2026-03-17 15:06:51.938059 /usr/local/lib/python3.12/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. 2026-03-17 15:06:51.938104 version_info = version.StrictVersion(__version__).version 2026-03-17 15:06:51.960696 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerMiddleware' 2026-03-17 15:06:51.960777 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerClientMiddleware' 2026-03-17 15:06:51.973654 DEBUG django.request MiddlewareNotUsed: 'horizon.middleware.OperationLogMiddleware' 2026-03-17 15:06:52.446798 DEBUG horizon.base Load condition failed for panel: identity_providers 2026-03-17 15:06:52.447398 DEBUG horizon.base Load condition failed for panel: mappings 2026-03-17 15:06:53.684200 /usr/local/lib/python3.12/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. 2026-03-17 15:06:53.684234 version_info = version.StrictVersion(__version__).version 2026-03-17 15:06:53.703073 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerMiddleware' 2026-03-17 15:06:53.703136 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerClientMiddleware' 2026-03-17 15:06:53.709002 DEBUG django.request MiddlewareNotUsed: 'horizon.middleware.OperationLogMiddleware' 2026-03-17 15:06:54.162151 DEBUG horizon.base Load condition failed for panel: identity_providers 2026-03-17 15:06:54.162497 DEBUG horizon.base Load condition failed for panel: mappings 2026-03-17 15:06:54.430536 INFO openstack_auth.views Remembering post_login_redirect in session: /dashboard/ 2026-03-17 15:06:55.221359 /usr/local/lib/python3.12/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. 2026-03-17 15:06:55.221395 version_info = version.StrictVersion(__version__).version 2026-03-17 15:06:55.239914 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerMiddleware' 2026-03-17 15:06:55.239978 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerClientMiddleware' 2026-03-17 15:06:55.245658 DEBUG django.request MiddlewareNotUsed: 'horizon.middleware.OperationLogMiddleware' 2026-03-17 15:06:55.560948 DEBUG horizon.base Load condition failed for panel: identity_providers 2026-03-17 15:06:55.561251 DEBUG horizon.base Load condition failed for panel: mappings 2026-03-17 15:06:55.795894 INFO openstack_auth.views Remembering post_login_redirect in session: /dashboard/ 2026-03-17 15:06:55.868898 DEBUG openstack_auth.backend Beginning user authentication 2026-03-17 15:06:55.869063 DEBUG openstack_auth.plugin.password Attempting to authenticate for tempest-TestDashboardBasicOps-546233789-project-member 2026-03-17 15:06:55.869561 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.89/identity/v3/auth/tokens 2026-03-17 15:06:55.919806 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1f8adb6155be4f1691bb774a69803305", "name": "tempest-TestDashboardBasicOps-546233789-project-member", "password_expires_at": null}, "audit_ids": ["CahRjDWEROGEwkvUv0Ffdg"], "expires_at": "2026-03-17T16:06:55.000000Z", "issued_at": "2026-03-17T15:06:55.000000Z"}} 2026-03-17 15:06:55.920263 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.89/identity/v3/auth/tokens 2026-03-17 15:06:55.968101 DEBUG keystoneauth.session Request returned failure status: 401 2026-03-17 15:06:55.968275 INFO openstack_auth.plugin.base Attempted scope to domain Default failed, will attempt to scope to another domain. 2026-03-17 15:06:55.969941 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/identity/v3/users/1f8adb6155be4f1691bb774a69803305/projects? -H "Accept: application/json" -H "Forwarded: for=::1;by=python-keystoneclient" -H "User-Agent: python-keystoneclient" -H "X-Auth-Token: {SHA256}9279ff5c6811a28ca62c327102b44dccca115d95184712b3766663332c776c31" 2026-03-17 15:06:56.016827 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 517 Content-Type: application/json Date: Tue, 17 Mar 2026 15:06:55 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-cf308855-bf17-4159-938b-4a44e316bd10 2026-03-17 15:06:56.016950 DEBUG keystoneauth.session RESP BODY: {"projects": [{"id": "f0cde6631dcc4340a688f3402ae6d7bf", "name": "tempest-TestDashboardBasicOps-546233789", "domain_id": "default", "description": "tempest-TestDashboardBasicOps-546233789-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "https://38.102.83.89/identity/v3/projects/f0cde6631dcc4340a688f3402ae6d7bf"}}], "links": {"next": null, "self": "https://38.102.83.89/identity/v3/users/1f8adb6155be4f1691bb774a69803305/projects", "previous": null}} 2026-03-17 15:06:56.016959 2026-03-17 15:06:56.017027 DEBUG keystoneauth.session GET call to identity for https://38.102.83.89/identity/v3/users/1f8adb6155be4f1691bb774a69803305/projects used request id req-cf308855-bf17-4159-938b-4a44e316bd10 2026-03-17 15:06:56.017358 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.89/identity/v3/auth/tokens 2026-03-17 15:06:56.039209 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["token", "password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1f8adb6155be4f1691bb774a69803305", "name": "tempest-TestDashboardBasicOps-546233789-project-member", "password_expires_at": null}, "audit_ids": ["fxJshY3xTIyiKFmj5ToScA", "CahRjDWEROGEwkvUv0Ffdg"], "expires_at": "2026-03-17T16:06:55.000000Z", "issued_at": "2026-03-17T15:06:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cde6631dcc4340a688f3402ae6d7bf", "name": "tempest-TestDashboardBasicOps-546233789"}, "is_domain": false, "roles": [{"id": "8517a23e52084dfda5b116dfc235ee57", "name": "member"}, {"id": "0787a9713d9a441e926ee002df120507", "name": "reader"}], "catalog": [{"endpoints": [{"id": "4bdea49d7bf342c3bfb38a460f323c0c", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/networking", "region": "RegionOne"}], "id": "1606bbba0b224aaaa5aa0e55e1d612b9", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "adffec8e3ee34f4aa182cb30c6f88bd0", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/compute/v2.1", "region": "RegionOne"}], "id": "5d3a916de50e4f81940bdfe3ced67c38", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "77c8f13af7cb421b91a2d15b123d76b3", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/volume/v3", "region": "RegionOne"}], "id": "699eed5e1bd84800aaebbd33d78651ea", "type": "block-storage", "name": "cinder"}, {"endpoints": [{"id": "1b89cedc0212427dbd1a394aae636416", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/placement", "region": "RegionOne"}], "id": "925478c664944804aeef7b08273378bf", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "bbd0d04786ba422db1966944a75f3485", "interface": "admin", "region_id": "RegionOne", "url": "https://38.102.83.89:8080", "region": "RegionOne"}, {"id": "e05674dfba9d40b09cee94f6247c464c", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89:8080/v1/AUTH_f0cde6631dcc4340a688f3402ae6d7bf", "region": "RegionOne"}], "id": "9bfde825e4d14f5b9a88af13835367ce", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "20991b22519f4db9a40abe16e0562fd4", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/identity", "region": "RegionOne"}], "id": "af12d999be254010ae33a0b467a294f9", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "4ec9d40dd79c4ba383df17eb2d409b81", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/image", "region": "RegionOne"}], "id": "bcae50335b7647618b05279994454f51", "type": "image", "name": "glance"}, {"endpoints": [{"id": "ca4fbbd4e01c406c86f994d421183915", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/compute/v2/f0cde6631dcc4340a688f3402ae6d7bf", "region": "RegionOne"}], "id": "f4c1deeec8724866b2be2574d0f547ed", "type": "compute_legacy", "name": "nova_legacy"}]}} 2026-03-17 15:06:56.040822 DEBUG openstack_auth.backend Authentication completed. 2026-03-17 15:06:56.040931 INFO openstack_auth.forms Login successful for user "tempest-TestDashboardBasicOps-546233789-project-member" using domain "Default", remote address ::1. 