b412-f8f862295406 Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l baefcf22-f45e-49fb-8150-45ab4de1e151 Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-FeoEyz. For complete SELinux messages run: sealert -l ca9593e1-0238-4ceb-ad7a-5004dcbecb5c Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-FeoEyz. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-FeoEyz file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-FeoEyz. For complete SELinux messages run: sealert -l f671cadb-3369-4b6a-b973-209c7998a7c3 Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-FeoEyz. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-FeoEyz file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 431d1652-e72b-4a8d-af11-804cf9e1ef16 Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l cb59bffe-0c34-425c-85d0-e72e165d5cd4 Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l fb41ee91-2852-41f4-bf39-0d8983e2e2a9 Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 9e1e371c-be34-43d2-842a-64d211f47e9d Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 001dc8d3-4294-495e-95a7-144c15a8067b Mar 12 05:49:25 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:25 np0005645166.novalocal sudo[95517]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:25 np0005645166.novalocal systemd[1]: session-c44.scope: Deactivated successfully. Mar 12 05:49:25 np0005645166.novalocal sudo[95529]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 12 05:49:25 np0005645166.novalocal systemd[1]: Started Session c45 of User root. Mar 12 05:49:25 np0005645166.novalocal sudo[95529]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:26 np0005645166.novalocal sudo[95529]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:26 np0005645166.novalocal systemd[1]: session-c45.scope: Deactivated successfully. Mar 12 05:49:26 np0005645166.novalocal sudo[95534]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58 QMwVeJZYCf7oUxmSs5Y8 gHBVMdirWHZaGkL7 iqn.1994-05.com.redhat:7028c7235f3 Mar 12 05:49:26 np0005645166.novalocal systemd[1]: Started Session c46 of User root. Mar 12 05:49:26 np0005645166.novalocal sudo[95534]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:26 np0005645166.novalocal sudo[95534]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:26 np0005645166.novalocal systemd[1]: session-c46.scope: Deactivated successfully. Mar 12 05:49:26 np0005645166.novalocal sudo[95539]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 12 05:49:26 np0005645166.novalocal systemd[1]: Started Session c47 of User root. Mar 12 05:49:26 np0005645166.novalocal sudo[95539]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:27 np0005645166.novalocal sudo[95539]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:27 np0005645166.novalocal systemd[1]: session-c47.scope: Deactivated successfully. Mar 12 05:49:27 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 9b4dbb39-488e-4ff5-a981-96457253e152 Mar 12 05:49:27 np0005645166.novalocal kernel: iscsi: registered transport (tcp) Mar 12 05:49:27 np0005645166.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Mar 12 05:49:27 np0005645166.novalocal iscsid[75482]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58, portal: ::1,3260] through [iface: default] is operational now Mar 12 05:49:28 np0005645166.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Mar 12 05:49:28 np0005645166.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Mar 12 05:49:28 np0005645166.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405366f39c1aa64479085d387ba9 port group 0 rel port 1 Mar 12 05:49:28 np0005645166.novalocal kernel: scsi 2:0:0:0: Attached scsi generic sg1 type 0 Mar 12 05:49:28 np0005645166.novalocal kernel: scsi 2:0:0:0: alua: transition timeout set to 60 seconds Mar 12 05:49:28 np0005645166.novalocal kernel: scsi 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Mar 12 05:49:28 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Mar 12 05:49:28 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Mar 12 05:49:28 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Mar 12 05:49:28 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Mar 12 05:49:28 np0005645166.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 12 05:49:28 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Mar 12 05:49:28 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 12 05:49:28 np0005645166.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 12 05:49:28 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 98cd215d-6074-4841-b1c4-6737716c3169 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 38c35f0c-5d3c-42e3-a67c-03bdff1d98b1 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l bf49545a-a133-4c51-8f8f-c798d3cf9c34 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 3e9a72a0-31cb-44e4-9adf-1b4bc6693285 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 6220f969-47b1-42be-98a2-3a621b99e6ca Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 4fe5f9ce-e29f-4f59-bfd8-ce0d64e28c6c Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 68b85e26-ffbe-48cc-854e-8c0f64e6dcf3 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l d6838ce0-89c2-4d77-9392-8ee53bba029d Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 148d530e-424c-4a1e-a6d5-d8ba67c4b2f5 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l c14aee62-d4bc-4ad9-8fe2-2516a15edf21 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 14969478-6dfc-4555-b657-dc995d9623ba Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 73c06bf6-3588-47ef-8128-ba7c1c411725 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l debdb582-cbbf-4768-8fac-42732d86c405 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 5102b437-d5dd-4822-840f-d33aca244607 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l f66a08f3-342d-4e9c-aa53-b28d16fd0502 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58/::1,3260. For complete SELinux messages run: sealert -l b69a701b-06aa-4211-9b7e-958e19db9548 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58/::1,3260. For complete SELinux messages run: sealert -l 60bd2b0a-8172-4f32-8e4b-bee7e9bc3836 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e98384e4-9ba1-4c8e-8a0c-cbabc8d1b455 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 148d530e-424c-4a1e-a6d5-d8ba67c4b2f5 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 4fe5f9ce-e29f-4f59-bfd8-ce0d64e28c6c Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 68b85e26-ffbe-48cc-854e-8c0f64e6dcf3 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l c14aee62-d4bc-4ad9-8fe2-2516a15edf21 Mar 12 05:49:28 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:29 np0005645166.novalocal sudo[95603]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Mar 12 05:49:29 np0005645166.novalocal systemd[1]: Started Session c48 of User root. Mar 12 05:49:29 np0005645166.novalocal sudo[95603]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 176d7e4a-fcd8-4373-8f0e-4785937f777c Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l fed631bc-6b32-4a57-8868-f01236b49993 Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 19da076b-9ca2-499f-9ad6-573549155102 Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: failed to retrieve rpm info for path '/dev/sda': Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l b2fb06b9-128c-4fcd-95c1-c1ecff22bc35 Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 21b80a7d-191f-4cce-af26-6dde370bbb86 Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 072aa9a9-44c2-491b-8f12-925a0388ba4f Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 51ca715f-2b95-4424-ba0c-f037f86ee58c Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 5e619993-9d07-41e5-9f76-05cd9babcd6d Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:29 np0005645166.novalocal sudo[95603]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 608b4c3e-655e-41df-b9d1-606a6fefb177 Mar 12 05:49:29 np0005645166.novalocal systemd[1]: session-c48.scope: Deactivated successfully. Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 88c9e50e-4a01-43c5-9503-fc2fc7573753 Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l d8a013a2-8db1-43e4-95fd-ecffa013bc8a Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 4aa063c1-4aea-41d1-9819-457a7d0decd1 Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5b56d893-33e7-4d25-a824-6e8fde3a7ca3 Mar 12 05:49:29 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:30 np0005645166.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 12 05:49:30 np0005645166.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 12 05:49:30 np0005645166.novalocal kernel: GPT:229375 != 2097151 Mar 12 05:49:30 np0005645166.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Mar 12 05:49:30 np0005645166.novalocal kernel: GPT:229375 != 2097151 Mar 12 05:49:30 np0005645166.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Mar 12 05:49:30 np0005645166.novalocal kernel: sda: sda1 sda15 Mar 12 05:49:30 np0005645166.novalocal sudo[95617]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Mar 12 05:49:30 np0005645166.novalocal systemd[1]: Started Session c49 of User root. Mar 12 05:49:30 np0005645166.novalocal sudo[95617]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 12 05:49:30 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2377ce81-4c2e-42f6-8409-7b51f19bc62c Mar 12 05:49:30 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:30 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 072aa9a9-44c2-491b-8f12-925a0388ba4f Mar 12 05:49:30 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:30 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 51ca715f-2b95-4424-ba0c-f037f86ee58c Mar 12 05:49:30 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:30 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 5e619993-9d07-41e5-9f76-05cd9babcd6d Mar 12 05:49:30 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:30 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l b2fb06b9-128c-4fcd-95c1-c1ecff22bc35 Mar 12 05:49:30 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:30 np0005645166.novalocal sudo[95617]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:30 np0005645166.novalocal systemd[1]: session-c49.scope: Deactivated successfully. Mar 12 05:49:30 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l d8a013a2-8db1-43e4-95fd-ecffa013bc8a Mar 12 05:49:30 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l bf49545a-a133-4c51-8f8f-c798d3cf9c34 Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58/::1,3260. For complete SELinux messages run: sealert -l 60bd2b0a-8172-4f32-8e4b-bee7e9bc3836 Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 3e9a72a0-31cb-44e4-9adf-1b4bc6693285 Mar 12 05:49:31 np0005645166.novalocal kernel: scsi 2:0:0:0: alua: Detached Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 6220f969-47b1-42be-98a2-3a621b99e6ca Mar 12 05:49:31 np0005645166.novalocal iscsid[75482]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58, portal: ::1,3260] through [iface: default] is shutdown. Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l d6838ce0-89c2-4d77-9392-8ee53bba029d Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e98384e4-9ba1-4c8e-8a0c-cbabc8d1b455 Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58/::1,3260. For complete SELinux messages run: sealert -l b1834737-53d3-4559-834c-1d99860e5599 Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:31 np0005645166.novalocal sudo[95659]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58 iqn.1994-05.com.redhat:7028c7235f3 Mar 12 05:49:31 np0005645166.novalocal systemd[1]: Started Session c50 of User root. Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 14969478-6dfc-4555-b657-dc995d9623ba Mar 12 05:49:31 np0005645166.novalocal sudo[95659]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 9b4dbb39-488e-4ff5-a981-96457253e152 Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 98cd215d-6074-4841-b1c4-6737716c3169 Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 38c35f0c-5d3c-42e3-a67c-03bdff1d98b1 Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l d4a4b0bf-261f-4c41-9a4b-9a9c2de22030 Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5b56d893-33e7-4d25-a824-6e8fde3a7ca3 Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2377ce81-4c2e-42f6-8409-7b51f19bc62c Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 19da076b-9ca2-499f-9ad6-573549155102 Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 26a84ac9-cc14-4550-87aa-6d2fa6d8938b Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58. For complete SELinux messages run: sealert -l 73c06bf6-3588-47ef-8128-ba7c1c411725 Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l df40407f-ad02-4058-9fcb-b5fd8082c46b Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 5778ebaa-5723-4414-a43c-c7091b55fb29 Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58. For complete SELinux messages run: sealert -l 52c5660b-8919-465b-a9a4-a14025772203 Mar 12 05:49:31 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:31 np0005645166.novalocal sudo[95659]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:31 np0005645166.novalocal systemd[1]: session-c50.scope: Deactivated successfully. Mar 12 05:49:31 np0005645166.novalocal sudo[95666]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 12 05:49:31 np0005645166.novalocal systemd[1]: Started Session c51 of User root. Mar 12 05:49:31 np0005645166.novalocal sudo[95666]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:32 np0005645166.novalocal sudo[95666]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:32 np0005645166.novalocal systemd[1]: session-c51.scope: Deactivated successfully. Mar 12 05:49:32 np0005645166.novalocal sudo[95671]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 12 05:49:32 np0005645166.novalocal systemd[1]: Started Session c52 of User root. Mar 12 05:49:32 np0005645166.novalocal sudo[95671]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:32 np0005645166.novalocal sudo[95671]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:32 np0005645166.novalocal systemd[1]: session-c52.scope: Deactivated successfully. Mar 12 05:49:32 np0005645166.novalocal sudo[95676]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-90d1ee08-f787-4c7f-b0ea-e10af0429f58 Mar 12 05:49:32 np0005645166.novalocal systemd[1]: Started Session c53 of User root. Mar 12 05:49:32 np0005645166.novalocal sudo[95676]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:33 np0005645166.novalocal sudo[95676]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:33 np0005645166.novalocal systemd[1]: session-c53.scope: Deactivated successfully. Mar 12 05:49:33 np0005645166.novalocal sudo[95681]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 12 05:49:33 np0005645166.novalocal systemd[1]: Started Session c54 of User root. Mar 12 05:49:33 np0005645166.novalocal sudo[95681]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:33 np0005645166.novalocal sudo[95681]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:33 np0005645166.novalocal systemd[1]: session-c54.scope: Deactivated successfully. Mar 12 05:49:39 np0005645166.novalocal sudo[95697]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-6e46b599-77d9-439d-ace6-c503aca6e323 cinder-volumes/cinder-volumes-pool Mar 12 05:49:39 np0005645166.novalocal systemd[1]: Started Session c55 of User root. Mar 12 05:49:39 np0005645166.novalocal sudo[95697]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:39 np0005645166.novalocal sudo[95697]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:39 np0005645166.novalocal systemd[1]: session-c55.scope: Deactivated successfully. Mar 12 05:49:40 np0005645166.novalocal sudo[95712]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpqoofbohh/privsep.sock Mar 12 05:49:40 np0005645166.novalocal systemd[1]: Started Session c56 of User root. Mar 12 05:49:40 np0005645166.novalocal sudo[95712]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 21b80a7d-191f-4cce-af26-6dde370bbb86 Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 072aa9a9-44c2-491b-8f12-925a0388ba4f Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 51ca715f-2b95-4424-ba0c-f037f86ee58c Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 5e619993-9d07-41e5-9f76-05cd9babcd6d Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 608b4c3e-655e-41df-b9d1-606a6fefb177 Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 88c9e50e-4a01-43c5-9503-fc2fc7573753 Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 608b4c3e-655e-41df-b9d1-606a6fefb177 Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 88c9e50e-4a01-43c5-9503-fc2fc7573753 Mar 12 05:49:40 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 12 05:49:41 np0005645166.novalocal sudo[95712]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 21b80a7d-191f-4cce-af26-6dde370bbb86 Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 3038c175-d8c9-49d2-b4db-ea773aa7a840 Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l a65f7e1d-923b-43fc-bed1-b0215cd5f75a Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l b2fb06b9-128c-4fcd-95c1-c1ecff22bc35 Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l d4a4b0bf-261f-4c41-9a4b-9a9c2de22030 Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:41 np0005645166.novalocal sudo[95734]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-6e46b599-77d9-439d-ace6-c503aca6e323 Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 5b56d893-33e7-4d25-a824-6e8fde3a7ca3 Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2377ce81-4c2e-42f6-8409-7b51f19bc62c Mar 12 05:49:41 np0005645166.novalocal systemd[1]: Started Session c57 of User root. Mar 12 05:49:41 np0005645166.novalocal sudo[95734]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 5415d537-fe52-4841-aacd-e577589af5c2 Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 69c0fc82-8fab-461c-918a-1e1aa3bed51e Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 9861b6b3-6ae7-4bd1-b412-f8f862295406 Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l baefcf22-f45e-49fb-8150-45ab4de1e151 Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-1UnPxf. For complete SELinux messages run: sealert -l f671cadb-3369-4b6a-b973-209c7998a7c3 Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-1UnPxf. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-1UnPxf file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 431d1652-e72b-4a8d-af11-804cf9e1ef16 Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 001dc8d3-4294-495e-95a7-144c15a8067b Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 7e1d1884-f057-4adf-8af7-4ab2c71bc6b0 Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 9e1e371c-be34-43d2-842a-64d211f47e9d Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l cb59bffe-0c34-425c-85d0-e72e165d5cd4 Mar 12 05:49:41 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:42 np0005645166.novalocal sudo[95734]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:42 np0005645166.novalocal systemd[1]: session-c57.scope: Deactivated successfully. Mar 12 05:49:42 np0005645166.novalocal sudo[95738]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-6e46b599-77d9-439d-ace6-c503aca6e323 iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323 NCoc9ng6fqfvyYHsiVTw L37V5APkkXt2M6Ev False -p3260 -a::1 Mar 12 05:49:42 np0005645166.novalocal systemd[1]: Started Session c58 of User root. Mar 12 05:49:42 np0005645166.novalocal sudo[95738]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:42 np0005645166.novalocal sudo[95738]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:42 np0005645166.novalocal systemd[1]: session-c58.scope: Deactivated successfully. Mar 12 05:49:42 np0005645166.novalocal sudo[95744]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 12 05:49:42 np0005645166.novalocal systemd[1]: Started Session c59 of User root. Mar 12 05:49:42 np0005645166.novalocal sudo[95744]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:43 np0005645166.novalocal sudo[95744]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:43 np0005645166.novalocal systemd[1]: session-c59.scope: Deactivated successfully. Mar 12 05:49:43 np0005645166.novalocal sudo[95749]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 12 05:49:43 np0005645166.novalocal systemd[1]: Started Session c60 of User root. Mar 12 05:49:43 np0005645166.novalocal sudo[95749]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:43 np0005645166.novalocal sudo[95749]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:43 np0005645166.novalocal systemd[1]: session-c60.scope: Deactivated successfully. Mar 12 05:49:43 np0005645166.novalocal sudo[95754]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323 NCoc9ng6fqfvyYHsiVTw L37V5APkkXt2M6Ev iqn.1994-05.com.redhat:7028c7235f3 Mar 12 05:49:43 np0005645166.novalocal systemd[1]: Started Session c61 of User root. Mar 12 05:49:43 np0005645166.novalocal sudo[95754]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:44 np0005645166.novalocal sudo[95754]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:44 np0005645166.novalocal systemd[1]: session-c61.scope: Deactivated successfully. Mar 12 05:49:44 np0005645166.novalocal sudo[95760]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 12 05:49:44 np0005645166.novalocal systemd[1]: Started Session c62 of User root. Mar 12 05:49:44 np0005645166.novalocal sudo[95760]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:44 np0005645166.novalocal sudo[95760]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:44 np0005645166.novalocal systemd[1]: session-c62.scope: Deactivated successfully. Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 9b4dbb39-488e-4ff5-a981-96457253e152 Mar 12 05:49:45 np0005645166.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Mar 12 05:49:45 np0005645166.novalocal iscsid[75482]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323, portal: ::1,3260] through [iface: default] is operational now Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 12 05:49:45 np0005645166.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Mar 12 05:49:45 np0005645166.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Mar 12 05:49:45 np0005645166.novalocal kernel: scsi 2:0:0:0: alua: device naa.600140570be0edbc94c433fa83448628 port group 0 rel port 1 Mar 12 05:49:45 np0005645166.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Mar 12 05:49:45 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Mar 12 05:49:45 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Mar 12 05:49:45 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Mar 12 05:49:45 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Mar 12 05:49:45 np0005645166.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 12 05:49:45 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Mar 12 05:49:45 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Mar 12 05:49:45 np0005645166.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Mar 12 05:49:45 np0005645166.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Mar 12 05:49:45 np0005645166.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 98cd215d-6074-4841-b1c4-6737716c3169 Mar 12 05:49:45 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 38c35f0c-5d3c-42e3-a67c-03bdff1d98b1 Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l bf49545a-a133-4c51-8f8f-c798d3cf9c34 Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 3e9a72a0-31cb-44e4-9adf-1b4bc6693285 Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 6220f969-47b1-42be-98a2-3a621b99e6ca Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 4fe5f9ce-e29f-4f59-bfd8-ce0d64e28c6c Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 68b85e26-ffbe-48cc-854e-8c0f64e6dcf3 Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l d6838ce0-89c2-4d77-9392-8ee53bba029d Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 148d530e-424c-4a1e-a6d5-d8ba67c4b2f5 Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l c14aee62-d4bc-4ad9-8fe2-2516a15edf21 Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 14969478-6dfc-4555-b657-dc995d9623ba Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 73c06bf6-3588-47ef-8128-ba7c1c411725 Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 2f4e5066-f123-4650-93ea-7db68045c505 Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 5102b437-d5dd-4822-840f-d33aca244607 Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l f66a08f3-342d-4e9c-aa53-b28d16fd0502 Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323/::1,3260. For complete SELinux messages run: sealert -l b69a701b-06aa-4211-9b7e-958e19db9548 Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323/::1,3260. For complete SELinux messages run: sealert -l 60bd2b0a-8172-4f32-8e4b-bee7e9bc3836 Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e98384e4-9ba1-4c8e-8a0c-cbabc8d1b455 Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 3e9a72a0-31cb-44e4-9adf-1b4bc6693285 Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 6220f969-47b1-42be-98a2-3a621b99e6ca Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l d6838ce0-89c2-4d77-9392-8ee53bba029d Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 14969478-6dfc-4555-b657-dc995d9623ba Mar 12 05:49:45 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:46 np0005645166.novalocal sudo[95816]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Mar 12 05:49:46 np0005645166.novalocal systemd[1]: Started Session c63 of User root. Mar 12 05:49:46 np0005645166.novalocal sudo[95816]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 176d7e4a-fcd8-4373-8f0e-4785937f777c Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l fed631bc-6b32-4a57-8868-f01236b49993 Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 19da076b-9ca2-499f-9ad6-573549155102 Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l b2fb06b9-128c-4fcd-95c1-c1ecff22bc35 Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 21b80a7d-191f-4cce-af26-6dde370bbb86 Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 072aa9a9-44c2-491b-8f12-925a0388ba4f Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 51ca715f-2b95-4424-ba0c-f037f86ee58c Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 5e619993-9d07-41e5-9f76-05cd9babcd6d Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 608b4c3e-655e-41df-b9d1-606a6fefb177 Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 88c9e50e-4a01-43c5-9503-fc2fc7573753 Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 072aa9a9-44c2-491b-8f12-925a0388ba4f Mar 12 05:49:46 np0005645166.novalocal sudo[95816]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:46 np0005645166.novalocal systemd[1]: session-c63.scope: Deactivated successfully. Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 51ca715f-2b95-4424-ba0c-f037f86ee58c Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 5e619993-9d07-41e5-9f76-05cd9babcd6d Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l d8a013a2-8db1-43e4-95fd-ecffa013bc8a Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 4aa063c1-4aea-41d1-9819-457a7d0decd1 Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5b56d893-33e7-4d25-a824-6e8fde3a7ca3 Mar 12 05:49:46 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:47 np0005645166.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 12 05:49:47 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2377ce81-4c2e-42f6-8409-7b51f19bc62c Mar 12 05:49:47 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:47 np0005645166.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 12 05:49:47 np0005645166.novalocal kernel: GPT:229375 != 2097151 Mar 12 05:49:47 np0005645166.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Mar 12 05:49:47 np0005645166.novalocal kernel: GPT:229375 != 2097151 Mar 12 05:49:47 np0005645166.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Mar 12 05:49:47 np0005645166.novalocal kernel: sda: sda1 sda15 Mar 12 05:49:47 np0005645166.novalocal sudo[95826]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Mar 12 05:49:47 np0005645166.novalocal systemd[1]: Started Session c64 of User root. Mar 12 05:49:47 np0005645166.novalocal sudo[95826]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l b2fb06b9-128c-4fcd-95c1-c1ecff22bc35 Mar 12 05:49:48 np0005645166.novalocal sudo[95826]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:48 np0005645166.novalocal systemd[1]: session-c64.scope: Deactivated successfully. Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l d8a013a2-8db1-43e4-95fd-ecffa013bc8a Mar 12 05:49:48 np0005645166.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l bf49545a-a133-4c51-8f8f-c798d3cf9c34 Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 148d530e-424c-4a1e-a6d5-d8ba67c4b2f5 Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323/::1,3260. For complete SELinux messages run: sealert -l 60bd2b0a-8172-4f32-8e4b-bee7e9bc3836 Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e98384e4-9ba1-4c8e-8a0c-cbabc8d1b455 Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323/::1,3260. For complete SELinux messages run: sealert -l b1834737-53d3-4559-834c-1d99860e5599 Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 9b4dbb39-488e-4ff5-a981-96457253e152 Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 98cd215d-6074-4841-b1c4-6737716c3169 Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 38c35f0c-5d3c-42e3-a67c-03bdff1d98b1 Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l d4a4b0bf-261f-4c41-9a4b-9a9c2de22030 Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5b56d893-33e7-4d25-a824-6e8fde3a7ca3 Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:48 np0005645166.novalocal kernel: scsi 2:0:0:0: alua: Detached Mar 12 05:49:48 np0005645166.novalocal iscsid[75482]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323, portal: ::1,3260] through [iface: default] is shutdown. Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2377ce81-4c2e-42f6-8409-7b51f19bc62c Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 12 05:49:48 np0005645166.novalocal sudo[95904]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323 iqn.1994-05.com.redhat:7028c7235f3 Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 4fe5f9ce-e29f-4f59-bfd8-ce0d64e28c6c Mar 12 05:49:48 np0005645166.novalocal systemd[1]: Started Session c65 of User root. Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 68b85e26-ffbe-48cc-854e-8c0f64e6dcf3 Mar 12 05:49:48 np0005645166.novalocal sudo[95904]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 26a84ac9-cc14-4550-87aa-6d2fa6d8938b Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l c14aee62-d4bc-4ad9-8fe2-2516a15edf21 Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323. For complete SELinux messages run: sealert -l 73c06bf6-3588-47ef-8128-ba7c1c411725 Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l df40407f-ad02-4058-9fcb-b5fd8082c46b Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 5778ebaa-5723-4414-a43c-c7091b55fb29 Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323. For complete SELinux messages run: sealert -l 52c5660b-8919-465b-a9a4-a14025772203 Mar 12 05:49:48 np0005645166.novalocal setroubleshoot[95460]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 12 05:49:49 np0005645166.novalocal sudo[95904]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:49 np0005645166.novalocal systemd[1]: session-c65.scope: Deactivated successfully. Mar 12 05:49:49 np0005645166.novalocal sudo[95911]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 12 05:49:49 np0005645166.novalocal systemd[1]: Started Session c66 of User root. Mar 12 05:49:49 np0005645166.novalocal sudo[95911]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:49 np0005645166.novalocal sudo[95911]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:49 np0005645166.novalocal systemd[1]: session-c66.scope: Deactivated successfully. Mar 12 05:49:49 np0005645166.novalocal sudo[95916]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 12 05:49:49 np0005645166.novalocal systemd[1]: Started Session c67 of User root. Mar 12 05:49:49 np0005645166.novalocal sudo[95916]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:50 np0005645166.novalocal sudo[95916]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:50 np0005645166.novalocal systemd[1]: session-c67.scope: Deactivated successfully. Mar 12 05:49:50 np0005645166.novalocal sudo[95921]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-6e46b599-77d9-439d-ace6-c503aca6e323 Mar 12 05:49:50 np0005645166.novalocal systemd[1]: Started Session c68 of User root. Mar 12 05:49:50 np0005645166.novalocal sudo[95921]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:50 np0005645166.novalocal sudo[95921]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:50 np0005645166.novalocal systemd[1]: session-c68.scope: Deactivated successfully. Mar 12 05:49:50 np0005645166.novalocal sudo[95926]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 12 05:49:50 np0005645166.novalocal systemd[1]: Started Session c69 of User root. Mar 12 05:49:50 np0005645166.novalocal sudo[95926]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:49:51 np0005645166.novalocal sudo[95926]: pam_unix(sudo:session): session closed for user root Mar 12 05:49:51 np0005645166.novalocal systemd[1]: session-c69.scope: Deactivated successfully. Mar 12 05:49:54 np0005645166.novalocal sshd-session[95934]: Received disconnect from 165.227.152.183 port 46466:11: Bye Bye [preauth] Mar 12 05:49:54 np0005645166.novalocal sshd-session[95934]: Disconnected from authenticating user root 165.227.152.183 port 46466 [preauth] Mar 12 05:49:58 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully. Mar 12 05:49:58 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Consumed 1.503s CPU time. Mar 12 05:49:59 np0005645166.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 12 05:49:59 np0005645166.novalocal systemd[1]: setroubleshootd.service: Consumed 6.649s CPU time. Mar 12 05:50:01 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:50:01 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:50:01 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:50:15 np0005645166.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 12 05:50:16 np0005645166.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 12 05:50:16 np0005645166.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service. Mar 12 05:50:17 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 5ef80a21-9754-4051-85c9-172012599a6e Mar 12 05:50:18 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:50:18 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 60d2e335-21d0-494c-9c93-798acd78a2dc Mar 12 05:50:18 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:50:18 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 795f89d2-1f4f-4d15-ad7d-835c445c3227 Mar 12 05:50:18 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:50:18 np0005645166.novalocal setroubleshoot[95976]: failed to retrieve rpm info for path '/var/lib/neutron/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16': Mar 12 05:50:18 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/neutron/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. For complete SELinux messages run: sealert -l f8b36086-b839-47b4-af27-7ad1a6d2c191 Mar 12 05:50:18 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/neutron/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:50:18 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. For complete SELinux messages run: sealert -l 99217916-20ed-42d6-a8ab-fbc971d31692 Mar 12 05:50:18 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:50:18 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. For complete SELinux messages run: sealert -l 8009f44c-14cc-40c6-9d5a-bf81cb3e27c1 Mar 12 05:50:18 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:50:19 np0005645166.novalocal sudo[96005]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:50:19 np0005645166.novalocal systemd[1]: Started Session c70 of User root. Mar 12 05:50:19 np0005645166.novalocal sudo[96005]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:50:20 np0005645166.novalocal sudo[96005]: pam_unix(sudo:session): session closed for user root Mar 12 05:50:20 np0005645166.novalocal systemd[1]: session-c70.scope: Deactivated successfully. Mar 12 05:50:20 np0005645166.novalocal sudo[96009]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:50:20 np0005645166.novalocal systemd[1]: Started Session c71 of User root. Mar 12 05:50:20 np0005645166.novalocal sudo[96009]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:50:20 np0005645166.novalocal sudo[96009]: pam_unix(sudo:session): session closed for user root Mar 12 05:50:20 np0005645166.novalocal systemd[1]: session-c71.scope: Deactivated successfully. Mar 12 05:50:20 np0005645166.novalocal sudo[96013]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 12 05:50:20 np0005645166.novalocal systemd[1]: Started Session c72 of User root. Mar 12 05:50:20 np0005645166.novalocal sudo[96013]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:50:20 np0005645166.novalocal sudo[96013]: pam_unix(sudo:session): session closed for user root Mar 12 05:50:20 np0005645166.novalocal systemd[1]: session-c72.scope: Deactivated successfully. Mar 12 05:50:21 np0005645166.novalocal sudo[96019]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:50:21 np0005645166.novalocal systemd[1]: Started Session c73 of User root. Mar 12 05:50:21 np0005645166.novalocal sudo[96019]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:50:21 np0005645166.novalocal sudo[96019]: pam_unix(sudo:session): session closed for user root Mar 12 05:50:21 np0005645166.novalocal systemd[1]: session-c73.scope: Deactivated successfully. Mar 12 05:50:21 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from read access on the file 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. For complete SELinux messages run: sealert -l 4119c68a-5405-40d8-a868-cfaccafd2434 Mar 12 05:50:21 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from read access on the file 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:50:21 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/neutron/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. For complete SELinux messages run: sealert -l 661806ee-8e25-4868-8ccb-e71be42b5bab Mar 12 05:50:21 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/neutron/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:50:21 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. For complete SELinux messages run: sealert -l 99217916-20ed-42d6-a8ab-fbc971d31692 Mar 12 05:50:21 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:50:21 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. For complete SELinux messages run: sealert -l 8009f44c-14cc-40c6-9d5a-bf81cb3e27c1 Mar 12 05:50:21 np0005645166.novalocal setroubleshoot[95976]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:50:23 np0005645166.novalocal sshd-session[96026]: Received disconnect from 152.32.129.186 port 17064:11: Bye Bye [preauth] Mar 12 05:50:23 np0005645166.novalocal sshd-session[96026]: Disconnected from authenticating user root 152.32.129.186 port 17064 [preauth] Mar 12 05:50:31 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Deactivated successfully. Mar 12 05:50:31 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Consumed 1.116s CPU time. Mar 12 05:50:31 np0005645166.