2026-03-17 15:06:56.059594 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/identity -H "Accept: application/json" -H "User-Agent: python-novaclient keystoneauth1/5.13.1 python-requests/2.32.5 CPython/3.12.12" 2026-03-17 15:06:56.071889 DEBUG keystoneauth.session RESP: [300] Connection: close Content-Length: 272 Content-Type: application/json Date: Tue, 17 Mar 2026 15:06:56 GMT Location: https://38.102.83.89/identity/v3/ Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-5d926437-d0dd-4cac-9593-b21f542a4579 2026-03-17 15:06:56.071955 DEBUG keystoneauth.session RESP BODY: {"versions": {"values": [{"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.89/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}]}} 2026-03-17 15:06:56.071989 DEBUG keystoneauth.session GET call to https://38.102.83.89/identity used request id req-5d926437-d0dd-4cac-9593-b21f542a4579 2026-03-17 15:06:56.072182 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.89/identity/v3/auth/tokens 2026-03-17 15:06:56.098149 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["token", "password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1f8adb6155be4f1691bb774a69803305", "name": "tempest-TestDashboardBasicOps-546233789-project-member", "password_expires_at": null}, "audit_ids": ["tYQ8L8aFTqyIc5LbA71u4w", "CahRjDWEROGEwkvUv0Ffdg"], "expires_at": "2026-03-17T16:06:55.000000Z", "issued_at": "2026-03-17T15:06:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cde6631dcc4340a688f3402ae6d7bf", "name": "tempest-TestDashboardBasicOps-546233789"}, "is_domain": false, "roles": [{"id": "8517a23e52084dfda5b116dfc235ee57", "name": "member"}, {"id": "0787a9713d9a441e926ee002df120507", "name": "reader"}], "catalog": [{"endpoints": [{"id": "4bdea49d7bf342c3bfb38a460f323c0c", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/networking", "region": "RegionOne"}], "id": "1606bbba0b224aaaa5aa0e55e1d612b9", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "adffec8e3ee34f4aa182cb30c6f88bd0", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/compute/v2.1", "region": "RegionOne"}], "id": "5d3a916de50e4f81940bdfe3ced67c38", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "77c8f13af7cb421b91a2d15b123d76b3", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/volume/v3", "region": "RegionOne"}], "id": "699eed5e1bd84800aaebbd33d78651ea", "type": "block-storage", "name": "cinder"}, {"endpoints": [{"id": "1b89cedc0212427dbd1a394aae636416", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/placement", "region": "RegionOne"}], "id": "925478c664944804aeef7b08273378bf", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "bbd0d04786ba422db1966944a75f3485", "interface": "admin", "region_id": "RegionOne", "url": "https://38.102.83.89:8080", "region": "RegionOne"}, {"id": "e05674dfba9d40b09cee94f6247c464c", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89:8080/v1/AUTH_f0cde6631dcc4340a688f3402ae6d7bf", "region": "RegionOne"}], "id": "9bfde825e4d14f5b9a88af13835367ce", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "20991b22519f4db9a40abe16e0562fd4", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/identity", "region": "RegionOne"}], "id": "af12d999be254010ae33a0b467a294f9", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "4ec9d40dd79c4ba383df17eb2d409b81", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/image", "region": "RegionOne"}], "id": "bcae50335b7647618b05279994454f51", "type": "image", "name": "glance"}, {"endpoints": [{"id": "ca4fbbd4e01c406c86f994d421183915", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/compute/v2/f0cde6631dcc4340a688f3402ae6d7bf", "region": "RegionOne"}], "id": "f4c1deeec8724866b2be2574d0f547ed", "type": "compute_legacy", "name": "nova_legacy"}]}} 2026-03-17 15:06:56.098457 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/compute/v2.1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}a37a1b813bd4160ed440886e4466b9366a48886912da4e30df9fc74631f4b2ce" 2026-03-17 15:06:56.116996 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 391 Content-Type: application/json Date: Tue, 17 Mar 2026 15:06:56 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-7190ecda-5b0f-4688-9e37-eca4f059e33a x-openstack-request-id: req-7190ecda-5b0f-4688-9e37-eca4f059e33a 2026-03-17 15:06:56.117073 DEBUG novaclient.v2.client RESP BODY: {"version": {"id": "v2.1", "status": "CURRENT", "version": "2.103", "min_version": "2.1", "updated": "2013-07-23T11:33:21Z", "links": [{"rel": "self", "href": "https://38.102.83.89/compute/v2.1/"}, {"rel": "describedby", "type": "text/html", "href": "http://docs.openstack.org/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.compute+json;version=2.1"}]}} 