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 12 05:50:31 np0005645166.novalocal systemd[1]: setroubleshootd.service: Consumed 1.439s CPU time. Mar 12 05:50:33 np0005645166.novalocal sshd-session[96059]: Received disconnect from 89.110.93.178 port 44372:11: Bye Bye [preauth] Mar 12 05:50:33 np0005645166.novalocal sshd-session[96059]: Disconnected from authenticating user root 89.110.93.178 port 44372 [preauth] Mar 12 05:50:41 np0005645166.novalocal sshd[45723]: drop connection #1 from [175.12.108.55]:60064 on [38.102.83.224]:22 penalty: exceeded LoginGraceTime Mar 12 05:50:57 np0005645166.novalocal sshd[45723]: Timeout before authentication for connection from 175.12.108.55 to 38.102.83.224, pid = 95335 Mar 12 05:51:01 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:51:01 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:51:01 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:51:19 np0005645166.novalocal sudo[96180]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:51:19 np0005645166.novalocal systemd[1]: Started Session c74 of User root. Mar 12 05:51:19 np0005645166.novalocal sudo[96180]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:51:20 np0005645166.novalocal sudo[96180]: pam_unix(sudo:session): session closed for user root Mar 12 05:51:20 np0005645166.novalocal systemd[1]: session-c74.scope: Deactivated successfully. Mar 12 05:51:20 np0005645166.novalocal sudo[96184]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:51:20 np0005645166.novalocal systemd[1]: Started Session c75 of User root. Mar 12 05:51:20 np0005645166.novalocal sudo[96184]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:51:20 np0005645166.novalocal sudo[96184]: pam_unix(sudo:session): session closed for user root Mar 12 05:51:20 np0005645166.novalocal systemd[1]: session-c75.scope: Deactivated successfully. Mar 12 05:51:20 np0005645166.novalocal sudo[96189]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 12 05:51:20 np0005645166.novalocal systemd[1]: Started Session c76 of User root. Mar 12 05:51:20 np0005645166.novalocal sudo[96189]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:51:20 np0005645166.novalocal sudo[96189]: pam_unix(sudo:session): session closed for user root Mar 12 05:51:20 np0005645166.novalocal systemd[1]: session-c76.scope: Deactivated successfully. Mar 12 05:51:20 np0005645166.novalocal sudo[96195]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:51:20 np0005645166.novalocal systemd[1]: Started Session c77 of User root. Mar 12 05:51:20 np0005645166.novalocal sudo[96195]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:51:21 np0005645166.novalocal systemd[91006]: Created slice User Background Tasks Slice. Mar 12 05:51:21 np0005645166.novalocal systemd[91006]: Starting Cleanup of User's Temporary Files and Directories... Mar 12 05:51:21 np0005645166.novalocal systemd[91006]: Finished Cleanup of User's Temporary Files and Directories. Mar 12 05:51:21 np0005645166.novalocal sudo[96195]: pam_unix(sudo:session): session closed for user root Mar 12 05:51:21 np0005645166.novalocal systemd[1]: session-c77.scope: Deactivated successfully. Mar 12 05:51:43 np0005645166.novalocal sshd-session[96239]: Invalid user bart from 165.227.152.183 port 51788 Mar 12 05:51:43 np0005645166.novalocal sshd-session[96239]: Received disconnect from 165.227.152.183 port 51788:11: Bye Bye [preauth] Mar 12 05:51:43 np0005645166.novalocal sshd-session[96239]: Disconnected from invalid user bart 165.227.152.183 port 51788 [preauth] Mar 12 05:52:02 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:52:02 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:52:02 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:52:14 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:52:14 np0005645166.novalocal systemd-rc-local-generator[96366]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:52:14 np0005645166.novalocal systemd-sysv-generator[96371]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:52:14 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:52:14 np0005645166.novalocal systemd[1]: Starting OpenStack Nova Conductor Server... Mar 12 05:52:16 np0005645166.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 12 05:52:16 np0005645166.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 12 05:52:17 np0005645166.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service. Mar 12 05:52:17 np0005645166.novalocal systemd[1]: Started OpenStack Nova Conductor Server. Mar 12 05:52:17 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:52:18 np0005645166.novalocal systemd-rc-local-generator[96436]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:52:18 np0005645166.novalocal systemd-sysv-generator[96439]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:52:18 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:52:18 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:52:18 np0005645166.novalocal systemd-rc-local-generator[96476]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:52:18 np0005645166.novalocal systemd-sysv-generator[96483]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:52:18 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 203b7a5b-e42c-4c44-af90-689164c36a2b Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l a3dd28df-8d76-48e2-b858-7caaa784b901 Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 3bbdfb04-7ecb-4109-bd56-1749a4277527 Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 6090727d-2614-42fc-b827-6caafb333e0f Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l e7866108-0f48-450a-861d-386774e08a54 Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l b64b1f04-1a32-465e-8834-0c6a4a450b7a Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l d3aaf1c6-6832-4493-8785-7e83076f1032 Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 83f6690a-eafc-4deb-8c9d-87011f50168d Mar 12 05:52:18 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 2ba25937-940b-4bd8-8644-ae5c7b7b0da3 Mar 12 05:52:18 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:19 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l ae06fcd6-aea4-4e1f-a46f-c2ee466c47fe Mar 12 05:52:19 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:19 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l adf33937-e19c-423c-a6f5-3f45efa65d63 Mar 12 05:52:19 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:19 np0005645166.novalocal systemd-sysv-generator[96532]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:52:19 np0005645166.novalocal systemd-rc-local-generator[96529]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:52:19 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:52:19 np0005645166.novalocal systemd[1]: Starting OpenStack Nova Compute Server... Mar 12 05:52:19 np0005645166.novalocal sudo[96549]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:52:19 np0005645166.novalocal systemd[1]: Started Session c78 of User root. Mar 12 05:52:19 np0005645166.novalocal sudo[96549]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:52:20 np0005645166.novalocal sudo[96549]: pam_unix(sudo:session): session closed for user root Mar 12 05:52:20 np0005645166.novalocal systemd[1]: session-c78.scope: Deactivated successfully. Mar 12 05:52:20 np0005645166.novalocal sudo[96555]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:52:20 np0005645166.novalocal systemd[1]: Started Session c79 of User root. Mar 12 05:52:20 np0005645166.novalocal sudo[96555]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:52:20 np0005645166.novalocal sudo[96555]: pam_unix(sudo:session): session closed for user root Mar 12 05:52:20 np0005645166.novalocal systemd[1]: session-c79.scope: Deactivated successfully. Mar 12 05:52:20 np0005645166.novalocal sudo[96559]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 12 05:52:20 np0005645166.novalocal systemd[1]: Started Session c80 of User root. Mar 12 05:52:20 np0005645166.novalocal sudo[96559]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:52:20 np0005645166.novalocal sudo[96559]: pam_unix(sudo:session): session closed for user root Mar 12 05:52:20 np0005645166.novalocal systemd[1]: session-c80.scope: Deactivated successfully. Mar 12 05:52:20 np0005645166.novalocal sudo[96563]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:52:20 np0005645166.novalocal systemd[1]: Started Session c81 of User root. Mar 12 05:52:20 np0005645166.novalocal sudo[96563]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:52:21 np0005645166.novalocal sudo[96563]: pam_unix(sudo:session): session closed for user root Mar 12 05:52:21 np0005645166.novalocal systemd[1]: session-c81.scope: Deactivated successfully. Mar 12 05:52:24 np0005645166.novalocal systemd[1]: Started OpenStack Nova Compute Server. Mar 12 05:52:24 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:52:24 np0005645166.novalocal systemd-rc-local-generator[96598]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:52:24 np0005645166.novalocal systemd-sysv-generator[96602]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:52:24 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:52:24 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:52:24 np0005645166.novalocal systemd-rc-local-generator[96640]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:52:25 np0005645166.novalocal systemd-sysv-generator[96645]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:52:25 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:52:25 np0005645166.novalocal systemd[1]: Starting libvirt QEMU daemon... Mar 12 05:52:25 np0005645166.novalocal systemd[1]: Started libvirt QEMU daemon. Mar 12 05:52:25 np0005645166.novalocal nova-compute[96548]: libvirt: error : internal error: could not initialize domain event timer Mar 12 05:52:25 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:52:25 np0005645166.novalocal systemd-sysv-generator[96737]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:52:25 np0005645166.novalocal systemd-rc-local-generator[96734]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:52:25 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:52:25 np0005645166.novalocal systemd[1]: Starting OpenStack Nova Scheduler Server... Mar 12 05:52:25 np0005645166.novalocal sshd[45723]: drop connection #0 from [175.12.108.55]:51032 on [38.102.83.224]:22 penalty: exceeded LoginGraceTime Mar 12 05:52:26 np0005645166.novalocal systemd[1]: Listening on libvirt nodedev daemon admin socket. Mar 12 05:52:26 np0005645166.novalocal systemd[1]: Listening on libvirt nodedev daemon read-only socket. Mar 12 05:52:26 np0005645166.novalocal systemd[1]: Starting libvirt nodedev daemon... Mar 12 05:52:26 np0005645166.novalocal systemd[1]: Started libvirt nodedev daemon. Mar 12 05:52:27 np0005645166.novalocal systemd[1]: Started OpenStack Nova Scheduler Server. Mar 12 05:52:27 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 203b7a5b-e42c-4c44-af90-689164c36a2b Mar 12 05:52:27 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l a3dd28df-8d76-48e2-b858-7caaa784b901 Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:28 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 3bbdfb04-7ecb-4109-bd56-1749a4277527 Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 6090727d-2614-42fc-b827-6caafb333e0f Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l e7866108-0f48-450a-861d-386774e08a54 Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:28 np0005645166.novalocal sshd-session[96791]: Received disconnect from 152.32.129.186 port 15602:11: Bye Bye [preauth] Mar 12 05:52:28 np0005645166.novalocal sshd-session[96791]: Disconnected from authenticating user root 152.32.129.186 port 15602 [preauth] Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l b64b1f04-1a32-465e-8834-0c6a4a450b7a Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l d3aaf1c6-6832-4493-8785-7e83076f1032 Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 83f6690a-eafc-4deb-8c9d-87011f50168d Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 2ba25937-940b-4bd8-8644-ae5c7b7b0da3 Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l ae06fcd6-aea4-4e1f-a46f-c2ee466c47fe Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l adf33937-e19c-423c-a6f5-3f45efa65d63 Mar 12 05:52:28 np0005645166.novalocal systemd-rc-local-generator[96826]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:52:28 np0005645166.novalocal setroubleshoot[96388]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 12 05:52:28 np0005645166.novalocal systemd-sysv-generator[96830]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:52:28 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:52:28 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:52:28 np0005645166.novalocal systemd-rc-local-generator[96866]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:52:28 np0005645166.novalocal systemd-sysv-generator[96871]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:52:28 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:52:32 np0005645166.novalocal sshd-session[96886]: Invalid user telecomadmin from 185.156.73.233 port 25436 Mar 12 05:52:32 np0005645166.novalocal sshd-session[96886]: Connection closed by invalid user telecomadmin 185.156.73.233 port 25436 [preauth] Mar 12 05:52:38 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Deactivated successfully. Mar 12 05:52:38 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Consumed 1.303s CPU time. Mar 12 05:52:38 np0005645166.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 12 05:52:38 np0005645166.novalocal systemd[1]: setroubleshootd.service: Consumed 1.985s CPU time. Mar 12 05:53:02 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:53:02 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:53:02 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:53:02 np0005645166.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 12 05:53:03 np0005645166.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 12 05:53:03 np0005645166.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service. Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 557500ed-af39-4f0d-89c5-fca68be02e47 Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l ebe0c715-dad2-4885-8ed6-3e7d05b93871 Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). For complete SELinux messages run: sealert -l 30414ccd-1728-49f1-8188-9d5e1b00ca32 Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16': Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. For complete SELinux messages run: sealert -l 4da39ed3-9dcb-4801-8010-ed42fb1c95f7 Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. For complete SELinux messages run: sealert -l ed643de0-f922-4a30-9944-66abb90bb133 Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. For complete SELinux messages run: sealert -l b85f7176-98c7-4430-ba26-c8b78cca0f69 Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 6e67b35f-9a94-4f40-a5c8-cdd939567b65 Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 0929d555-6256-4f2e-889f-2b3273eb226a Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l af22c355-a3a7-409b-a281-0e9a2ff3d6da Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/sbin/httpd from read access on the file 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. For complete SELinux messages run: sealert -l 884b6e35-f6e0-4bf4-993a-7ea5c5bc1bd8 Mar 12 05:53:05 np0005645166.novalocal setroubleshoot[96949]: SELinux is preventing /usr/sbin/httpd from read access on the file 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 96acf6ee4275d1f759b2319c3e5a02b45c92b6de1fd3da3260c343178b853b16 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:53:13 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:53:13 np0005645166.novalocal systemd-sysv-generator[97019]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:53:13 np0005645166.novalocal systemd-rc-local-generator[97013]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:53:14 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:53:14 np0005645166.novalocal systemd[1]: Started OpenStack Octavia Worker service. Mar 12 05:53:14 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:53:14 np0005645166.novalocal systemd-rc-local-generator[97056]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:53:14 np0005645166.novalocal systemd-sysv-generator[97060]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:53:14 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:53:14 np0005645166.novalocal systemd[1]: Reloading. Mar 12 05:53:14 np0005645166.novalocal systemd-rc-local-generator[97094]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 12 05:53:14 np0005645166.novalocal systemd-sysv-generator[97098]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 12 05:53:14 np0005645166.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 12 05:53:15 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Deactivated successfully. Mar 12 05:53:15 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Consumed 1.125s CPU time. Mar 12 05:53:15 np0005645166.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 12 05:53:15 np0005645166.novalocal systemd[1]: setroubleshootd.service: Consumed 1.477s CPU time. Mar 12 05:53:19 np0005645166.novalocal sudo[97138]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:53:19 np0005645166.novalocal systemd[1]: Started Session c82 of User root. Mar 12 05:53:19 np0005645166.novalocal sudo[97138]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:53:20 np0005645166.novalocal sudo[97138]: pam_unix(sudo:session): session closed for user root Mar 12 05:53:20 np0005645166.novalocal systemd[1]: session-c82.scope: Deactivated successfully. Mar 12 05:53:20 np0005645166.novalocal sudo[97142]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:53:20 np0005645166.novalocal systemd[1]: Started Session c83 of User root. Mar 12 05:53:20 np0005645166.novalocal sudo[97142]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:53:20 np0005645166.novalocal sudo[97142]: pam_unix(sudo:session): session closed for user root Mar 12 05:53:20 np0005645166.novalocal systemd[1]: session-c83.scope: Deactivated successfully. Mar 12 05:53:20 np0005645166.novalocal sudo[97146]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 12 05:53:20 np0005645166.novalocal systemd[1]: Started Session c84 of User root. Mar 12 05:53:20 np0005645166.novalocal sudo[97146]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:53:20 np0005645166.novalocal sudo[97146]: pam_unix(sudo:session): session closed for user root Mar 12 05:53:20 np0005645166.novalocal systemd[1]: session-c84.scope: Deactivated successfully. Mar 12 05:53:20 np0005645166.novalocal sudo[97150]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:53:20 np0005645166.novalocal systemd[1]: Started Session c85 of User root. Mar 12 05:53:20 np0005645166.novalocal sudo[97150]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:53:21 np0005645166.novalocal sudo[97150]: pam_unix(sudo:session): session closed for user root Mar 12 05:53:21 np0005645166.novalocal systemd[1]: session-c85.scope: Deactivated successfully. Mar 12 05:53:29 np0005645166.novalocal runuser[97304]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:53:30 np0005645166.novalocal runuser[97304]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:53:30 np0005645166.novalocal runuser[97357]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:53:30 np0005645166.novalocal runuser[97357]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:53:30 np0005645166.novalocal runuser[97413]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:53:31 np0005645166.novalocal sshd-session[97402]: Received disconnect from 165.227.152.183 port 43418:11: Bye Bye [preauth] Mar 12 05:53:31 np0005645166.novalocal sshd-session[97402]: Disconnected from authenticating user root 165.227.152.183 port 43418 [preauth] Mar 12 05:53:31 np0005645166.novalocal runuser[97413]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:53:55 np0005645166.novalocal systemd[1]: Stopping Redis persistent key-value database... Mar 12 05:53:55 np0005645166.novalocal redis-shutdown[97842]: Warning: Using a password with '-a' or '-u' option on the command line interface may not be safe. Mar 12 05:53:55 np0005645166.novalocal systemd[1]: redis.service: Deactivated successfully. Mar 12 05:53:55 np0005645166.novalocal systemd[1]: Stopped Redis persistent key-value database. Mar 12 05:53:55 np0005645166.novalocal systemd[1]: redis.service: Consumed 1.373s CPU time, 9.8M memory peak. Mar 12 05:53:55 np0005645166.novalocal systemd[1]: Starting Redis persistent key-value database... Mar 12 05:53:55 np0005645166.novalocal systemd[1]: Started Redis persistent key-value database. Mar 12 05:53:55 np0005645166.novalocal systemd[1]: Stopping Redis Sentinel... Mar 12 05:53:55 np0005645166.novalocal redis-shutdown[97866]: Warning: Using a password with '-a' or '-u' option on the command line interface may not be safe. Mar 12 05:53:55 np0005645166.novalocal redis-shutdown[97866]: Could not connect to Redis at ::1:0: Connection refused Mar 12 05:53:55 np0005645166.novalocal systemd[1]: redis-sentinel.service: Control process exited, code=exited, status=1/FAILURE Mar 12 05:53:55 np0005645166.novalocal systemd[1]: redis-sentinel.service: Failed with result 'exit-code'. Mar 12 05:53:55 np0005645166.novalocal systemd[1]: Stopped Redis Sentinel. Mar 12 05:53:55 np0005645166.novalocal systemd[1]: redis-sentinel.service: Consumed 1.666s CPU time, 10.7M memory peak. Mar 12 05:53:55 np0005645166.novalocal systemd[1]: Starting Redis Sentinel... Mar 12 05:53:55 np0005645166.novalocal systemd[1]: Started Redis Sentinel. Mar 12 05:53:55 np0005645166.novalocal sudo[97881]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get connection . inactivity_probe Mar 12 05:53:55 np0005645166.novalocal sudo[97881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:53:55 np0005645166.novalocal sudo[97881]: pam_unix(sudo:session): session closed for user root Mar 12 05:53:55 np0005645166.novalocal sudo[97885]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get connection . inactivity_probe Mar 12 05:53:55 np0005645166.novalocal sudo[97885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:53:55 np0005645166.novalocal sudo[97885]: pam_unix(sudo:session): session closed for user root Mar 12 05:54:02 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:54:02 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:54:02 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:54:15 np0005645166.novalocal crontab[97950]: (root) LIST (root) Mar 12 05:54:15 np0005645166.novalocal crontab[97951]: (root) LIST (keystone) Mar 12 05:54:16 np0005645166.novalocal crontab[97952]: (root) LIST (cinder) Mar 12 05:54:16 np0005645166.novalocal crontab[97953]: (root) LIST (glance) Mar 12 05:54:16 np0005645166.novalocal crontab[97954]: (root) LIST (nova) Mar 12 05:54:16 np0005645166.novalocal crontab[97955]: (root) LIST (manila) Mar 12 05:54:19 np0005645166.novalocal runuser[97966]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:19 np0005645166.novalocal sudo[98011]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:54:19 np0005645166.novalocal systemd[1]: Started Session c86 of User root. Mar 12 05:54:19 np0005645166.novalocal sudo[98011]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:54:19 np0005645166.novalocal runuser[97966]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:20 np0005645166.novalocal runuser[98024]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:20 np0005645166.novalocal sudo[98011]: pam_unix(sudo:session): session closed for user root Mar 12 05:54:20 np0005645166.novalocal systemd[1]: session-c86.scope: Deactivated successfully. Mar 12 05:54:20 np0005645166.novalocal sudo[98069]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:54:20 np0005645166.novalocal systemd[1]: Started Session c87 of User root. Mar 12 05:54:20 np0005645166.novalocal sudo[98069]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:54:20 np0005645166.novalocal sudo[98069]: pam_unix(sudo:session): session closed for user root Mar 12 05:54:20 np0005645166.novalocal systemd[1]: session-c87.scope: Deactivated successfully. Mar 12 05:54:20 np0005645166.novalocal sudo[98073]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 12 05:54:20 np0005645166.novalocal systemd[1]: Started Session c88 of User root. Mar 12 05:54:20 np0005645166.novalocal sudo[98073]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:54:20 np0005645166.novalocal runuser[98024]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:20 np0005645166.novalocal runuser[98083]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:20 np0005645166.novalocal sudo[98073]: pam_unix(sudo:session): session closed for user root Mar 12 05:54:20 np0005645166.novalocal systemd[1]: session-c88.scope: Deactivated successfully. Mar 12 05:54:21 np0005645166.novalocal sudo[98101]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:54:21 np0005645166.novalocal systemd[1]: Started Session c89 of User root. Mar 12 05:54:21 np0005645166.novalocal sudo[98101]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:54:21 np0005645166.novalocal sudo[98101]: pam_unix(sudo:session): session closed for user root Mar 12 05:54:21 np0005645166.novalocal systemd[1]: session-c89.scope: Deactivated successfully. Mar 12 05:54:21 np0005645166.novalocal runuser[98083]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:21 np0005645166.novalocal runuser[98142]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:22 np0005645166.novalocal runuser[98142]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:22 np0005645166.novalocal runuser[98194]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:23 np0005645166.novalocal runuser[98194]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:23 np0005645166.novalocal runuser[98246]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:23 np0005645166.novalocal runuser[98246]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:23 np0005645166.novalocal runuser[98299]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:24 np0005645166.novalocal runuser[98299]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:24 np0005645166.novalocal runuser[98353]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:25 np0005645166.novalocal runuser[98353]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:25 np0005645166.novalocal runuser[98405]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:25 np0005645166.novalocal runuser[98405]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:25 np0005645166.novalocal runuser[98459]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:26 np0005645166.novalocal runuser[98459]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:26 np0005645166.novalocal sshd-session[98472]: Invalid user sky from 152.32.129.186 port 27780 Mar 12 05:54:27 np0005645166.novalocal runuser[98524]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:27 np0005645166.novalocal sshd-session[98472]: Received disconnect from 152.32.129.186 port 27780:11: Bye Bye [preauth] Mar 12 05:54:27 np0005645166.novalocal sshd-session[98472]: Disconnected from invalid user sky 152.32.129.186 port 27780 [preauth] Mar 12 05:54:27 np0005645166.novalocal runuser[98524]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:27 np0005645166.novalocal runuser[98578]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:28 np0005645166.novalocal runuser[98578]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:28 np0005645166.novalocal runuser[98633]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:29 np0005645166.novalocal runuser[98633]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:29 np0005645166.novalocal runuser[98685]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:29 np0005645166.novalocal runuser[98685]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:30 np0005645166.novalocal runuser[98749]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:31 np0005645166.novalocal runuser[98749]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:31 np0005645166.novalocal runuser[98801]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:31 np0005645166.novalocal runuser[98801]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:33 np0005645166.novalocal virtqemud[96676]: libvirt version: 11.10.0, package: 4.el9 (builder@centos.org, 2026-01-29-15:25:17, ) Mar 12 05:54:33 np0005645166.novalocal virtqemud[96676]: hostname: np0005645166.novalocal Mar 12 05:54:33 np0005645166.novalocal virtqemud[96676]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Mar 12 05:54:33 np0005645166.novalocal virtqemud[96676]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Mar 12 05:54:33 np0005645166.novalocal runuser[98885]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:34 np0005645166.novalocal runuser[98885]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:34 np0005645166.novalocal runuser[98938]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:35 np0005645166.novalocal runuser[98938]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:36 np0005645166.novalocal runuser[98998]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:36 np0005645166.novalocal runuser[98998]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:36 np0005645166.novalocal runuser[99050]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 12 05:54:37 np0005645166.novalocal runuser[99050]: pam_unix(runuser:session): session closed for user rabbitmq Mar 12 05:54:43 np0005645166.novalocal sshd-session[99124]: Invalid user sol from 80.94.92.171 port 47050 Mar 12 05:54:44 np0005645166.novalocal sshd-session[99124]: Connection closed by invalid user sol 80.94.92.171 port 47050 [preauth] Mar 12 05:55:02 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:55:02 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:55:02 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:55:19 np0005645166.novalocal sudo[99242]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:55:19 np0005645166.novalocal systemd[1]: Started Session c90 of User root. Mar 12 05:55:19 np0005645166.novalocal sudo[99242]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:55:20 np0005645166.novalocal sudo[99242]: pam_unix(sudo:session): session closed for user root Mar 12 05:55:20 np0005645166.novalocal systemd[1]: session-c90.scope: Deactivated successfully. Mar 12 05:55:20 np0005645166.novalocal sudo[99246]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:55:20 np0005645166.novalocal systemd[1]: Started Session c91 of User root. Mar 12 05:55:20 np0005645166.novalocal sudo[99246]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:55:20 np0005645166.novalocal sudo[99246]: pam_unix(sudo:session): session closed for user root Mar 12 05:55:20 np0005645166.novalocal systemd[1]: session-c91.scope: Deactivated successfully. Mar 12 05:55:20 np0005645166.novalocal sudo[99250]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 12 05:55:20 np0005645166.novalocal systemd[1]: Started Session c92 of User root. Mar 12 05:55:20 np0005645166.novalocal sudo[99250]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:55:20 np0005645166.novalocal sudo[99250]: pam_unix(sudo:session): session closed for user root Mar 12 05:55:20 np0005645166.novalocal systemd[1]: session-c92.scope: Deactivated successfully. Mar 12 05:55:20 np0005645166.novalocal sudo[99254]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:55:20 np0005645166.novalocal systemd[1]: Started Session c93 of User root. Mar 12 05:55:20 np0005645166.novalocal sudo[99254]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:55:21 np0005645166.novalocal sudo[99254]: pam_unix(sudo:session): session closed for user root Mar 12 05:55:21 np0005645166.novalocal systemd[1]: session-c93.scope: Deactivated successfully. Mar 12 05:55:58 np0005645166.novalocal sshd-session[99366]: Invalid user sysadmin from 175.12.108.55 port 32972 Mar 12 05:56:02 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:56:02 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:56:02 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:56:13 np0005645166.novalocal sshd[45723]: Timeout before authentication for connection from 175.12.108.55 to 38.102.83.224, pid = 97902 Mar 12 05:56:18 np0005645166.novalocal sudo[55685]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:18 np0005645166.novalocal sudo[100011]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yrsidgrvrnwxmgpwkgfnadymykenozbo ; WORKSPACE=/var/log/weirdo-project /usr/bin/python3' Mar 12 05:56:18 np0005645166.novalocal sudo[100011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:56:18 np0005645166.novalocal python3[100013]: ansible-command Invoked with chdir=/tmp/puppet-openstack creates=/var/log/weirdo-project/logs _raw_params=./copy_logs.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None removes=None stdin=None Mar 12 05:56:19 np0005645166.novalocal sudo[100136]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ceph /var/log/weirdo-project/logs/etc/ Mar 12 05:56:19 np0005645166.novalocal sudo[100136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:19 np0005645166.novalocal sudo[100136]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:19 np0005645166.novalocal sudo[100139]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/cinder /var/log/weirdo-project/logs/etc/ Mar 12 05:56:19 np0005645166.novalocal sudo[100139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:19 np0005645166.novalocal sudo[100139]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:19 np0005645166.novalocal sudo[100142]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/cinder /var/log/weirdo-project/logs Mar 12 05:56:19 np0005645166.novalocal sudo[100142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:19 np0005645166.novalocal sudo[100142]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:19 np0005645166.novalocal sudo[100145]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/glance /var/log/weirdo-project/logs/etc/ Mar 12 05:56:19 np0005645166.novalocal sudo[100145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:19 np0005645166.novalocal sudo[100145]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:19 np0005645166.novalocal sudo[100148]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/glance /var/log/weirdo-project/logs Mar 12 05:56:19 np0005645166.novalocal sudo[100148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:19 np0005645166.novalocal sudo[100148]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:19 np0005645166.novalocal sudo[100151]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/horizon /var/log/weirdo-project/logs Mar 12 05:56:19 np0005645166.novalocal sudo[100151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:19 np0005645166.novalocal sudo[100151]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:19 np0005645166.novalocal sudo[100154]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/keystone /var/log/weirdo-project/logs/etc/ Mar 12 05:56:19 np0005645166.novalocal sudo[100154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:19 np0005645166.novalocal sudo[100154]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:19 np0005645166.novalocal sudo[100157]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/keystone /var/log/weirdo-project/logs Mar 12 05:56:19 np0005645166.novalocal sudo[100157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:19 np0005645166.novalocal sudo[100157]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:19 np0005645166.novalocal sudo[100161]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/manila /var/log/weirdo-project/logs/etc/ Mar 12 05:56:19 np0005645166.novalocal sudo[100161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:19 np0005645166.novalocal sudo[100160]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:56:19 np0005645166.novalocal sudo[100161]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:19 np0005645166.novalocal systemd[1]: Started Session c94 of User root. Mar 12 05:56:19 np0005645166.novalocal sudo[100160]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:56:19 np0005645166.novalocal sudo[100165]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/manila /var/log/weirdo-project/logs Mar 12 05:56:19 np0005645166.novalocal sudo[100165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:19 np0005645166.novalocal sudo[100165]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:19 np0005645166.novalocal sudo[100169]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/neutron /var/log/weirdo-project/logs/etc/ Mar 12 05:56:19 np0005645166.novalocal sudo[100169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:19 np0005645166.novalocal sudo[100169]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:19 np0005645166.novalocal sudo[100172]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/neutron /var/log/weirdo-project/logs Mar 12 05:56:19 np0005645166.novalocal sudo[100172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:19 np0005645166.novalocal sudo[100172]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:19 np0005645166.novalocal sudo[100175]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/nova /var/log/weirdo-project/logs/etc/ Mar 12 05:56:19 np0005645166.novalocal sudo[100175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:19 np0005645166.novalocal sudo[100175]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:19 np0005645166.novalocal sudo[100178]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/nova /var/log/weirdo-project/logs Mar 12 05:56:19 np0005645166.novalocal sudo[100178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:19 np0005645166.novalocal sudo[100178]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:19 np0005645166.novalocal sudo[100181]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/octavia /var/log/weirdo-project/logs/etc/ Mar 12 05:56:19 np0005645166.novalocal sudo[100181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:19 np0005645166.novalocal sudo[100181]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100185]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/octavia /var/log/weirdo-project/logs Mar 12 05:56:20 np0005645166.novalocal sudo[100185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100185]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100188]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ovn /var/log/weirdo-project/logs/etc/ Mar 12 05:56:20 np0005645166.novalocal sudo[100188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100188]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100160]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal systemd[1]: session-c94.scope: Deactivated successfully. Mar 12 05:56:20 np0005645166.novalocal sudo[100191]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/ovn /var/log/weirdo-project/logs Mar 12 05:56:20 np0005645166.novalocal sudo[100191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100191]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100195]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/placement /var/log/weirdo-project/logs/etc/ Mar 12 05:56:20 np0005645166.novalocal sudo[100195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100193]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:56:20 np0005645166.novalocal sudo[100195]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal systemd[1]: Started Session c95 of User root. Mar 12 05:56:20 np0005645166.novalocal sudo[100193]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:56:20 np0005645166.novalocal sudo[100199]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/placement /var/log/weirdo-project/logs Mar 12 05:56:20 np0005645166.novalocal sudo[100199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100199]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100203]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/tempest /var/log/weirdo-project/logs/etc/ Mar 12 05:56:20 np0005645166.novalocal sudo[100203]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100203]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100206]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/puppet/puppet.conf /var/log/weirdo-project/logs/ Mar 12 05:56:20 np0005645166.novalocal sudo[100206]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100206]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100210]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/journalctl --no-pager Mar 12 05:56:20 np0005645166.novalocal sudo[100210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100210]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100213]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rsyslog.d /var/log/weirdo-project/logs/etc/ Mar 12 05:56:20 np0005645166.novalocal sudo[100213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100213]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100216]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyslog.conf /var/log/weirdo-project/logs/etc/ Mar 12 05:56:20 np0005645166.novalocal sudo[100216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100216]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100219]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/network-scripts /var/log/weirdo-project/logs/etc/sysconfig/ Mar 12 05:56:20 np0005645166.novalocal sudo[100219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100219]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100223]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rabbitmq /var/log/weirdo-project/logs/etc/ Mar 12 05:56:20 np0005645166.novalocal sudo[100223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100223]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100226]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/rabbitmq /var/log/weirdo-project/logs Mar 12 05:56:20 np0005645166.novalocal sudo[100226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100226]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100229]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/my.cnf /var/log/weirdo-project/logs/etc/ Mar 12 05:56:20 np0005645166.novalocal sudo[100229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100229]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100193]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal systemd[1]: session-c95.scope: Deactivated successfully. Mar 12 05:56:20 np0005645166.novalocal sudo[100232]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/my.cnf.d /var/log/weirdo-project/logs/etc/ Mar 12 05:56:20 np0005645166.novalocal sudo[100232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100232]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100233]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 12 05:56:20 np0005645166.novalocal systemd[1]: Started Session c96 of User root. Mar 12 05:56:20 np0005645166.novalocal sudo[100237]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/mariadb /var/log/weirdo-project/logs/ Mar 12 05:56:20 np0005645166.novalocal sudo[100233]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:56:20 np0005645166.novalocal sudo[100237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100237]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100241]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/iscsi /var/log/weirdo-project/logs/etc/ Mar 12 05:56:20 np0005645166.novalocal sudo[100241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100241]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100244]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dstat.log /var/log/weirdo-project/logs/ Mar 12 05:56:20 np0005645166.novalocal sudo[100244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100244]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100247]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iostat.log /var/log/weirdo-project/logs/ Mar 12 05:56:20 np0005645166.novalocal sudo[100247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100247]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100250]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iotop.log /var/log/weirdo-project/logs/ Mar 12 05:56:20 np0005645166.novalocal sudo[100250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100250]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100253]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/libvirt /var/log/weirdo-project/logs/ Mar 12 05:56:20 np0005645166.novalocal sudo[100253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100253]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100256]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/virsh net-list --all Mar 12 05:56:20 np0005645166.novalocal sudo[100256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal virtqemud[96676]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Mar 12 05:56:20 np0005645166.novalocal sudo[100256]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100261]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/libvirt /var/log/weirdo-project/logs/etc/ Mar 12 05:56:20 np0005645166.novalocal sudo[100261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100261]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100233]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal systemd[1]: session-c96.scope: Deactivated successfully. Mar 12 05:56:20 np0005645166.novalocal sudo[100264]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig Mar 12 05:56:20 np0005645166.novalocal sudo[100264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100264]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100267]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openvswitch /var/log/weirdo-project/logs/etc/ Mar 12 05:56:20 np0005645166.novalocal sudo[100267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100267]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100268]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:56:20 np0005645166.novalocal sudo[100271]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/openvswitch /var/log/weirdo-project/logs/ Mar 12 05:56:20 np0005645166.novalocal systemd[1]: Started Session c97 of User root. Mar 12 05:56:20 np0005645166.novalocal sudo[100268]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:56:20 np0005645166.novalocal sudo[100271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100271]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100277]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Mar 12 05:56:20 np0005645166.novalocal sudo[100277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:20 np0005645166.novalocal sudo[100277]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:20 np0005645166.novalocal sudo[100280]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Mar 12 05:56:20 np0005645166.novalocal sudo[100280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100280]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100283]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-ssl Mar 12 05:56:21 np0005645166.novalocal sudo[100283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100283]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100286]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Mar 12 05:56:21 np0005645166.novalocal sudo[100286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100286]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100289]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Mar 12 05:56:21 np0005645166.novalocal sudo[100289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100289]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100293]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-ssl Mar 12 05:56:21 np0005645166.novalocal sudo[100293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100293]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100296]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ Mar 12 05:56:21 np0005645166.novalocal sudo[100296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100296]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100299]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ Mar 12 05:56:21 np0005645166.novalocal sudo[100299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100299]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100268]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal systemd[1]: session-c97.scope: Deactivated successfully. Mar 12 05:56:21 np0005645166.novalocal sudo[100302]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sudoers.d /var/log/weirdo-project/logs/ Mar 12 05:56:21 np0005645166.novalocal sudo[100302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100302]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100305]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sudoers /var/log/weirdo-project/logs/sudoers.txt Mar 12 05:56:21 np0005645166.novalocal sudo[100305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100305]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100309]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/magic /etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ Mar 12 05:56:21 np0005645166.novalocal sudo[100309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100309]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100313]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.d/10-cinder_wsgi.conf /etc/httpd/conf.d/10-glance_wsgi.conf /etc/httpd/conf.d/10-keystone_wsgi.conf /etc/httpd/conf.d/10-manila_wsgi.conf /etc/httpd/conf.d/10-neutron_wsgi.conf /etc/httpd/conf.d/10-nova_api_wsgi.conf /etc/httpd/conf.d/10-nova_metadata_wsgi.conf /etc/httpd/conf.d/10-octavia_wsgi.conf /etc/httpd/conf.d/10-placement_wsgi.conf /etc/httpd/conf.d/15-horizon_ssl_vhost.conf /etc/httpd/conf.d/15-horizon_vhost.conf /etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/ Mar 12 05:56:21 np0005645166.novalocal sudo[100313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100313]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100317]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.modules.d/alias.conf /etc/httpd/conf.modules.d/alias.load /etc/httpd/conf.modules.d/authz_core.load /etc/httpd/conf.modules.d/authz_host.load /etc/httpd/conf.modules.d/filter.load /etc/httpd/conf.modules.d/log_config.load /etc/httpd/conf.modules.d/mime.conf /etc/httpd/conf.modules.d/mime.load /etc/httpd/conf.modules.d/prefork.conf /etc/httpd/conf.modules.d/prefork.load /etc/httpd/conf.modules.d/setenvif.conf /etc/httpd/conf.modules.d/setenvif.load /etc/httpd/conf.modules.d/socache_shmcb.load /etc/httpd/conf.modules.d/ssl.conf /etc/httpd/conf.modules.d/ssl.load /etc/httpd/conf.modules.d/systemd.load /etc/httpd/conf.modules.d/unixd.load /etc/httpd/conf.modules.d/wsgi.conf /etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ Mar 12 05:56:21 np0005645166.novalocal sudo[100317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100317]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100320]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/httpd /var/log/weirdo-project/logs/apache Mar 12 05:56:21 np0005645166.novalocal sudo[100320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100320]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100323]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/redis /var/log/weirdo-project/logs/ Mar 12 05:56:21 np0005645166.novalocal sudo[100323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100323]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100326]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/redis /var/log/weirdo-project/logs/etc/ Mar 12 05:56:21 np0005645166.novalocal sudo[100326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100326]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100329]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/audit/audit.log /var/log/weirdo-project/logs/audit.log.txt Mar 12 05:56:21 np0005645166.novalocal sudo[100329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100329]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100332]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/spool/cron /var/log/weirdo-project/logs/ Mar 12 05:56:21 np0005645166.novalocal sudo[100332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100332]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100335]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/etc/tempest.conf /var/log/weirdo-project/logs/tempest.conf.txt Mar 12 05:56:21 np0005645166.novalocal sudo[100335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100335]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100338]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack-dashboard /var/log/weirdo-project/logs/etc/openstack-dashboard Mar 12 05:56:21 np0005645166.novalocal sudo[100338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100338]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100342]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt Mar 12 05:56:21 np0005645166.novalocal sudo[100342]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100342]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100345]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt Mar 12 05:56:21 np0005645166.novalocal sudo[100345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100345]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100348]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt Mar 12 05:56:21 np0005645166.novalocal sudo[100348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100348]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100351]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt Mar 12 05:56:21 np0005645166.novalocal sudo[100351]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100351]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100354]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt Mar 12 05:56:21 np0005645166.novalocal sudo[100354]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100354]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100357]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt Mar 12 05:56:21 np0005645166.novalocal sudo[100357]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100357]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100360]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt Mar 12 05:56:21 np0005645166.novalocal sudo[100360]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100360]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100363]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt Mar 12 05:56:21 np0005645166.novalocal sudo[100363]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100363]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100366]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt Mar 12 05:56:21 np0005645166.novalocal sudo[100366]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100366]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:21 np0005645166.novalocal sudo[100369]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt Mar 12 05:56:21 np0005645166.novalocal sudo[100369]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:21 np0005645166.novalocal sudo[100369]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:22 np0005645166.novalocal sudo[100372]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt Mar 12 05:56:22 np0005645166.novalocal sudo[100372]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:22 np0005645166.novalocal sudo[100372]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:22 np0005645166.novalocal sudo[100375]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt Mar 12 05:56:22 np0005645166.novalocal sudo[100375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:22 np0005645166.novalocal sudo[100375]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:22 np0005645166.novalocal sudo[100379]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf Mar 12 05:56:22 np0005645166.novalocal sudo[100379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:22 np0005645166.novalocal sudo[100379]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:22 np0005645166.novalocal sudo[100386]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf repolist -v Mar 12 05:56:22 np0005645166.novalocal sudo[100386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:24 np0005645166.novalocal sudo[100386]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:24 np0005645166.novalocal sudo[100393]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf list installed Mar 12 05:56:24 np0005645166.novalocal sudo[100393]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:25 np0005645166.novalocal sudo[100393]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:25 np0005645166.novalocal sudo[100400]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf module list Mar 12 05:56:25 np0005645166.novalocal sudo[100400]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:26 np0005645166.novalocal sshd-session[100401]: Received disconnect from 89.110.93.178 port 51676:11: Bye Bye [preauth] Mar 12 05:56:26 np0005645166.novalocal sshd-session[100401]: Disconnected from authenticating user root 89.110.93.178 port 51676 [preauth] Mar 12 05:56:26 np0005645166.novalocal sshd-session[100396]: Received disconnect from 152.32.129.186 port 17880:11: Bye Bye [preauth] Mar 12 05:56:26 np0005645166.novalocal sshd-session[100396]: Disconnected from authenticating user root 152.32.129.186 port 17880 [preauth] Mar 12 05:56:26 np0005645166.novalocal sudo[100400]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:26 np0005645166.novalocal sudo[100405]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/yum.repos.d /var/log/weirdo-project/logs/etc/yum.repos.d Mar 12 05:56:26 np0005645166.novalocal sudo[100405]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:26 np0005645166.novalocal sudo[100405]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:26 np0005645166.novalocal sudo[100409]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.log /var/log/weirdo-project/logs/dnf Mar 12 05:56:26 np0005645166.novalocal sudo[100409]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:26 np0005645166.novalocal sudo[100409]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:26 np0005645166.novalocal sudo[100412]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.rpm.log /var/log/weirdo-project/logs/dnf Mar 12 05:56:26 np0005645166.novalocal sudo[100412]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:26 np0005645166.novalocal sudo[100412]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100419]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/passwd /var/log/weirdo-project/logs/etc Mar 12 05:56:27 np0005645166.novalocal sudo[100419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:27 np0005645166.novalocal sudo[100419]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100422]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/group /var/log/weirdo-project/logs/etc Mar 12 05:56:27 np0005645166.novalocal sudo[100422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:27 np0005645166.novalocal sudo[100422]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100425]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack /var/log/weirdo-project/logs/etc Mar 12 05:56:27 np0005645166.novalocal sudo[100425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:27 np0005645166.novalocal sudo[100425]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100428]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml Mar 12 05:56:27 np0005645166.novalocal sudo[100428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:27 np0005645166.novalocal sudo[100428]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100435]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ps -eo user,pid,ppid,lwp,%cpu,%mem,size,rss,cmd Mar 12 05:56:27 np0005645166.novalocal sudo[100435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:27 np0005645166.novalocal sudo[100435]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100438]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/ip -d address Mar 12 05:56:27 np0005645166.novalocal sudo[100438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:27 np0005645166.novalocal sudo[100438]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100444]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl list open_vswitch Mar 12 05:56:27 np0005645166.novalocal sudo[100444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:27 np0005645166.novalocal sudo[100444]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100447]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl show Mar 12 05:56:27 np0005645166.novalocal sudo[100447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:27 np0005645166.novalocal sudo[100447]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100451]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Mar 12 05:56:27 np0005645166.novalocal sudo[100451]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:27 np0005645166.novalocal sudo[100451]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100454]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl list connection Mar 12 05:56:27 np0005645166.novalocal sudo[100454]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:27 np0005645166.novalocal sudo[100454]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100457]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Mar 12 05:56:27 np0005645166.novalocal sudo[100457]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:27 np0005645166.novalocal sudo[100457]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100463]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Mar 12 05:56:27 np0005645166.novalocal sudo[100463]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:27 np0005645166.novalocal sudo[100463]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100466]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl list connection Mar 12 05:56:27 np0005645166.novalocal sudo[100466]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:27 np0005645166.novalocal sudo[100466]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100469]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Mar 12 05:56:27 np0005645166.novalocal sudo[100469]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:27 np0005645166.novalocal sudo[100469]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100472]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/netstat -tulpn Mar 12 05:56:27 np0005645166.novalocal sudo[100472]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:27 np0005645166.novalocal sudo[100472]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:27 np0005645166.novalocal sudo[100475]: root : PWD=/tmp/puppet-openstack ; USER=root ; ENV=LC_CTYPE=C SYSTEMD_COLORS=false ; COMMAND=/bin/systemctl status --all --no-pager Mar 12 05:56:27 np0005645166.novalocal sudo[100475]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:29 np0005645166.novalocal sudo[100475]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:29 np0005645166.novalocal sudo[100478]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t raw -vnxL Mar 12 05:56:29 np0005645166.novalocal sudo[100478]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:29 np0005645166.novalocal sudo[100478]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:29 np0005645166.novalocal sudo[100481]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t filter -vnxL Mar 12 05:56:29 np0005645166.novalocal sudo[100481]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:29 np0005645166.novalocal sudo[100481]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:29 np0005645166.novalocal sudo[100484]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t nat -vnxL Mar 12 05:56:29 np0005645166.novalocal sudo[100484]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:29 np0005645166.novalocal sudo[100484]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:29 np0005645166.novalocal sudo[100487]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t mangle -vnxL Mar 12 05:56:29 np0005645166.novalocal sudo[100487]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:29 np0005645166.novalocal sudo[100487]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:29 np0005645166.novalocal sudo[100490]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/fstab /var/log/weirdo-project/logs/etc/ Mar 12 05:56:29 np0005645166.novalocal sudo[100490]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:29 np0005645166.novalocal sudo[100490]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:29 np0005645166.novalocal sudo[100493]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mount Mar 12 05:56:29 np0005645166.novalocal sudo[100493]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:29 np0005645166.novalocal sudo[100493]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:29 np0005645166.novalocal sudo[100496]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/losetup -al Mar 12 05:56:29 np0005645166.novalocal sudo[100496]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:29 np0005645166.novalocal sudo[100496]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:29 np0005645166.novalocal sudo[100499]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/pvs Mar 12 05:56:29 np0005645166.novalocal sudo[100499]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:29 np0005645166.novalocal sudo[100499]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:29 np0005645166.novalocal sudo[100502]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/vgs Mar 12 05:56:29 np0005645166.novalocal sudo[100502]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:29 np0005645166.novalocal sudo[100502]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:29 np0005645166.novalocal sudo[100505]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/lvs Mar 12 05:56:29 np0005645166.novalocal sudo[100505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:29 np0005645166.novalocal sudo[100505]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:29 np0005645166.novalocal sudo[100509]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/semanage boolean --list Mar 12 05:56:29 np0005645166.novalocal sudo[100509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:30 np0005645166.novalocal sudo[100509]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:34 np0005645166.novalocal sudo[100520]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_cells --verbose Mar 12 05:56:34 np0005645166.novalocal sudo[100520]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Mar 12 05:56:36 np0005645166.novalocal sudo[100520]: pam_unix(sudo:session): session closed for user nova Mar 12 05:56:36 np0005645166.novalocal sudo[100527]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_hosts Mar 12 05:56:36 np0005645166.novalocal sudo[100527]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Mar 12 05:56:38 np0005645166.novalocal sudo[100527]: pam_unix(sudo:session): session closed for user nova Mar 12 05:56:58 np0005645166.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 12 05:56:59 np0005645166.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 12 05:56:59 np0005645166.novalocal sudo[100611]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type d -execdir sudo chmod 755 {} ; Mar 12 05:56:59 np0005645166.novalocal sudo[100611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100614]: root : PWD=/var/log/weirdo-project ; USER=root ; COMMAND=/bin/chmod 755 ./logs Mar 12 05:56:59 np0005645166.novalocal sudo[100614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100614]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100617]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./etc Mar 12 05:56:59 np0005645166.novalocal sudo[100617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100617]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100620]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./sysconfig Mar 12 05:56:59 np0005645166.novalocal sudo[100620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100620]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100623]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 755 ./network-scripts Mar 12 05:56:59 np0005645166.novalocal sudo[100623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100623]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100626]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ceph Mar 12 05:56:59 np0005645166.novalocal sudo[100626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100626]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100629]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Mar 12 05:56:59 np0005645166.novalocal sudo[100629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100629]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100632]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Mar 12 05:56:59 np0005645166.novalocal sudo[100632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100632]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100635]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./volumes Mar 12 05:56:59 np0005645166.novalocal sudo[100635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100635]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100638]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 12 05:56:59 np0005645166.novalocal sudo[100638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100638]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100641]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 12 05:56:59 np0005645166.novalocal sudo[100641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100641]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100645]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./glance Mar 12 05:56:59 np0005645166.novalocal sudo[100645]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100645]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100650]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./metadefs Mar 12 05:56:59 np0005645166.novalocal sudo[100650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100650]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100653]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Mar 12 05:56:59 np0005645166.novalocal sudo[100653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100653]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100656]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 12 05:56:59 np0005645166.novalocal sudo[100656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100656]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100659]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 12 05:56:59 np0005645166.novalocal sudo[100659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100659]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100663]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Mar 12 05:56:59 np0005645166.novalocal sudo[100663]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100663]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100666]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./fernet-keys Mar 12 05:56:59 np0005645166.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service. Mar 12 05:56:59 np0005645166.novalocal sudo[100666]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100666]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100673]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 12 05:56:59 np0005645166.novalocal sudo[100673]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100673]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100676]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 12 05:56:59 np0005645166.novalocal sudo[100676]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100676]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100679]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./credential-keys Mar 12 05:56:59 np0005645166.novalocal sudo[100679]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100679]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100682]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./policy.d Mar 12 05:56:59 np0005645166.novalocal sudo[100682]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100682]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100685]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./manila Mar 12 05:56:59 np0005645166.novalocal sudo[100685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100685]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100688]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 12 05:56:59 np0005645166.novalocal sudo[100688]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100688]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100691]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 12 05:56:59 np0005645166.novalocal sudo[100691]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100691]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100694]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Mar 12 05:56:59 np0005645166.novalocal sudo[100694]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100694]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100697]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Mar 12 05:56:59 np0005645166.novalocal sudo[100697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100697]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100700]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Mar 12 05:56:59 np0005645166.novalocal sudo[100700]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100700]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100703]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-vpn-agent Mar 12 05:56:59 np0005645166.novalocal sudo[100703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100703]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100706]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovn-agent Mar 12 05:56:59 np0005645166.novalocal sudo[100706]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100706]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100709]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-dhcp-agent Mar 12 05:56:59 np0005645166.novalocal sudo[100709]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100709]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100712]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-rpc-server Mar 12 05:56:59 np0005645166.novalocal sudo[100712]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100712]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100715]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-l3-agent Mar 12 05:56:59 np0005645166.novalocal sudo[100715]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:56:59 np0005645166.novalocal sudo[100715]: pam_unix(sudo:session): session closed for user root Mar 12 05:56:59 np0005645166.novalocal sudo[100718]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-metadata-agent Mar 12 05:56:59 np0005645166.novalocal sudo[100718]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100718]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal systemd[1]: Starting system activity accounting tool... Mar 12 05:57:00 np0005645166.novalocal sudo[100723]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-netns-cleanup Mar 12 05:57:00 np0005645166.