2026-03-17 15:06:56.117125 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.89/compute/v2.1 used request id req-7190ecda-5b0f-4688-9e37-eca4f059e33a 2026-03-17 15:06:56.118165 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/identity -H "Accept: application/json" -H "User-Agent: python-novaclient keystoneauth1/5.13.1 python-requests/2.32.5 CPython/3.12.12" 2026-03-17 15:06:56.126888 DEBUG keystoneauth.session RESP: [300] Connection: close Content-Length: 272 Content-Type: application/json Date: Tue, 17 Mar 2026 15:06:56 GMT Location: https://38.102.83.89/identity/v3/ Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-5c5b3a12-4f23-4d8f-9d90-c0634403ffac 2026-03-17 15:06:56.126976 DEBUG keystoneauth.session RESP BODY: {"versions": {"values": [{"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.89/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}]}} 2026-03-17 15:06:56.127040 DEBUG keystoneauth.session GET call to https://38.102.83.89/identity used request id req-5c5b3a12-4f23-4d8f-9d90-c0634403ffac 2026-03-17 15:06:56.127280 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.89/identity/v3/auth/tokens 2026-03-17 15:06:56.150542 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["token", "password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1f8adb6155be4f1691bb774a69803305", "name": "tempest-TestDashboardBasicOps-546233789-project-member", "password_expires_at": null}, "audit_ids": ["iBz85hqNQnyXbBk4mcTy5w", "CahRjDWEROGEwkvUv0Ffdg"], "expires_at": "2026-03-17T16:06:55.000000Z", "issued_at": "2026-03-17T15:06:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cde6631dcc4340a688f3402ae6d7bf", "name": "tempest-TestDashboardBasicOps-546233789"}, "is_domain": false, "roles": [{"id": "8517a23e52084dfda5b116dfc235ee57", "name": "member"}, {"id": "0787a9713d9a441e926ee002df120507", "name": "reader"}], "catalog": [{"endpoints": [{"id": "4bdea49d7bf342c3bfb38a460f323c0c", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/networking", "region": "RegionOne"}], "id": "1606bbba0b224aaaa5aa0e55e1d612b9", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "adffec8e3ee34f4aa182cb30c6f88bd0", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/compute/v2.1", "region": "RegionOne"}], "id": "5d3a916de50e4f81940bdfe3ced67c38", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "77c8f13af7cb421b91a2d15b123d76b3", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/volume/v3", "region": "RegionOne"}], "id": "699eed5e1bd84800aaebbd33d78651ea", "type": "block-storage", "name": "cinder"}, {"endpoints": [{"id": "1b89cedc0212427dbd1a394aae636416", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/placement", "region": "RegionOne"}], "id": "925478c664944804aeef7b08273378bf", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "bbd0d04786ba422db1966944a75f3485", "interface": "admin", "region_id": "RegionOne", "url": "https://38.102.83.89:8080", "region": "RegionOne"}, {"id": "e05674dfba9d40b09cee94f6247c464c", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89:8080/v1/AUTH_f0cde6631dcc4340a688f3402ae6d7bf", "region": "RegionOne"}], "id": "9bfde825e4d14f5b9a88af13835367ce", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "20991b22519f4db9a40abe16e0562fd4", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/identity", "region": "RegionOne"}], "id": "af12d999be254010ae33a0b467a294f9", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "4ec9d40dd79c4ba383df17eb2d409b81", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/image", "region": "RegionOne"}], "id": "bcae50335b7647618b05279994454f51", "type": "image", "name": "glance"}, {"endpoints": [{"id": "ca4fbbd4e01c406c86f994d421183915", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/compute/v2/f0cde6631dcc4340a688f3402ae6d7bf", "region": "RegionOne"}], "id": "f4c1deeec8724866b2be2574d0f547ed", "type": "compute_legacy", "name": "nova_legacy"}]}} 2026-03-17 15:06:56.150808 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/compute/v2.1/os-simple-tenant-usage/f0cde6631dcc4340a688f3402ae6d7bf?start=2026-03-16T00:00:00&end=2026-03-17T23:59:59 -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.40" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}d69d71152587f212493a0a3d7846647134ad3143f42e5a86f7bd2440cd148581" -H "X-OpenStack-Nova-API-Version: 2.40" 2026-03-17 15:06:56.316519 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 20 Content-Type: application/json Date: Tue, 17 Mar 2026 15:06:56 GMT OpenStack-API-Version: compute 2.40 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.40 x-compute-request-id: req-841a4fe7-1f1f-4a4c-9205-b734ded1db3d x-openstack-request-id: req-841a4fe7-1f1f-4a4c-9205-b734ded1db3d 2026-03-17 15:06:56.316599 DEBUG novaclient.v2.client RESP BODY: {"tenant_usage": {}} 2026-03-17 15:06:56.316669 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.89/compute/v2.1/os-simple-tenant-usage/f0cde6631dcc4340a688f3402ae6d7bf?start=2026-03-16T00:00:00&end=2026-03-17T23:59:59 used request id req-841a4fe7-1f1f-4a4c-9205-b734ded1db3d 2026-03-17 15:06:56.325643 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/networking/v2.0/extensions -H "Accept: application/json" -H "Forwarded: for=::1;by=openstack keystoneauth1/5.13.1 python-requests/2.32.5 CPython/3.12.12" -H "User-Agent: openstack keystoneauth1/5.13.1 python-requests/2.32.5 CPython/3.12.12" -H "X-Auth-Token: {SHA256}38311cc09c2fb7aa04def5c8b4b2b720744f79eb15dcc96aceee92ed21b65fb7" 2026-03-17 15:06:56.389671 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 15208 Content-Type: application/json Date: Tue, 17 Mar 2026 15:06:56 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 x-openstack-request-id: req-4d494d7c-bea0-491d-ab63-60825aaddd90 2026-03-17 15:06:56.391769 DEBUG keystoneauth.session RESP BODY: {"extensions": [{"name": "Address group", "alias": "address-group", "description": "Support address group", "updated": "2020-07-15T10:00:00-00:00", "links": []}, {"name": "Address scope", "alias": "address-scope", "description": "Address scopes extension.", "updated": "2015-07-26T10:00:00-00:00", "links": []}, {"name": "agent", "alias": "agent", "description": "The agent management extension.", "updated": "2013-02-03T10:00:00-00:00", "links": []}, {"name": "Allowed Address Pairs", "alias": "allowed-address-pairs", "description": "Provides allowed address pairs", "updated": "2013-07-23T10:00:00-00:00", "links": []}, {"name": "Auto Allocated Topology Services", "alias": "auto-allocated-topology", "description": "Auto Allocated Topology Services.", "updated": "2016-01-01T00:00:00-00:00", "links": []}, {"name": "Availability Zone", "alias": "availability_zone", "description": "The availability zone extension.", "updated": "2015-01-01T10:00:00-00:00", "links": []}, {"name": "Default Subnetpools", "alias": "default-subnetpools", "description": "Provides ability to mark and use a subnetpool as the default.", "updated": "2016-02-18T18:00:00-00:00", "links": []}, {"name": "DHCP Agent Scheduler", "alias": "dhcp_agent_scheduler", "description": "Schedule networks among dhcp agents", "updated": "2013-02-07T10:00:00-00:00", "links": []}, {"name": "DNS Integration", "alias": "dns-integration", "description": "Provides integration with DNS.", "updated": "2015-08-15T18:00:00-00:00", "links": []}, {"name": "dns_domain for ports", "alias": "dns-domain-ports", "description": "Allows the DNS domain to be specified for a network port.", "updated": "2017-04-24T10:00:00-00:00", "links": []}, {"name": "DNS domain names with keywords allowed", "alias": "dns-integration-domain-keywords", "description": "Allows to use keywords like , , and as DNS domain name", "updated": "2020-06-15T18:00:00-00:00", "links": []}, {"name": "Empty String Filtering Extension", "alias": "empty-string-filtering", "description": "Allow filtering by attributes with empty string value", "updated": "2018-05-01T10:00:00-00:00", "links": []}, {"name": "Neutron external network", "alias": "external-net", "description": "Adds external network attribute to network resource.", "updated": "2013-01-14T10:00:00-00:00", "links": []}, {"name": "Neutron Extra DHCP options", "alias": "extra_dhcp_opt", "description": "Extra options configuration