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 12 05:57:00 np0005645166.novalocal systemd[1]: Finished system activity accounting tool. Mar 12 05:57:00 np0005645166.novalocal sudo[100723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100723]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100727]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovs-cleanup Mar 12 05:57:00 np0005645166.novalocal sudo[100727]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100727]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100730]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-server Mar 12 05:57:00 np0005645166.novalocal sudo[100730]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100730]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100733]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./plugins Mar 12 05:57:00 np0005645166.novalocal sudo[100733]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100733]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100736]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./networking-ovn Mar 12 05:57:00 np0005645166.novalocal sudo[100736]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100736]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100739]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./ml2 Mar 12 05:57:00 np0005645166.novalocal sudo[100739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100739]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100742]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 12 05:57:00 np0005645166.novalocal sudo[100742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100742]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100745]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 12 05:57:00 np0005645166.novalocal sudo[100745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100745]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100748]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./kill_scripts Mar 12 05:57:00 np0005645166.novalocal sudo[100748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100748]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100751]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./nova Mar 12 05:57:00 np0005645166.novalocal sudo[100751]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100751]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100754]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 12 05:57:00 np0005645166.novalocal sudo[100754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100754]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100757]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 12 05:57:00 np0005645166.novalocal sudo[100757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100757]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100760]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Mar 12 05:57:00 np0005645166.novalocal sudo[100760]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100760]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100763]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./certs Mar 12 05:57:00 np0005645166.novalocal sudo[100763]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100763]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100766]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 12 05:57:00 np0005645166.novalocal sudo[100766]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100766]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100769]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 12 05:57:00 np0005645166.novalocal sudo[100769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100769]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100772]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Mar 12 05:57:00 np0005645166.novalocal sudo[100772]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100772]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100775]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-health-manager Mar 12 05:57:00 np0005645166.novalocal sudo[100775]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100775]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100778]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-driver-agent Mar 12 05:57:00 np0005645166.novalocal sudo[100778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100778]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100781]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-worker Mar 12 05:57:00 np0005645166.novalocal sudo[100781]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100781]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100784]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-api Mar 12 05:57:00 np0005645166.novalocal sudo[100784]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100784]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100787]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Mar 12 05:57:00 np0005645166.novalocal sudo[100787]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100787]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100790]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-housekeeping Mar 12 05:57:00 np0005645166.novalocal sudo[100790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100790]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100793]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Mar 12 05:57:00 np0005645166.novalocal sudo[100793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100793]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100796]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./placement Mar 12 05:57:00 np0005645166.novalocal sudo[100796]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100796]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100799]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 12 05:57:00 np0005645166.novalocal sudo[100799]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100799]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100802]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 12 05:57:00 np0005645166.novalocal sudo[100802]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100802]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100805]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./tempest Mar 12 05:57:00 np0005645166.novalocal sudo[100805]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100805]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100808]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rsyslog.d Mar 12 05:57:00 np0005645166.novalocal sudo[100808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100808]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100811]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Mar 12 05:57:00 np0005645166.novalocal sudo[100811]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100811]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100814]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 12 05:57:00 np0005645166.novalocal sudo[100814]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100814]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100817]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 12 05:57:00 np0005645166.novalocal sudo[100817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100817]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100820]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./my.cnf.d Mar 12 05:57:00 np0005645166.novalocal sudo[100820]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100820]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100823]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./iscsi Mar 12 05:57:00 np0005645166.novalocal sudo[100823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100823]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100826]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Mar 12 05:57:00 np0005645166.novalocal sudo[100826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100826]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100829]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./storage Mar 12 05:57:00 np0005645166.novalocal sudo[100829]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100829]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100832]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/storage ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Mar 12 05:57:00 np0005645166.novalocal sudo[100832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100832]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100835]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./secrets Mar 12 05:57:00 np0005645166.novalocal sudo[100835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100835]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100838]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Mar 12 05:57:00 np0005645166.novalocal sudo[100838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100838]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100841]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Mar 12 05:57:00 np0005645166.novalocal sudo[100841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100841]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100844]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./networks Mar 12 05:57:00 np0005645166.novalocal sudo[100844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100844]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100847]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Mar 12 05:57:00 np0005645166.novalocal sudo[100847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100847]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100850]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./nwfilter Mar 12 05:57:00 np0005645166.novalocal sudo[100850]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100850]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100853]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Mar 12 05:57:00 np0005645166.novalocal sudo[100853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100853]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100856]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./httpd Mar 12 05:57:00 np0005645166.novalocal sudo[100856]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100856]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100860]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf Mar 12 05:57:00 np0005645166.novalocal sudo[100860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100860]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100863]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Mar 12 05:57:00 np0005645166.novalocal setroubleshoot[100608]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l df79a531-c34b-4133-8c19-6035278394c5 Mar 12 05:57:00 np0005645166.novalocal sudo[100863]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100863]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100866]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.modules.d Mar 12 05:57:00 np0005645166.novalocal setroubleshoot[100608]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 12 05:57:00 np0005645166.novalocal sudo[100866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100866]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100869]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./redis Mar 12 05:57:00 np0005645166.novalocal sudo[100869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100869]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100872]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 12 05:57:00 np0005645166.novalocal sudo[100872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100872]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:00 np0005645166.novalocal sudo[100875]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 12 05:57:00 np0005645166.novalocal sudo[100875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:00 np0005645166.novalocal sudo[100875]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100878]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack-dashboard Mar 12 05:57:01 np0005645166.novalocal sudo[100878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100878]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100881]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./default_policies.txt Mar 12 05:57:01 np0005645166.novalocal sudo[100881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100881]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100884]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./enabled.txt Mar 12 05:57:01 np0005645166.novalocal sudo[100884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100884]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100887]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./local_settings.d.txt Mar 12 05:57:01 np0005645166.novalocal sudo[100887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100887]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100890]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./nova_policy.d.txt Mar 12 05:57:01 np0005645166.novalocal sudo[100890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100890]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100893]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./ssl.txt Mar 12 05:57:01 np0005645166.novalocal sudo[100893]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100893]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100896]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 12 05:57:01 np0005645166.novalocal sudo[100896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100896]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100899]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./yum.repos.d Mar 12 05:57:01 np0005645166.novalocal sudo[100899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100899]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100902]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack Mar 12 05:57:01 np0005645166.novalocal sudo[100902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100902]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100905]: root : PWD=/var/log/weirdo-project/logs/etc/openstack ; USER=root ; COMMAND=/bin/chmod 755 ./puppet Mar 12 05:57:01 np0005645166.novalocal sudo[100905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100905]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100908]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Mar 12 05:57:01 np0005645166.novalocal sudo[100908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100908]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100911]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./glance Mar 12 05:57:01 np0005645166.novalocal sudo[100911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100911]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100914]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./horizon Mar 12 05:57:01 np0005645166.novalocal sudo[100914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100914]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100917]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Mar 12 05:57:01 np0005645166.novalocal sudo[100917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100917]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100920]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./manila Mar 12 05:57:01 np0005645166.novalocal sudo[100920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100920]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100923]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Mar 12 05:57:01 np0005645166.novalocal sudo[100923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100923]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100926]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./nova Mar 12 05:57:01 np0005645166.novalocal sudo[100926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100926]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100929]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Mar 12 05:57:01 np0005645166.novalocal sudo[100929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100929]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100932]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Mar 12 05:57:01 np0005645166.novalocal sudo[100932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100932]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100935]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./placement Mar 12 05:57:01 np0005645166.novalocal sudo[100935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100935]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100938]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Mar 12 05:57:01 np0005645166.novalocal sudo[100938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100938]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100941]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./mariadb Mar 12 05:57:01 np0005645166.novalocal sudo[100941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100941]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100944]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Mar 12 05:57:01 np0005645166.novalocal sudo[100944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100944]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100947]: root : PWD=/var/log/weirdo-project/logs/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Mar 12 05:57:01 np0005645166.novalocal sudo[100947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100947]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100950]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Mar 12 05:57:01 np0005645166.novalocal sudo[100950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100950]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100953]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./sudoers.d Mar 12 05:57:01 np0005645166.novalocal sudo[100953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100953]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100956]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./apache Mar 12 05:57:01 np0005645166.novalocal sudo[100956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100956]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100959]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./redis Mar 12 05:57:01 np0005645166.novalocal sudo[100959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100959]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100962]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cron Mar 12 05:57:01 np0005645166.novalocal sudo[100962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100962]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100965]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./dnf Mar 12 05:57:01 np0005645166.novalocal sudo[100965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100965]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100968]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openstack_resources Mar 12 05:57:01 np0005645166.novalocal sudo[100968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100968]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100611]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100971]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type f -execdir sudo chmod 644 {} ; Mar 12 05:57:01 np0005645166.novalocal sudo[100971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100974]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20260312_055322.log Mar 12 05:57:01 np0005645166.novalocal sudo[100974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100974]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100977]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.log Mar 12 05:57:01 np0005645166.novalocal sudo[100977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100977]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100980]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./init.ipv6-global Mar 12 05:57:01 np0005645166.novalocal sudo[100980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100980]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100983]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions Mar 12 05:57:01 np0005645166.novalocal sudo[100983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100983]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100986]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions-ipv6 Mar 12 05:57:01 np0005645166.novalocal sudo[100986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100986]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100989]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-lo Mar 12 05:57:01 np0005645166.novalocal sudo[100989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100989]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100992]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown Mar 12 05:57:01 np0005645166.novalocal sudo[100992]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100992]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100995]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-eth Mar 12 05:57:01 np0005645166.novalocal sudo[100995]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100995]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[100998]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ipv6 Mar 12 05:57:01 np0005645166.novalocal sudo[100998]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[100998]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[101001]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ovs Mar 12 05:57:01 np0005645166.novalocal sudo[101001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[101001]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:01 np0005645166.novalocal sudo[101004]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-post Mar 12 05:57:01 np0005645166.novalocal sudo[101004]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:01 np0005645166.novalocal sudo[101004]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101007]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-routes Mar 12 05:57:02 np0005645166.novalocal sudo[101007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101007]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101010]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-tunnel Mar 12 05:57:02 np0005645166.novalocal sudo[101010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101010]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101013]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup Mar 12 05:57:02 np0005645166.novalocal sudo[101013]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101013]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101016]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-aliases Mar 12 05:57:02 np0005645166.novalocal sudo[101016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101016]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101019]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-eth Mar 12 05:57:02 np0005645166.novalocal sudo[101019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101019]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101022]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ipv6 Mar 12 05:57:02 np0005645166.novalocal sudo[101022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101022]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101025]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ovs Mar 12 05:57:02 np0005645166.novalocal sudo[101025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101025]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101028]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-post Mar 12 05:57:02 np0005645166.novalocal sudo[101028]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101028]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101031]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-routes Mar 12 05:57:02 np0005645166.novalocal sudo[101031]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101031]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101034]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-tunnel Mar 12 05:57:02 np0005645166.novalocal sudo[101034]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101034]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101037]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-loop1 Mar 12 05:57:02 np0005645166.novalocal sudo[101037]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101037]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101040]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-br-ex Mar 12 05:57:02 np0005645166.novalocal sudo[101040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101040]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101043]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./readme-ifcfg-rh.txt Mar 12 05:57:02 np0005645166.novalocal sudo[101043]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101043]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101046]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-eth0 Mar 12 05:57:02 np0005645166.novalocal sudo[101046]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101046]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101049]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-guests Mar 12 05:57:02 np0005645166.novalocal sudo[101049]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101049]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101052]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd Mar 12 05:57:02 np0005645166.novalocal sudo[101052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101052]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101055]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller Mar 12 05:57:02 np0005645166.novalocal sudo[101055]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101055]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101058]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 12 05:57:02 np0005645166.novalocal sudo[101058]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101058]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101061]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Mar 12 05:57:02 np0005645166.novalocal sudo[101061]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101061]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101064]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.conf Mar 12 05:57:02 np0005645166.novalocal sudo[101064]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101064]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101067]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./resource_filters.json Mar 12 05:57:02 np0005645166.novalocal sudo[101067]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101067]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101070]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Mar 12 05:57:02 np0005645166.novalocal sudo[101070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101070]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101073]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005645166.novalocal.pem Mar 12 05:57:02 np0005645166.novalocal sudo[101073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101073]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101076]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-processor-allocation-setting-data.json Mar 12 05:57:02 np0005645166.novalocal sudo[101076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101076]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101079]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vcputopology.json Mar 12 05:57:02 np0005645166.novalocal sudo[101079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101079]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101082]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-flavor.json Mar 12 05:57:02 np0005645166.novalocal sudo[101082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101082]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101085]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-resource-allocation-setting-data.json Mar 12 05:57:02 np0005645166.novalocal sudo[101085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101085]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101088]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-storage-allocation-setting-data.json Mar 12 05:57:02 np0005645166.novalocal sudo[101088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101088]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101091]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-virtual-system-setting-data.json Mar 12 05:57:02 np0005645166.novalocal sudo[101091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101091]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101094]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-disk-filter.json Mar 12 05:57:02 np0005645166.novalocal sudo[101094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101094]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101097]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-iops-filter.json Mar 12 05:57:02 np0005645166.novalocal sudo[101097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101097]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101100]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-num-instances.json Mar 12 05:57:02 np0005645166.novalocal sudo[101100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101100]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101103]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-mode.json Mar 12 05:57:02 np0005645166.novalocal sudo[101103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101103]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101106]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-pinning.json Mar 12 05:57:02 np0005645166.novalocal sudo[101106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101106]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101109]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-memory-backing.json Mar 12 05:57:02 np0005645166.novalocal sudo[101109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101109]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101112]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-shutdown.json Mar 12 05:57:02 np0005645166.novalocal sudo[101112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101112]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101115]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-host-capabilities.json Mar 12 05:57:02 np0005645166.novalocal sudo[101115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101115]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101118]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-hypervisor.json Mar 12 05:57:02 np0005645166.novalocal sudo[101118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101118]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101121]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-instance-data.json Mar 12 05:57:02 np0005645166.novalocal sudo[101121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101121]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101124]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt-image.json Mar 12 05:57:02 np0005645166.novalocal sudo[101124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101124]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101127]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt.json Mar 12 05:57:02 np0005645166.novalocal sudo[101127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101127]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101130]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-quota.json Mar 12 05:57:02 np0005645166.novalocal sudo[101130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101130]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:02 np0005645166.novalocal sudo[101133]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-randomgen.json Mar 12 05:57:02 np0005645166.novalocal sudo[101133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:02 np0005645166.novalocal sudo[101133]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101136]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-quota-flavor.json Mar 12 05:57:03 np0005645166.novalocal sudo[101136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101136]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101139]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware.json Mar 12 05:57:03 np0005645166.novalocal sudo[101139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101139]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101142]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm-hw.json Mar 12 05:57:03 np0005645166.novalocal sudo[101142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101142]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101145]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm.json Mar 12 05:57:03 np0005645166.novalocal sudo[101145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101145]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101148]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-watchdog.json Mar 12 05:57:03 np0005645166.novalocal sudo[101148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101148]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101151]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-xenapi.json Mar 12 05:57:03 np0005645166.novalocal sudo[101151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101151]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101154]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./glance-common-image-props.json Mar 12 05:57:03 np0005645166.novalocal sudo[101154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101154]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101157]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./image-signature-verification.json Mar 12 05:57:03 np0005645166.novalocal sudo[101157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101157]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101161]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./operating-system.json Mar 12 05:57:03 np0005645166.novalocal sudo[101161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101161]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101164]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-databases.json Mar 12 05:57:03 np0005645166.novalocal sudo[101164]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101164]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101167]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-runtimes.json Mar 12 05:57:03 np0005645166.novalocal sudo[101167]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101167]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101170]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-webservers.json Mar 12 05:57:03 np0005645166.novalocal sudo[101170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101170]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101173]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./storage-volume-type.json Mar 12 05:57:03 np0005645166.novalocal sudo[101173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101173]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101176]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005645166.novalocal.pem Mar 12 05:57:03 np0005645166.novalocal sudo[101176]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101176]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101179]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api-paste.ini Mar 12 05:57:03 np0005645166.novalocal sudo[101179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101179]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101182]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api.conf Mar 12 05:57:03 np0005645166.novalocal sudo[101182]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101182]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101185]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-cache.conf Mar 12 05:57:03 np0005645166.novalocal sudo[101185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101185]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101188]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-image-import.conf Mar 12 05:57:03 np0005645166.novalocal sudo[101188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101188]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101191]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-scrubber.conf Mar 12 05:57:03 np0005645166.novalocal sudo[101191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101191]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101194]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-swift.conf Mar 12 05:57:03 np0005645166.novalocal sudo[101194]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101194]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101197]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Mar 12 05:57:03 np0005645166.novalocal sudo[101197]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101197]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101200]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./schema-image.json Mar 12 05:57:03 np0005645166.novalocal sudo[101200]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101200]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101203]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 12 05:57:03 np0005645166.novalocal sudo[101203]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101203]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101206]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Mar 12 05:57:03 np0005645166.novalocal sudo[101206]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101206]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101209]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Mar 12 05:57:03 np0005645166.novalocal sudo[101209]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101209]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101212]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005645166.novalocal.pem Mar 12 05:57:03 np0005645166.novalocal sudo[101212]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101212]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101215]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 12 05:57:03 np0005645166.novalocal sudo[101215]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101215]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101218]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.conf Mar 12 05:57:03 np0005645166.novalocal sudo[101218]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101218]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101221]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf Mar 12 05:57:03 np0005645166.novalocal sudo[101221]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101221]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101224]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./sso_callback_template.html Mar 12 05:57:03 np0005645166.novalocal sudo[101224]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101224]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101227]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Mar 12 05:57:03 np0005645166.novalocal sudo[101227]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101227]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101230]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Mar 12 05:57:03 np0005645166.novalocal sudo[101230]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101230]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101233]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Mar 12 05:57:03 np0005645166.novalocal sudo[101233]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101233]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101236]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila.conf Mar 12 05:57:03 np0005645166.novalocal sudo[101236]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101236]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101239]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Mar 12 05:57:03 np0005645166.novalocal sudo[101239]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101239]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101242]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 12 05:57:03 np0005645166.novalocal sudo[101242]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101242]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101245]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005645166.novalocal.pem Mar 12 05:57:03 np0005645166.novalocal sudo[101245]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101245]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101248]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Mar 12 05:57:03 np0005645166.novalocal sudo[101248]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101248]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101251]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Mar 12 05:57:03 np0005645166.novalocal sudo[101251]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101251]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101254]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Mar 12 05:57:03 np0005645166.novalocal sudo[101254]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101254]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101257]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Mar 12 05:57:03 np0005645166.novalocal sudo[101257]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101257]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101260]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Mar 12 05:57:03 np0005645166.novalocal sudo[101260]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101260]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101263]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./README Mar 12 05:57:03 np0005645166.novalocal sudo[101263]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101263]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101266]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.conf Mar 12 05:57:03 np0005645166.novalocal sudo[101266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101266]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:03 np0005645166.novalocal sudo[101269]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Mar 12 05:57:03 np0005645166.novalocal sudo[101269]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:03 np0005645166.novalocal sudo[101269]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101272]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Mar 12 05:57:04 np0005645166.novalocal sudo[101272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101272]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101275]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./dhcp_agent.ini Mar 12 05:57:04 np0005645166.novalocal sudo[101275]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101275]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101278]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./l3_agent.ini Mar 12 05:57:04 np0005645166.novalocal sudo[101278]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101278]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101281]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./metadata_agent.ini Mar 12 05:57:04 np0005645166.novalocal sudo[101281]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101281]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101284]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_vpnaas.conf Mar 12 05:57:04 np0005645166.novalocal sudo[101284]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101284]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101287]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./vpn_agent.ini Mar 12 05:57:04 np0005645166.novalocal sudo[101287]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101287]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101290]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_vpn_agent.ini Mar 12 05:57:04 np0005645166.novalocal sudo[101290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101290]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101293]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 12 05:57:04 np0005645166.novalocal sudo[101293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101293]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101296]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ml2_conf.ini Mar 12 05:57:04 np0005645166.novalocal sudo[101296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101296]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101299]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_agent.ini Mar 12 05:57:04 np0005645166.novalocal sudo[101299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101299]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101302]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./sriov_agent.ini Mar 12 05:57:04 np0005645166.novalocal sudo[101302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101302]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101305]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005645166.novalocal.pem Mar 12 05:57:04 np0005645166.novalocal sudo[101305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101305]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101308]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 12 05:57:04 np0005645166.novalocal sudo[101308]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101308]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101311]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Mar 12 05:57:04 np0005645166.novalocal sudo[101311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101311]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101314]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova.conf Mar 12 05:57:04 np0005645166.novalocal sudo[101314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101314]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101317]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./release Mar 12 05:57:04 np0005645166.novalocal sudo[101317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101317]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101320]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Mar 12 05:57:04 np0005645166.novalocal sudo[101320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101320]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101323]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.conf Mar 12 05:57:04 np0005645166.novalocal sudo[101323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101323]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101326]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005645166.novalocal.pem Mar 12 05:57:04 np0005645166.novalocal sudo[101326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101326]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101329]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.cert.pem Mar 12 05:57:04 np0005645166.novalocal sudo[101329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101329]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101332]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.key.pem Mar 12 05:57:04 np0005645166.novalocal sudo[101332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101332]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101335]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client_ca.cert.pem Mar 12 05:57:04 np0005645166.novalocal sudo[101335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101335]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101338]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client.cert-and-key.pem Mar 12 05:57:04 np0005645166.novalocal sudo[101338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101338]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101341]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005645166.novalocal.pem Mar 12 05:57:04 np0005645166.novalocal sudo[101341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101341]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101344]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.conf Mar 12 05:57:04 np0005645166.novalocal sudo[101344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101344]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101347]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 12 05:57:04 np0005645166.novalocal sudo[101347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101347]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101350]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Mar 12 05:57:04 np0005645166.novalocal sudo[101350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101350]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101353]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Mar 12 05:57:04 np0005645166.novalocal sudo[101353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101353]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101356]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Mar 12 05:57:04 np0005645166.novalocal sudo[101356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101356]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101359]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Mar 12 05:57:04 np0005645166.novalocal sudo[101359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101359]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101362]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Mar 12 05:57:04 np0005645166.novalocal sudo[101362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101362]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101365]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005645166.novalocal.pem Mar 12 05:57:04 np0005645166.novalocal sudo[101365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101365]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101368]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.conf Mar 12 05:57:04 np0005645166.novalocal sudo[101368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101368]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101371]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 12 05:57:04 np0005645166.novalocal sudo[101371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101371]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101374]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./accounts.yaml.sample Mar 12 05:57:04 np0005645166.novalocal sudo[101374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101374]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101377]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./allow-list.yaml Mar 12 05:57:04 np0005645166.novalocal sudo[101377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101377]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:04 np0005645166.novalocal sudo[101380]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf.sample Mar 12 05:57:04 np0005645166.novalocal sudo[101380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:04 np0005645166.novalocal sudo[101380]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101383]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./rbac-persona-accounts.yaml.sample Mar 12 05:57:05 np0005645166.novalocal sudo[101383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101383]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101386]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101386]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101389]: root : PWD=/var/log/weirdo-project/logs/etc/rsyslog.d ; USER=root ; COMMAND=/bin/chmod 644 ./21-cloudinit.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101389]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101392]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyslog.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101392]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101395]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005645166.novalocal.pem Mar 12 05:57:05 np0005645166.novalocal sudo[101395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101395]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101398]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.config Mar 12 05:57:05 np0005645166.novalocal sudo[101398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101398]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101401]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq-env.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101401]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101404]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./inetrc Mar 12 05:57:05 np0005645166.novalocal sudo[101404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101404]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101407]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmqadmin.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101407]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101410]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./enabled_plugins Mar 12 05:57:05 np0005645166.novalocal sudo[101410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101410]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101413]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101413]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101416]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./my.cnf Mar 12 05:57:05 np0005645166.novalocal sudo[101416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101416]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101419]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_gssapi.cnf Mar 12 05:57:05 np0005645166.novalocal sudo[101419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101419]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101422]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./enable_encryption.preset Mar 12 05:57:05 np0005645166.novalocal sudo[101422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101422]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101425]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb-server.cnf Mar 12 05:57:05 np0005645166.novalocal sudo[101425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101425]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101428]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./spider.cnf Mar 12 05:57:05 np0005645166.novalocal sudo[101428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101428]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101431]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mysql-clients.cnf Mar 12 05:57:05 np0005645166.novalocal sudo[101431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101431]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101434]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./server.cnf Mar 12 05:57:05 np0005645166.novalocal sudo[101434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101434]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101437]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./client.cnf Mar 12 05:57:05 np0005645166.novalocal sudo[101437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101437]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101440]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./np0005645166.novalocal.pem Mar 12 05:57:05 np0005645166.novalocal sudo[101440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101440]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101443]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./initiatorname.iscsi Mar 12 05:57:05 np0005645166.novalocal sudo[101443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101443]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101446]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./iscsid.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101446]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101449]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 644 ./default.xml Mar 12 05:57:05 np0005645166.novalocal sudo[101449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101449]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101452]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-admin.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101452]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101455]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101455]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101458]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlockd.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101458]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101458]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101461]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlogd.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101461]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101464]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtproxyd.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101464]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101464]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101467]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtstoraged.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101467]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101470]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirtd.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101470]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101473]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtinterfaced.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101473]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101476]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./network.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101476]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101479]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnetworkd.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101479]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101482]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnodedevd.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101482]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101485]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnwfilterd.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101485]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:05 np0005645166.novalocal sudo[101488]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-lockd.conf Mar 12 05:57:05 np0005645166.novalocal sudo[101488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:05 np0005645166.novalocal sudo[101488]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101491]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101491]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101494]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtqemud.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101494]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101497]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtsecretd.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101497]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101500]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-privkey.pem Mar 12 05:57:06 np0005645166.novalocal sudo[101500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101500]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101503]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./default.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101503]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101506]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./.conf.db.~lock~ Mar 12 05:57:06 np0005645166.novalocal sudo[101506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101506]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101509]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./conf.db Mar 12 05:57:06 np0005645166.novalocal sudo[101509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101509]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101512]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./system-id.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101512]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101515]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-req.pem Mar 12 05:57:06 np0005645166.novalocal sudo[101515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101515]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101518]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Mar 12 05:57:06 np0005645166.novalocal sudo[101518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101518]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101521]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-req.pem Mar 12 05:57:06 np0005645166.novalocal sudo[101521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101521]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101524]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Mar 12 05:57:06 np0005645166.novalocal sudo[101524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101524]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101527]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-req.pem Mar 12 05:57:06 np0005645166.novalocal sudo[101527]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101527]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101530]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-cert.pem Mar 12 05:57:06 np0005645166.novalocal sudo[101530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101530]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101533]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Mar 12 05:57:06 np0005645166.novalocal sudo[101533]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101533]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101536]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Mar 12 05:57:06 np0005645166.novalocal sudo[101536]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101536]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101539]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./httpd.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101539]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101542]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./magic Mar 12 05:57:06 np0005645166.novalocal sudo[101542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101542]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101545]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./ports.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101545]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101548]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-cinder_wsgi.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101548]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101551]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-glance_wsgi.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101551]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101554]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-keystone_wsgi.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101554]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101557]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-manila_wsgi.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101557]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101560]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-neutron_wsgi.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101560]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101563]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_api_wsgi.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101563]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101566]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_metadata_wsgi.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101566]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101569]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-octavia_wsgi.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101569]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101572]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-placement_wsgi.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101572]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101575]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_ssl_vhost.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101575]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101578]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_vhost.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101578]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101581]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./openstack-dashboard.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101581]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101584]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.conf Mar 12 05:57:06 np0005645166.novalocal sudo[101584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101584]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101587]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.load Mar 12 05:57:06 np0005645166.novalocal sudo[101587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101587]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101590]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_core.load Mar 12 05:57:06 np0005645166.novalocal sudo[101590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101590]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:06 np0005645166.novalocal sudo[101593]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_host.load Mar 12 05:57:06 np0005645166.novalocal sudo[101593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:06 np0005645166.novalocal sudo[101593]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101596]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./filter.load Mar 12 05:57:07 np0005645166.novalocal sudo[101596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101596]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101599]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./log_config.load Mar 12 05:57:07 np0005645166.novalocal sudo[101599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101599]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101602]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.conf Mar 12 05:57:07 np0005645166.novalocal sudo[101602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101602]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101605]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.load Mar 12 05:57:07 np0005645166.novalocal sudo[101605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101605]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101608]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.conf Mar 12 05:57:07 np0005645166.novalocal sudo[101608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101608]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101611]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.load Mar 12 05:57:07 np0005645166.novalocal sudo[101611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101611]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101614]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.conf Mar 12 05:57:07 np0005645166.novalocal sudo[101614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101614]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101617]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.load Mar 12 05:57:07 np0005645166.novalocal sudo[101617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101617]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101620]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./socache_shmcb.load Mar 12 05:57:07 np0005645166.novalocal sudo[101620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101620]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101623]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.conf Mar 12 05:57:07 np0005645166.novalocal sudo[101623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101623]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101626]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.load Mar 12 05:57:07 np0005645166.novalocal sudo[101626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101626]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101629]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./systemd.load Mar 12 05:57:07 np0005645166.novalocal sudo[101629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101629]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101632]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./unixd.load Mar 12 05:57:07 np0005645166.novalocal sudo[101632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101632]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101635]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.conf Mar 12 05:57:07 np0005645166.novalocal sudo[101635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101635]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101638]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.load Mar 12 05:57:07 np0005645166.novalocal sudo[101638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101638]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101641]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf Mar 12 05:57:07 np0005645166.novalocal sudo[101641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101641]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101644]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf Mar 12 05:57:07 np0005645166.novalocal sudo[101644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101644]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101647]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf.puppet Mar 12 05:57:07 np0005645166.novalocal sudo[101647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101647]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101650]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf.puppet Mar 12 05:57:07 np0005645166.novalocal sudo[101650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101650]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101653]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005645166.novalocal.pem Mar 12 05:57:07 np0005645166.novalocal sudo[101653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101653]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101656]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./.secret_key_store Mar 12 05:57:07 np0005645166.novalocal sudo[101656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101656]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101659]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_policy.yaml.txt Mar 12 05:57:07 np0005645166.novalocal sudo[101659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101659]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101662]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./README.txt Mar 12 05:57:07 np0005645166.novalocal sudo[101662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101662]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101665]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.yaml Mar 12 05:57:07 np0005645166.novalocal sudo[101665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101665]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101668]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./glance.yaml Mar 12 05:57:07 np0005645166.novalocal sudo[101668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101668]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101671]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.yaml Mar 12 05:57:07 np0005645166.novalocal sudo[101671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101671]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101674]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.yaml Mar 12 05:57:07 np0005645166.novalocal sudo[101674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101674]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101677]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./nova.yaml Mar 12 05:57:07 np0005645166.novalocal sudo[101677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101677]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101680]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./manila.yaml Mar 12 05:57:07 np0005645166.novalocal sudo[101680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101680]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101683]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./glance_policy.yaml.txt Mar 12 05:57:07 np0005645166.novalocal sudo[101683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101683]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101688]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_policy.yaml.txt Mar 12 05:57:07 np0005645166.novalocal sudo[101688]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101688]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101691]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./local_settings.txt Mar 12 05:57:07 np0005645166.novalocal sudo[101691]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101691]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101694]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_90_manila_shares.py Mar 12 05:57:07 np0005645166.novalocal