for DHCP. For example PXE boot options to DHCP clients can be specified (e.g. tftp-server, server-ip-address, bootfile-name)", "updated": "2013-03-17T12:00:00-00:00", "links": []}, {"name": "Neutron Extra Route", "alias": "extraroute", "description": "Extra routes configuration for L3 router", "updated": "2013-02-01T10:00:00-00:00", "links": []}, {"name": "Atomically add/remove extra routes", "alias": "extraroute-atomic", "description": "Edit extra routes of a router on server side by atomically adding/removing extra routes", "updated": "2019-07-10T00:00:00+00:00", "links": []}, {"name": "Filter parameters validation", "alias": "filter-validation", "description": "Provides validation on filter parameters.", "updated": "2018-07-04T10:00:00-00:00", "links": []}, {"name": "Floating IP port forwarding detail", "alias": "floating-ip-port-forwarding-detail", "description": "Allow list floating ip return more port forwarding data, include'id' and 'internal_port_id'", "updated": "2022-05-06T10:00:00-00:00", "links": []}, {"name": "Floating IP Port Details Extension", "alias": "fip-port-details", "description": "Add port_details attribute to Floating IP resource", "updated": "2018-04-09T10:00:00-00:00", "links": []}, {"name": "Neutron Service Flavors", "alias": "flavors", "description": "Flavor specification for Neutron advanced services.", "updated": "2015-09-17T10:00:00-00:00", "links": []}, {"name": "Floating IP Pools Extension", "alias": "floatingip-pools", "description": "Provides a floating IP pools API.", "updated": "2018-03-21T10:00:00-00:00", "links": []}, {"name": "Neutron L3 Router", "alias": "router", "description": "Router abstraction for basic L3 forwarding between L2 Neutron networks and access to external networks via a NAT gateway.", "updated": "2012-07-20T10:00:00-00:00", "links": []}, {"name": "Enable Default Route BFD", "alias": "enable-default-route-bfd", "description": "Enables configurable BFD behavior for default routes", "updated": "2023-02-27T00:00:00-00:00", "links": []}, {"name": "Enable Default Route ECMP", "alias": "enable-default-route-ecmp", "description": "Enables configurable ECMP behavior for default routes", "updated": "2023-02-27T00:00:00-00:00", "links": []}, {"name": "Neutron L3 Configurable external gateway mode", "alias": "ext-gw-mode", "description": "Extension of the router abstraction for specifying whether SNAT should occur on the external gateway", "updated": "2013-03-28T10:00:00-00:00", "links": []}, {"name": "HA Router extension", "alias": "l3-ha", "description": "Adds HA capability to routers.", "updated": "2014-04-26T00:00:00-00:00", "links": []}, {"name": "Neutron L3 External Gateway Multihoming", "alias": "external-gateway-multihoming", "description": "Allow multiple external gateway ports per router", "updated": "2023-01-18T00:00:00-00:00", "links": []}, {"name": "Router Flavor Extension", "alias": "l3-flavors", "description": "Flavor support for routers.", "updated": "2016-05-17T00:00:00-00:00", "links": []}, {"name": "Multi Provider Network", "alias": "multi-provider", "description": "Expose mapping of virtual networks to multiple physical networks", "updated": "2013-06-27T10:00:00-00:00", "links": []}, {"name": "Network MTU", "alias": "net-mtu", "description": "Provides MTU attribute for a network resource.", "updated": "2015-03-25T10:00:00-00:00", "links": []}, {"name": "Network MTU (writable)", "alias": "net-mtu-writable", "description": "Provides a writable MTU attribute for a network resource.", "updated": "2017-07-12T00:00:00-00:00", "links": []}, {"name": "Network Availability Zone", "alias": "network_availability_zone", "description": "Availability zone support for network.", "updated": "2015-01-01T10:00:00-00:00", "links": []}, {"name": "Network IP Availability", "alias": "network-ip-availability", "description": "Provides IP availability data for each network and subnet.", "updated": "2015-09-24T00:00:00-00:00", "links": []}, {"name": "Network IP Availability Details Extension", "alias": "network-ip-availability-details", "description": "Add ip_availability_details attribute to network-ip-availabilities