sudo[101694]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101694]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101697]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_10_set_custom_theme.py.example Mar 12 05:57:07 np0005645166.novalocal sudo[101697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101697]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101700]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_11_toggle_angular_features.py.example Mar 12 05:57:07 np0005645166.novalocal sudo[101700]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101700]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101703]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_2010_integration_tests_deprecated.py.example Mar 12 05:57:07 np0005645166.novalocal sudo[101703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101703]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101706]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_20_integration_tests_scaffolds.py.example Mar 12 05:57:07 np0005645166.novalocal sudo[101706]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101706]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101709]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_9030_profiler_settings.py.example Mar 12 05:57:07 np0005645166.novalocal sudo[101709]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101709]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101712]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./manila_policy.yaml.txt Mar 12 05:57:07 np0005645166.novalocal sudo[101712]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101712]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101715]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_policy.yaml.txt Mar 12 05:57:07 np0005645166.novalocal sudo[101715]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101715]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101718]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./api-extensions.yaml Mar 12 05:57:07 np0005645166.novalocal sudo[101718]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101718]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101721]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./nova_policy.yaml.txt Mar 12 05:57:07 np0005645166.novalocal sudo[101721]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101721]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:07 np0005645166.novalocal sudo[101724]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005645166.novalocal.pem Mar 12 05:57:07 np0005645166.novalocal sudo[101724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:07 np0005645166.novalocal sudo[101724]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101727]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyncd.conf Mar 12 05:57:08 np0005645166.novalocal sudo[101727]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101727]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101730]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./redhat.repo Mar 12 05:57:08 np0005645166.novalocal sudo[101730]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101730]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101733]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos.repo Mar 12 05:57:08 np0005645166.novalocal sudo[101733]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101733]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101736]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean-deps.repo Mar 12 05:57:08 np0005645166.novalocal sudo[101736]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101736]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101739]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean.repo Mar 12 05:57:08 np0005645166.novalocal sudo[101739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101739]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101742]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean-zuul-repo.repo Mar 12 05:57:08 np0005645166.novalocal sudo[101742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101742]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101745]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos-addons.repo Mar 12 05:57:08 np0005645166.novalocal sudo[101745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101745]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101748]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-Messaging-rabbitmq.repo Mar 12 05:57:08 np0005645166.novalocal sudo[101748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101748]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101751]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./passwd Mar 12 05:57:08 np0005645166.novalocal sudo[101751]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101751]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101754]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./group Mar 12 05:57:08 np0005645166.novalocal sudo[101754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101754]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101757]: root : PWD=/var/log/weirdo-project/logs/etc/openstack/puppet ; USER=root ; COMMAND=/bin/chmod 644 ./admin-clouds.yaml Mar 12 05:57:08 np0005645166.novalocal sudo[101757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101757]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101760]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./fstab Mar 12 05:57:08 np0005645166.novalocal sudo[101760]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101760]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101763]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-manage.log Mar 12 05:57:08 np0005645166.novalocal sudo[101763]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101763]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101766]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Mar 12 05:57:08 np0005645166.novalocal sudo[101766]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101766]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101769]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./volume.log Mar 12 05:57:08 np0005645166.novalocal sudo[101769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101769]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101772]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./backup.log Mar 12 05:57:08 np0005645166.novalocal sudo[101772]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101772]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101775]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-api.log Mar 12 05:57:08 np0005645166.novalocal sudo[101775]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101775]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101778]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./api.log Mar 12 05:57:08 np0005645166.novalocal sudo[101778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101778]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101781]: root : PWD=/var/log/weirdo-project/logs/horizon ; USER=root ; COMMAND=/bin/chmod 644 ./horizon.log Mar 12 05:57:08 np0005645166.novalocal sudo[101781]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101781]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101784]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone-manage.log Mar 12 05:57:08 np0005645166.novalocal sudo[101784]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101784]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101787]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.log Mar 12 05:57:08 np0005645166.novalocal sudo[101787]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101787]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101790]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Mar 12 05:57:08 np0005645166.novalocal sudo[101790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101790]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101793]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./share.log Mar 12 05:57:08 np0005645166.novalocal sudo[101793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101793]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101796]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Mar 12 05:57:08 np0005645166.novalocal sudo[101796]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101796]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101799]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./data.log Mar 12 05:57:08 np0005645166.novalocal sudo[101799]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101799]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101803]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-manage.log Mar 12 05:57:08 np0005645166.novalocal sudo[101803]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101803]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101806]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rpc-server.log Mar 12 05:57:08 np0005645166.novalocal sudo[101806]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101806]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101809]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./periodic-workers.log Mar 12 05:57:08 np0005645166.novalocal sudo[101809]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101809]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101812]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron-ovn-agent.log Mar 12 05:57:08 np0005645166.novalocal sudo[101812]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101812]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101815]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-vpn-agent.log Mar 12 05:57:08 np0005645166.novalocal sudo[101815]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101815]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101818]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-maintenance-worker.log Mar 12 05:57:08 np0005645166.novalocal sudo[101818]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101818]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101821]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Mar 12 05:57:08 np0005645166.novalocal sudo[101821]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101821]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101824]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./app.log Mar 12 05:57:08 np0005645166.novalocal sudo[101824]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101824]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101827]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-novncproxy.log Mar 12 05:57:08 np0005645166.novalocal sudo[101827]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101827]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101830]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-conductor.log Mar 12 05:57:08 np0005645166.novalocal sudo[101830]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101830]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101833]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.log Mar 12 05:57:08 np0005645166.novalocal sudo[101833]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101833]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101836]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-scheduler.log Mar 12 05:57:08 np0005645166.novalocal sudo[101836]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101836]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101839]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-api.log Mar 12 05:57:08 np0005645166.novalocal sudo[101839]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101839]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101842]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-manage.log Mar 12 05:57:08 np0005645166.novalocal sudo[101842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101842]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101845]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./health-manager.log Mar 12 05:57:08 np0005645166.novalocal sudo[101845]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101845]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101848]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./housekeeping.log Mar 12 05:57:08 np0005645166.novalocal sudo[101848]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101848]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101851]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./driver-agent.log Mar 12 05:57:08 np0005645166.novalocal sudo[101851]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101851]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:08 np0005645166.novalocal sudo[101854]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./worker.log Mar 12 05:57:08 np0005645166.novalocal sudo[101854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:08 np0005645166.novalocal sudo[101854]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101857]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-nb.log Mar 12 05:57:09 np0005645166.novalocal sudo[101857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101857]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101860]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-sb.log Mar 12 05:57:09 np0005645166.novalocal sudo[101860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101860]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101863]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd.log Mar 12 05:57:09 np0005645166.novalocal sudo[101863]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101863]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101866]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller.log Mar 12 05:57:09 np0005645166.novalocal sudo[101866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101866]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101869]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Mar 12 05:57:09 np0005645166.novalocal sudo[101869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101869]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101872]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-connection.txt Mar 12 05:57:09 np0005645166.novalocal sudo[101872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101872]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101875]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-ssl.txt Mar 12 05:57:09 np0005645166.novalocal sudo[101875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101875]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101878]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Mar 12 05:57:09 np0005645166.novalocal sudo[101878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101878]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101881]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-connection.txt Mar 12 05:57:09 np0005645166.novalocal sudo[101881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101881]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101884]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-ssl.txt Mar 12 05:57:09 np0005645166.novalocal sudo[101884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101884]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101887]: root : PWD=/var/log/weirdo-project/logs/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.log Mar 12 05:57:09 np0005645166.novalocal sudo[101887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101887]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101890]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.conf Mar 12 05:57:09 np0005645166.novalocal sudo[101890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101890]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101893]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./syslog.txt Mar 12 05:57:09 np0005645166.novalocal sudo[101893]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101893]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101896]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6.log Mar 12 05:57:09 np0005645166.novalocal sudo[101896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101896]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101899]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6_upgrade.log Mar 12 05:57:09 np0005645166.novalocal sudo[101899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101899]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101902]: root : PWD=/var/log/weirdo-project/logs/mariadb ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb.log Mar 12 05:57:09 np0005645166.novalocal sudo[101902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101902]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101905]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./dstat.log Mar 12 05:57:09 np0005645166.novalocal sudo[101905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101905]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101908]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iostat.log Mar 12 05:57:09 np0005645166.novalocal sudo[101908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101908]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101911]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iotop.log Mar 12 05:57:09 np0005645166.novalocal sudo[101911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101911]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101914]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./virsh-net-list.txt Mar 12 05:57:09 np0005645166.novalocal sudo[101914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101914]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101917]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server.log Mar 12 05:57:09 np0005645166.novalocal sudo[101917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101917]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101920]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vswitchd.log Mar 12 05:57:09 np0005645166.novalocal sudo[101920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101920]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101923]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-pki.log Mar 12 05:57:09 np0005645166.novalocal sudo[101923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101923]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101926]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./90-cloud-init-users Mar 12 05:57:09 np0005645166.novalocal sudo[101926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101926]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101929]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./nova Mar 12 05:57:09 np0005645166.novalocal sudo[101929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101929]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101932]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./zuul Mar 12 05:57:09 np0005645166.novalocal sudo[101932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101932]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101935]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./neutron Mar 12 05:57:09 np0005645166.novalocal sudo[101935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101935]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101938]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./manila Mar 12 05:57:09 np0005645166.novalocal sudo[101938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101938]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101941]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Mar 12 05:57:09 np0005645166.novalocal sudo[101941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101941]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101944]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./glance Mar 12 05:57:09 np0005645166.novalocal sudo[101944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101944]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101947]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./sudoers.txt Mar 12 05:57:09 np0005645166.novalocal sudo[101947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101947]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101950]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_wsgi_access_ssl.log Mar 12 05:57:09 np0005645166.novalocal sudo[101950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101950]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101953]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_access_ssl.log Mar 12 05:57:09 np0005645166.novalocal sudo[101953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101953]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101956]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_access_ssl.log Mar 12 05:57:09 np0005645166.novalocal sudo[101956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101956]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101959]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_access_ssl.log Mar 12 05:57:09 np0005645166.novalocal sudo[101959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101959]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101962]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_access_ssl.log Mar 12 05:57:09 np0005645166.novalocal sudo[101962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:09 np0005645166.novalocal sudo[101962]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:09 np0005645166.novalocal sudo[101965]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_access_ssl.log Mar 12 05:57:10 np0005645166.novalocal sudo[101965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[101965]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[101968]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_access_ssl.log Mar 12 05:57:10 np0005645166.novalocal sudo[101968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[101968]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[101971]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./error_log Mar 12 05:57:10 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Deactivated successfully. Mar 12 05:57:10 np0005645166.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Consumed 1.196s CPU time. Mar 12 05:57:10 np0005645166.novalocal sudo[101971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[101971]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[101974]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_error.log Mar 12 05:57:10 np0005645166.novalocal sudo[101974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[101974]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[101977]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_error.log Mar 12 05:57:10 np0005645166.novalocal sudo[101977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[101977]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[101980]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_error_ssl.log Mar 12 05:57:10 np0005645166.novalocal sudo[101980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[101980]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[101984]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_error_ssl.log Mar 12 05:57:10 np0005645166.novalocal sudo[101984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[101984]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[101987]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_error_ssl.log Mar 12 05:57:10 np0005645166.novalocal sudo[101987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[101987]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[101990]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_error_ssl.log Mar 12 05:57:10 np0005645166.novalocal sudo[101990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[101990]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[101993]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_wsgi_error_ssl.log Mar 12 05:57:10 np0005645166.novalocal sudo[101993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[101993]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[101996]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_error_ssl.log Mar 12 05:57:10 np0005645166.novalocal sudo[101996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[101996]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[101999]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_error_ssl.log Mar 12 05:57:10 np0005645166.novalocal sudo[101999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[101999]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102002]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_error_ssl.log Mar 12 05:57:10 np0005645166.novalocal sudo[102002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102002]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102005]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_error_ssl.log Mar 12 05:57:10 np0005645166.novalocal sudo[102005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102005]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102008]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_access.log Mar 12 05:57:10 np0005645166.novalocal sudo[102008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102008]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102011]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_access.log Mar 12 05:57:10 np0005645166.novalocal sudo[102011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102011]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102014]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_access_ssl.log Mar 12 05:57:10 np0005645166.novalocal sudo[102014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102014]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102017]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_access_ssl.log Mar 12 05:57:10 np0005645166.novalocal sudo[102017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102017]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102020]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.log Mar 12 05:57:10 np0005645166.novalocal sudo[102020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102020]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102023]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.log Mar 12 05:57:10 np0005645166.novalocal sudo[102023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102023]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102026]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./audit.log.txt Mar 12 05:57:10 np0005645166.novalocal sudo[102026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102026]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102029]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Mar 12 05:57:10 np0005645166.novalocal sudo[102029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102029]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102032]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./keystone Mar 12 05:57:10 np0005645166.novalocal sudo[102032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102032]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102035]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./glance Mar 12 05:57:10 np0005645166.novalocal sudo[102035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102035]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102038]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./nova Mar 12 05:57:10 np0005645166.novalocal sudo[102038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102038]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102041]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./manila Mar 12 05:57:10 np0005645166.novalocal sudo[102041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102041]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102044]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf.txt Mar 12 05:57:10 np0005645166.novalocal sudo[102044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102044]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102047]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./rpm-qa.txt Mar 12 05:57:10 np0005645166.novalocal sudo[102047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102047]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102050]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./repolist.txt Mar 12 05:57:10 np0005645166.novalocal sudo[102050]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102050]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102053]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./installed-packages.txt Mar 12 05:57:10 np0005645166.novalocal sudo[102053]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102053]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102056]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./modulelist.txt Mar 12 05:57:10 np0005645166.novalocal sudo[102056]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102056]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102059]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.log Mar 12 05:57:10 np0005645166.novalocal sudo[102059]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102059]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102062]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.rpm.log Mar 12 05:57:10 np0005645166.novalocal sudo[102062]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102062]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102065]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./gem-list.txt Mar 12 05:57:10 np0005645166.novalocal sudo[102065]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102065]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102068]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./df.txt Mar 12 05:57:10 np0005645166.novalocal sudo[102068]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102068]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102071]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./free.txt Mar 12 05:57:10 np0005645166.novalocal sudo[102071]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102071]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:10 np0005645166.novalocal sudo[102074]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lsmod.txt Mar 12 05:57:10 np0005645166.novalocal sudo[102074]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:10 np0005645166.novalocal sudo[102074]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102077]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./cpuinfo.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102077]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102077]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102080]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ps.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102080]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102080]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102083]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ip_-d_address.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102083]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102083]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102086]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./brctl_show.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102086]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102086]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 12 05:57:11 np0005645166.novalocal systemd[1]: setroubleshootd.service: Consumed 1.335s CPU time. Mar 12 05:57:11 np0005645166.novalocal sudo[102089]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102089]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102089]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102092]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102092]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102092]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102095]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102095]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102095]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102098]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./netstat.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102098]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102098]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102101]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./systemctl.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102101]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102101]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102104]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iptables.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102104]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102104]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102107]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./mount.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102107]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102107]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102110]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./losetup_-al.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102110]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102110]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102113]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lvm.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102113]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102113]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102116]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./semanage-boolean-list.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102116]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102116]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102119]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102119]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102119]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102122]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./nova.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102122]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102122]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102125]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./placement.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102125]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102125]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102128]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102128]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102131]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./glance.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102131]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102131]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102134]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102134]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102137]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./manila.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102137]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102137]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102140]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102140]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102143]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./nova-cell_v2.txt Mar 12 05:57:11 np0005645166.novalocal sudo[102143]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102143]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[100971]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102148]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chown -R 0:0 /var/log/weirdo-project/logs Mar 12 05:57:11 np0005645166.novalocal sudo[102148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102148]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102151]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type l -execdir sudo rm -f {} ; Mar 12 05:57:11 np0005645166.novalocal sudo[102151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102154]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Mar 12 05:57:11 np0005645166.novalocal sudo[102154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102154]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102157]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./glance_cinder_store.filters Mar 12 05:57:11 np0005645166.novalocal sudo[102157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102157]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102160]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Mar 12 05:57:11 np0005645166.novalocal sudo[102160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102160]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102163]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./ovn.ini Mar 12 05:57:11 np0005645166.novalocal sudo[102163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102163]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102166]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./plugin.ini Mar 12 05:57:11 np0005645166.novalocal sudo[102166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102166]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102169]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn.ini Mar 12 05:57:11 np0005645166.novalocal sudo[102169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102169]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102172]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks/autostart ; USER=root ; COMMAND=/bin/rm -f ./default.xml Mar 12 05:57:11 np0005645166.novalocal sudo[102172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102172]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:11 np0005645166.novalocal sudo[102175]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_admin_add_share_panel_group.py Mar 12 05:57:11 np0005645166.novalocal sudo[102175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:11 np0005645166.novalocal sudo[102175]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102178]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_project_add_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102178]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102181]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_admin_add_shares_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102181]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102184]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_project_add_shares_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102184]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102187]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_admin_add_share_snapshots_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102187]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102190]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_project_add_share_snapshots_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102190]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102193]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9030_manila_admin_add_share_types_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102193]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102196]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_admin_add_share_networks_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102196]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102199]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_project_add_share_networks_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102199]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102202]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_admin_add_security_services_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102202]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102205]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_project_add_security_services_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102205]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102208]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9060_manila_admin_add_share_servers_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102208]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102211]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9070_manila_admin_add_share_instances_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102211]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102214]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_admin_add_share_groups_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102214]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102217]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_project_add_share_groups_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102217]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102220]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_admin_add_share_group_snapshots_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102220]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102223]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_project_add_share_group_snapshots_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102223]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102226]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9090_manila_admin_add_share_group_types_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102226]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102229]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_admin_add_user_messages_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102229]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102232]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_project_add_user_messages_panel_to_share_panel_group.py Mar 12 05:57:12 np0005645166.novalocal sudo[102232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102232]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102151]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102236]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20260312_055322.log /var/log/weirdo-project/logs/puppet-20260312_055322.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102236]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102236]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102239]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet.log /var/log/weirdo-project/logs/puppet.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102239]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102239]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102242]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-manage.log /var/log/weirdo-project/logs/cinder/cinder-manage.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102242]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102242]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102245]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/scheduler.log /var/log/weirdo-project/logs/cinder/scheduler.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102245]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102245]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102248]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/volume.log /var/log/weirdo-project/logs/cinder/volume.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102248]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102248]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102251]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/backup.log /var/log/weirdo-project/logs/cinder/backup.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102251]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102251]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102254]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-api.log /var/log/weirdo-project/logs/cinder/cinder-api.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102254]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102254]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102257]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/api.log /var/log/weirdo-project/logs/glance/api.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102257]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102257]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102260]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/horizon/horizon.log /var/log/weirdo-project/logs/horizon/horizon.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102260]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102260]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102263]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone-manage.log /var/log/weirdo-project/logs/keystone/keystone-manage.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102263]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102263]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102266]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone.log /var/log/weirdo-project/logs/keystone/keystone.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102266]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102269]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/scheduler.log /var/log/weirdo-project/logs/manila/scheduler.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102269]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102269]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102272]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/share.log /var/log/weirdo-project/logs/manila/share.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102272]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102275]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/privsep-helper.log /var/log/weirdo-project/logs/manila/privsep-helper.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102275]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102275]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102278]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/data.log /var/log/weirdo-project/logs/manila/data.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102278]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102278]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:12 np0005645166.novalocal sudo[102281]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-manage.log /var/log/weirdo-project/logs/manila/manila-manage.txt Mar 12 05:57:12 np0005645166.novalocal sudo[102281]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:12 np0005645166.novalocal sudo[102281]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102284]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/rpc-server.log /var/log/weirdo-project/logs/neutron/rpc-server.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102284]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102284]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102287]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/periodic-workers.log /var/log/weirdo-project/logs/neutron/periodic-workers.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102287]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102287]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102290]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.log /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102290]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102293]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.log /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102293]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102296]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-maintenance-worker.log /var/log/weirdo-project/logs/neutron/ovn-maintenance-worker.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102296]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102299]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/privsep-helper.log /var/log/weirdo-project/logs/neutron/privsep-helper.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102299]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102302]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/app.log /var/log/weirdo-project/logs/neutron/app.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102302]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102305]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-novncproxy.log /var/log/weirdo-project/logs/nova/nova-novncproxy.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102305]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102308]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-conductor.log /var/log/weirdo-project/logs/nova/nova-conductor.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102308]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102308]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102311]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-compute.log /var/log/weirdo-project/logs/nova/nova-compute.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102311]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102314]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-scheduler.log /var/log/weirdo-project/logs/nova/nova-scheduler.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102314]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102317]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-api.log /var/log/weirdo-project/logs/nova/nova-api.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102317]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102320]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-manage.log /var/log/weirdo-project/logs/nova/nova-manage.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102320]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102323]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/health-manager.log /var/log/weirdo-project/logs/octavia/health-manager.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102323]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102326]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/housekeeping.log /var/log/weirdo-project/logs/octavia/housekeeping.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102326]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102329]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/driver-agent.log /var/log/weirdo-project/logs/octavia/driver-agent.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102329]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102332]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/worker.log /var/log/weirdo-project/logs/octavia/worker.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102332]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102335]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102335]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102338]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102338]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102341]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-northd.log /var/log/weirdo-project/logs/ovn/ovn-northd.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102341]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102344]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-controller.log /var/log/weirdo-project/logs/ovn/ovn-controller.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102344]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102347]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/placement/placement.log /var/log/weirdo-project/logs/placement/placement.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102347]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102350]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102350]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102353]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102353]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102356]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/mariadb/mariadb.log /var/log/weirdo-project/logs/mariadb/mariadb.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102356]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102359]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dstat.log /var/log/weirdo-project/logs/dstat.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102359]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102362]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iostat.log /var/log/weirdo-project/logs/iostat.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102362]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102365]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iotop.log /var/log/weirdo-project/logs/iotop.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102365]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102368]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovsdb-server.log /var/log/weirdo-project/logs/openvswitch/ovsdb-server.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102368]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102371]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.log /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102371]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102374]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-pki.log /var/log/weirdo-project/logs/openvswitch/ovs-pki.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102374]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102377]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/neutron_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/neutron_wsgi_access_ssl.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102377]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102380]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102380]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102383]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102383]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102386]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102386]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102389]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102389]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102392]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102392]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102395]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102395]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102398]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_error.log /var/log/weirdo-project/logs/apache/horizon_error.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102398]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102401]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_error.log /var/log/weirdo-project/logs/apache/horizon_ssl_error.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102401]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102404]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.txt Mar 12 05:57:13 np0005645166.novalocal sudo[102404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:13 np0005645166.novalocal sudo[102404]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:13 np0005645166.novalocal sudo[102407]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102407]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102410]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102410]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102413]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102413]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102416]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/neutron_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/neutron_wsgi_error_ssl.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102416]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102419]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102419]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102422]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102422]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102425]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102425]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102428]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102428]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102431]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_access.log /var/log/weirdo-project/logs/apache/horizon_access.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102431]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102434]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_access.log /var/log/weirdo-project/logs/apache/horizon_ssl_access.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102434]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102437]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102437]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102440]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102440]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102443]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/redis.log /var/log/weirdo-project/logs/redis/redis.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102443]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102446]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/sentinel.log /var/log/weirdo-project/logs/redis/sentinel.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102446]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102449]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.log /var/log/weirdo-project/logs/dnf/dnf.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102449]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102452]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.rpm.log /var/log/weirdo-project/logs/dnf/dnf.rpm.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102452]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102456]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102456]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102459]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/nova /var/log/weirdo-project/logs/sudoers.d/nova.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102459]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102462]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/zuul /var/log/weirdo-project/logs/sudoers.d/zuul.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102462]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102465]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/neutron /var/log/weirdo-project/logs/sudoers.d/neutron.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102465]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102468]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/manila /var/log/weirdo-project/logs/sudoers.d/manila.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102468]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102471]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/cinder /var/log/weirdo-project/logs/sudoers.d/cinder.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102471]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102474]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/glance /var/log/weirdo-project/logs/sudoers.d/glance.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102474]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102477]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102477]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102480]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102480]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102483]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102483]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102486]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102486]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102489]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102489]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102492]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102492]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102495]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102495]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102498]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102498]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102501]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102501]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102504]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102504]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102507]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102507]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102510]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102510]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102510]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102513]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102513]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102513]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102516]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102516]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102516]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102519]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102519]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102522]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:14 np0005645166.novalocal sudo[102522]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:14 np0005645166.novalocal sudo[102525]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post.txt Mar 12 05:57:14 np0005645166.novalocal sudo[102525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102525]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102528]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102528]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102531]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102531]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102534]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102534]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102537]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102537]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102540]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102540]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102543]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102543]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102546]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102546]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102549]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102549]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102552]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102552]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102555]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/policy.yaml /var/log/weirdo-project/logs/etc/cinder/policy.yaml.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102555]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102555]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102558]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/api-paste.ini /var/log/weirdo-project/logs/etc/cinder/api-paste.ini.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102558]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102558]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102561]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/cinder.conf /var/log/weirdo-project/logs/etc/cinder/cinder.conf.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102561]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102564]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/resource_filters.json /var/log/weirdo-project/logs/etc/cinder/resource_filters.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102564]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102564]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102567]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102567]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102567]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102570]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005645166.novalocal.pem /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005645166.novalocal.pem.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102570]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102570]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102573]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102573]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102573]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102576]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102576]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102576]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102579]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102579]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102579]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102582]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102582]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102582]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102585]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102585]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102585]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102588]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102588]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102588]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102591]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102591]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102591]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102594]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102594]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102594]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102597]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102597]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102597]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102600]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102600]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102600]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102603]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102603]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102603]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102606]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102606]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102609]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102609]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102612]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102612]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102612]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102615]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102615]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102618]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102618]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102618]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102621]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102621]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102621]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102624]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102624]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102624]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102627]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102627]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102630]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102630]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102630]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102633]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json.txt Mar 12 05:57:15 np0005645166.novalocal sudo[102633]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:15 np0005645166.novalocal sudo[102633]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:15 np0005645166.novalocal sudo[102636]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102636]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102639]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102639]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102639]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102642]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102642]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102645]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102645]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102645]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102648]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102648]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102651]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102651]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102651]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102654]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102654]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102654]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102657]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102657]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102657]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102660]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102660]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102660]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102663]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102663]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102663]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102666]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102666]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102666]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102669]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102669]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102669]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102672]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005645166.novalocal.pem /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005645166.novalocal.pem.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102672]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102672]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102675]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102675]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102675]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102678]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api.conf /var/log/weirdo-project/logs/etc/glance/glance-api.conf.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102678]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102678]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102681]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-cache.conf /var/log/weirdo-project/logs/etc/glance/glance-cache.conf.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102681]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102681]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102684]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102684]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102684]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102687]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102687]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102687]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102690]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-swift.conf /var/log/weirdo-project/logs/etc/glance/glance-swift.conf.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102690]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102693]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/rootwrap.conf /var/log/weirdo-project/logs/etc/glance/rootwrap.conf.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102693]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102696]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/schema-image.json /var/log/weirdo-project/logs/etc/glance/schema-image.json.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102696]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102699]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/policy.yaml /var/log/weirdo-project/logs/etc/glance/policy.yaml.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102699]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102702]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102702]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102705]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102705]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102708]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005645166.novalocal.pem /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005645166.novalocal.pem.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102708]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102711]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.yaml /var/log/weirdo-project/logs/etc/keystone/policy.yaml.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102711]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102714]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/keystone.conf /var/log/weirdo-project/logs/etc/keystone/keystone.conf.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102714]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102717]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/logging.conf /var/log/weirdo-project/logs/etc/keystone/logging.conf.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102717]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102720]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102720]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102723]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/1 /var/log/weirdo-project/logs/etc/keystone/credential-keys/1.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102723]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102726]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/0 /var/log/weirdo-project/logs/etc/keystone/credential-keys/0.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102726]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102729]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/api-paste.ini /var/log/weirdo-project/logs/etc/manila/api-paste.ini.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102729]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102732]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/manila.conf /var/log/weirdo-project/logs/etc/manila/manila.conf.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102732]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102735]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/rootwrap.conf /var/log/weirdo-project/logs/etc/manila/rootwrap.conf.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102735]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102738]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/policy.yaml /var/log/weirdo-project/logs/etc/manila/policy.yaml.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102738]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102741]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005645166.novalocal.pem /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005645166.novalocal.pem.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102741]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:16 np0005645166.novalocal sudo[102744]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem.txt Mar 12 05:57:16 np0005645166.novalocal sudo[102744]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:16 np0005645166.novalocal sudo[102744]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102747]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102747]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102747]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102750]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102750]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102750]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102753]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102753]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102756]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102756]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102759]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/conf.d/README /var/log/weirdo-project/logs/etc/neutron/conf.d/README.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102759]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102762]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron.conf /var/log/weirdo-project/logs/etc/neutron/neutron.conf.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102762]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102765]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102765]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102768]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/api-paste.ini /var/log/weirdo-project/logs/etc/neutron/api-paste.ini.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102768]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102771]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102771]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102774]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102774]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102777]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102777]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102780]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102780]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102783]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102783]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102786]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102786]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102789]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/policy.yaml /var/log/weirdo-project/logs/etc/neutron/policy.yaml.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102789]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102792]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102792]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102795]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102795]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102798]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102798]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102801]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005645166.novalocal.pem /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005645166.novalocal.pem.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102801]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102804]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.yaml /var/log/weirdo-project/logs/etc/nova/policy.yaml.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102804]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102807]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/api-paste.ini /var/log/weirdo-project/logs/etc/nova/api-paste.ini.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102807]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102810]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova.conf /var/log/weirdo-project/logs/etc/nova/nova.conf.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102810]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102813]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/release /var/log/weirdo-project/logs/etc/nova/release.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102813]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102816]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/rootwrap.conf /var/log/weirdo-project/logs/etc/nova/rootwrap.conf.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102816]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102819]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova-compute.conf /var/log/weirdo-project/logs/etc/nova/nova-compute.conf.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102819]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102824]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005645166.novalocal.pem /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005645166.novalocal.pem.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102824]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102824]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102827]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102827]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102827]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102830]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102830]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102830]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102833]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102833]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102833]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102836]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102836]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102836]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102839]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005645166.novalocal.pem /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005645166.novalocal.pem.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102839]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102839]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102842]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/octavia.conf /var/log/weirdo-project/logs/etc/octavia/octavia.conf.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102842]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102845]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/policy.yaml /var/log/weirdo-project/logs/etc/octavia/policy.yaml.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102845]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102845]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102848]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102848]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102848]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102851]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102851]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102851]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102854]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102854]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102857]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem.txt Mar 12 05:57:17 np0005645166.novalocal sudo[102857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:17 np0005645166.novalocal sudo[102857]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:17 np0005645166.novalocal sudo[102860]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102860]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102863]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005645166.novalocal.pem /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005645166.novalocal.pem.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102863]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102863]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102866]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/placement.conf /var/log/weirdo-project/logs/etc/placement/placement.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102866]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102869]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.yaml /var/log/weirdo-project/logs/etc/placement/policy.yaml.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102869]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102872]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102872]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102875]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102875]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102878]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102878]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102881]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102881]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102885]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/tempest.conf /var/log/weirdo-project/logs/etc/tempest/tempest.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102885]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102888]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102888]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102891]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.conf /var/log/weirdo-project/logs/etc/rsyslog.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102891]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102894]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005645166.novalocal.pem /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005645166.novalocal.pem.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102894]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102897]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102897]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102900]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102900]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102903]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/inetrc /var/log/weirdo-project/logs/etc/rabbitmq/inetrc.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102903]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102906]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102906]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102909]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102909]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102912]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102912]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102915]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf /var/log/weirdo-project/logs/etc/my.cnf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102915]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102918]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102918]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102921]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102921]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102924]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102924]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102927]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102927]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102927]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102930]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102930]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102930]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102933]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102933]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102933]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102936]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102936]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102936]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102939]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/np0005645166.novalocal.pem /var/log/weirdo-project/logs/etc/my.cnf.d/np0005645166.novalocal.pem.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102939]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102942]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102942]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102945]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102945]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102948]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102948]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102951]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102951]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102954]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102954]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102957]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102957]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102960]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102960]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102963]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102963]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102966]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102966]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102969]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102969]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102972]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102972]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:18 np0005645166.novalocal sudo[102975]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/network.conf /var/log/weirdo-project/logs/etc/libvirt/network.conf.txt Mar 12 05:57:18 np0005645166.novalocal sudo[102975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:18 np0005645166.novalocal sudo[102975]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[102978]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[102978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[102978]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[102981]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[102981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[102981]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[102984]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[102984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[102984]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[102987]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[102987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[102987]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[102990]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu.conf /var/log/weirdo-project/logs/etc/libvirt/qemu.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[102990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[102990]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[102993]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[102993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[102993]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[102996]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[102996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[102996]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[102999]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem.txt Mar 12 05:57:19 np0005645166.novalocal sudo[102999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[102999]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103002]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/default.conf /var/log/weirdo-project/logs/etc/openvswitch/default.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103002]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103005]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~ /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103005]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103008]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/conf.db /var/log/weirdo-project/logs/etc/openvswitch/conf.db.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103008]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103011]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103011]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103014]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103014]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103017]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103017]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103020]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103020]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103023]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103023]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103026]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103026]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103029]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103029]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103032]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103032]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103035]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103035]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103038]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103038]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103041]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/magic /var/log/weirdo-project/logs/etc/httpd/conf/magic.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103041]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103044]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103044]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103047]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103047]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103050]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103050]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103050]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103053]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103053]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103053]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103056]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103056]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103056]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103059]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-neutron_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-neutron_wsgi.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103059]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103059]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103060]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 12 05:57:19 np0005645166.novalocal systemd[1]: Started Session c98 of User root. Mar 12 05:57:19 np0005645166.novalocal sudo[103060]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:57:19 np0005645166.novalocal sudo[103064]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103064]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103064]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103068]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103068]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103068]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103071]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103071]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103071]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103074]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103074]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103074]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103077]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103077]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103077]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103080]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103080]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103080]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103083]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103083]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103083]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103086]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103086]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103086]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103089]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load.txt Mar 12 05:57:19 np0005645166.novalocal sudo[103089]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:19 np0005645166.novalocal sudo[103089]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:19 np0005645166.novalocal sudo[103092]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103092]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103092]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103096]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103096]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103099]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103099]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103102]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103102]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103060]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal systemd[1]: session-c98.scope: Deactivated successfully. Mar 12 05:57:20 np0005645166.novalocal sudo[103105]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103105]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103106]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:57:20 np0005645166.novalocal systemd[1]: Started Session c99 of User root. Mar 12 05:57:20 np0005645166.novalocal sudo[103106]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:57:20 np0005645166.novalocal sudo[103110]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103110]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103110]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103114]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103114]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103117]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103117]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103120]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103120]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103123]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103123]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103126]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103126]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103129]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103129]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103132]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103132]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103135]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103135]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103139]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103139]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103142]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103142]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103106]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103145]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load.txt Mar 12 05:57:20 np0005645166.novalocal systemd[1]: session-c99.scope: Deactivated successfully. Mar 12 05:57:20 np0005645166.novalocal sudo[103145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103145]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103147]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 12 05:57:20 np0005645166.novalocal systemd[1]: Started Session c100 of User root. Mar 12 05:57:20 np0005645166.novalocal sudo[103149]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf /var/log/weirdo-project/logs/etc/redis/sentinel.conf.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103147]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:57:20 np0005645166.novalocal sudo[103149]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103149]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103154]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf /var/log/weirdo-project/logs/etc/redis/redis.conf.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103154]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103157]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103157]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103160]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103160]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103163]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005645166.novalocal.pem /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005645166.novalocal.pem.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103163]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103166]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103166]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103169]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103169]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103172]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103172]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103175]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103175]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103178]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103178]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103181]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103181]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103184]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103184]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103188]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103188]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103191]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103191]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103147]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal systemd[1]: session-c100.scope: Deactivated successfully. Mar 12 05:57:20 np0005645166.novalocal sudo[103194]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103194]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103194]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103196]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 12 05:57:20 np0005645166.novalocal sudo[103198]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt.txt Mar 12 05:57:20 np0005645166.novalocal systemd[1]: Started Session c101 of User root. Mar 12 05:57:20 np0005645166.novalocal sudo[103196]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 12 05:57:20 np0005645166.novalocal sudo[103198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103198]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103203]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103203]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103203]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103206]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103206]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103206]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103209]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103209]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103209]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103212]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103212]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103212]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103215]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103215]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103215]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103218]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103218]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103218]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103221]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example.txt Mar 12 05:57:20 np0005645166.novalocal sudo[103221]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:20 np0005645166.novalocal sudo[103221]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:20 np0005645166.novalocal sudo[103224]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103224]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103224]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103227]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103227]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103227]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103230]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103230]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103230]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103233]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103233]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103233]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103237]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005645166.novalocal.pem /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005645166.novalocal.pem.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103237]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103240]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103240]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103243]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103243]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103246]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103246]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103196]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal systemd[1]: session-c101.scope: Deactivated successfully. Mar 12 05:57:21 np0005645166.novalocal sudo[103249]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103249]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103252]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103252]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103255]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-zuul-repo.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-zuul-repo.repo.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103255]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103258]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103258]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103261]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103261]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103264]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/passwd /var/log/weirdo-project/logs/etc/passwd.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103264]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103267]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/group /var/log/weirdo-project/logs/etc/group.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103267]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103270]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103270]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103273]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/fstab /var/log/weirdo-project/logs/etc/fstab.txt Mar 12 05:57:21 np0005645166.novalocal sudo[103273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 12 05:57:21 np0005645166.novalocal sudo[103273]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[100011]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103379]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jrrfnmqxfbejxmdagitjvnxmshjxzjts ; /usr/bin/python3' Mar 12 05:57:21 np0005645166.novalocal sudo[103379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:57:21 np0005645166.novalocal python3[103381]: ansible-command Invoked with creates=/var/log/weirdo/cpuinfo.txt _raw_params=cat /proc/cpuinfo >/var/log/weirdo/cpuinfo.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 12 05:57:21 np0005645166.novalocal sudo[103379]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103387]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-enjvhlmkybrppgicjtizooyiyjzvmdew ; /usr/bin/python3' Mar 12 05:57:21 np0005645166.novalocal sudo[103387]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:57:21 np0005645166.novalocal python3[103389]: ansible-command Invoked with creates=/var/log/weirdo/df.txt _raw_params=df -h >/var/log/weirdo/df.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 12 05:57:21 np0005645166.novalocal sudo[103387]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:21 np0005645166.novalocal sudo[103394]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hworrmppbrzfluncsiuzfjjcjigdfknj ; /usr/bin/python3' Mar 12 05:57:21 np0005645166.novalocal sudo[103394]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:57:22 np0005645166.novalocal python3[103396]: ansible-command Invoked with creates=/var/log/weirdo/dmesg.txt _raw_params=dmesg -T >/var/log/weirdo/dmesg.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 12 05:57:22 np0005645166.novalocal sudo[103394]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:22 np0005645166.novalocal sudo[103401]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dlyzrlxxukmzytgedkbigygiscsgzqmj ; /usr/bin/python3' Mar 12 05:57:22 np0005645166.novalocal sudo[103401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:57:22 np0005645166.novalocal python3[103403]: ansible-command Invoked with creates=/var/log/weirdo/fdisk.txt _raw_params=fdisk -l >/var/log/weirdo/fdisk.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 12 05:57:22 np0005645166.novalocal sudo[103401]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:22 np0005645166.novalocal sudo[103408]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hrufccnjpkbxkobhjtvniwkngkezmrvw ; /usr/bin/python3' Mar 12 05:57:22 np0005645166.novalocal sudo[103408]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:57:22 np0005645166.novalocal python3[103410]: ansible-command Invoked with creates=/var/log/weirdo/getenforce.txt _raw_params=getenforce >/var/log/weirdo/getenforce.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 12 05:57:22 np0005645166.novalocal sudo[103408]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:22 np0005645166.novalocal sudo[103415]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-elfiqypwhvmnnubrfuizmkiosvvsqwqp ; /usr/bin/python3' Mar 12 05:57:22 np0005645166.novalocal sudo[103415]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:57:22 np0005645166.novalocal python3[103417]: ansible-command Invoked with creates=/var/log/weirdo/hosts.txt _raw_params=cat /etc/hosts >/var/log/weirdo/hosts.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 12 05:57:22 np0005645166.novalocal sudo[103415]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:22 np0005645166.novalocal sudo[103422]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-eupxbwmnmwulbqmpvnceqmdpgbwwovum ; /usr/bin/python3' Mar 12 05:57:22 np0005645166.novalocal sudo[103422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:57:23 np0005645166.novalocal python3[103424]: ansible-command Invoked with creates=/var/log/weirdo/ip.txt _raw_params=ip a >/var/log/weirdo/ip.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 12 05:57:23 np0005645166.novalocal sudo[103422]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:23 np0005645166.novalocal sudo[103429]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xnixesrpzhryjfuclnvcpfiktyfnmtwb ; /usr/bin/python3' Mar 12 05:57:23 np0005645166.novalocal sudo[103429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:57:23 np0005645166.novalocal python3[103431]: ansible-command Invoked with creates=/var/log/weirdo/iptables.txt _raw_params=iptables -vnL >/var/log/weirdo/iptables.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 12 05:57:23 np0005645166.novalocal sudo[103429]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:23 np0005645166.novalocal sudo[103436]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uxmhsdslgshhdlidqjcplvggyknuvjub ; /usr/bin/python3' Mar 12 05:57:23 np0005645166.novalocal sudo[103436]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:57:23 np0005645166.novalocal python3[103438]: ansible-command Invoked with creates=/var/log/weirdo/iptables_nat.txt _raw_params=iptables -vnL -t nat >/var/log/weirdo/iptables_nat.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 12 05:57:23 np0005645166.novalocal sudo[103436]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:23 np0005645166.novalocal sudo[103443]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uaatwertyystgvlcoqnukyaulrmdhaui ; /usr/bin/python3' Mar 12 05:57:23 np0005645166.novalocal sudo[103443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:57:23 np0005645166.novalocal python3[103445]: ansible-command Invoked with creates=/var/log/weirdo/iptables_mangle.txt _raw_params=iptables -vnL -t mangle >/var/log/weirdo/iptables_mangle.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 12 05:57:23 np0005645166.novalocal sudo[103443]: pam_unix(sudo:session): session closed for user root Mar 12 05:57:23 np0005645166.novalocal sudo[103451]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mcaouzlcmddehzzuydqozxxyuctsxyit ; /usr/bin/python3' Mar 12 05:57:23 np0005645166.novalocal sudo[103451]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 12 05:57:23 np0005645166.novalocal python3[103453]: ansible-command Invoked with creates=/var/log/weirdo/journalctl.txt _raw_params=journalctl --no-pager >/var/log/weirdo/journalctl.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None