resource.", "updated": "2025-10-31T00:00:00-00:00", "links": []}, {"name": "Pagination support", "alias": "pagination", "description": "Extension that indicates that pagination is enabled.", "updated": "2016-06-12T00:00:00-00:00", "links": []}, {"name": "Port device profile", "alias": "port-device-profile", "description": "Expose the port device profile (Cyborg)", "updated": "2020-12-17T10:00:00-00:00", "links": []}, {"name": "Neutron Port MAC address regenerate", "alias": "port-mac-address-regenerate", "description": "Network port MAC address regenerate", "updated": "2018-05-03T10:00:00-00:00", "links": []}, {"name": "Port NUMA affinity policy", "alias": "port-numa-affinity-policy", "description": "Expose the port NUMA affinity policy", "updated": "2020-07-08T10:00:00-00:00", "links": []}, {"name": "Port NUMA affinity policy \\"socket\\"", "alias": "port-numa-affinity-policy-socket", "description": "Adds \\"socket\\" to the supported port NUMA affinity policies", "updated": "2024-02-09T10:00:00-00:00", "links": []}, {"name": "Port Binding", "alias": "binding", "description": "Expose port bindings of a virtual port to external application", "updated": "2014-02-03T10:00:00-00:00", "links": []}, {"name": "Port Bindings Extended", "alias": "binding-extended", "description": "Expose port bindings of a virtual port to external application", "updated": "2017-07-17T10:00:00-00:00", "links": []}, {"name": "Port Security", "alias": "port-security", "description": "Provides port security", "updated": "20 2026-03-17 15:06:56.391925 DEBUG keystoneauth.session GET call to network for https://38.102.83.89/networking/v2.0/extensions used request id req-4d494d7c-bea0-491d-ab63-60825aaddd90 2026-03-17 15:06:56.476263 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/compute/v2.1/limits?reserved=1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}a37a1b813bd4160ed440886e4466b9366a48886912da4e30df9fc74631f4b2ce" 2026-03-17 15:06:56.477133 WARNING neutronclient.v2_0.client The python binding code in neutronclient is deprecated in favor of OpenstackSDK, please use that as this will be removed in a future release. 2026-03-17 15:06:56.493527 DEBUG:stevedore._cache:reading /opt/stack/.cache/python-entrypoints/a3455f5205def10bdea0ef832f7345f6697d07c87a9bd52ff69ade34fcf13044 2026-03-17 15:06:56.507513 DEBUG cinderclient.client 2026-03-17 15:06:56.507548 REQ: curl -i https://38.102.83.89/volume/v3/limits?tenant_id=f0cde6631dcc4340a688f3402ae6d7bf -X GET-H 'X-Auth-Token: {SHA1}8f06d8849634306dc59ed061c5e575007d13fe8e'-H 'X-Auth-Project-Id: f0cde6631dcc4340a688f3402ae6d7bf'-H 'User-Agent: python-cinderclient'-H 'Accept: application/json'-H 'OpenStack-API-Version: volume 3.55' 2026-03-17 15:06:56.507977 2026-03-17 15:06:56.584665 DEBUG cinderclient.client RESP: [200] {'Date': 'Tue, 17 Mar 2026 15:06:56 GMT', 'Server': 'Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12', 'Content-Type': 'application/json', 'x-compute-request-id': 'req-3c2194c4-d1d2-4438-8b6e-cf0ea158c7e1', 'Content-Length': '302', 'OpenStack-API-Version': 'volume 3.55', 'Vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3c2194c4-d1d2-4438-8b6e-cf0ea158c7e1', 'Connection': 'close'} 2026-03-17 15:06:56.584703 RESP BODY: {"limits": {"rate": [], "absolute": {"maxTotalVolumes": 10, "maxTotalSnapshots": 10, "maxTotalVolumeGigabytes": 1000, "maxTotalBackups": 10, "maxTotalBackupGigabytes": 1000, "totalVolumesUsed": 0, "totalGigabytesUsed": 0, "totalSnapshotsUsed": 0, "totalBackupsUsed": 0, "totalBackupGigabytesUsed": 0}}} 2026-03-17 15:06:56.584710 2026-03-17 15:06:56.601634 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 511 Content-Type: application/json Date: Tue, 17 Mar 2026 15:06:56 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-17d2521a-b2bd-4484-8e2c-09a04ae37dfa x-openstack-request-id: req-17d2521a-b2bd-4484-8e2c-09a04ae37dfa 2026-03-17 15:06:56.609437 DEBUG novaclient.v2.client RESP BODY: {"limits": {"rate": [], "absolute": {"maxTotalCores": 20, "maxPersonality": 5, "maxPersonalitySize": 10240, "maxTotalInstances": 10, "maxTotalKeypairs": 100, "maxServerMeta": 128, "maxImageMeta": 128, "maxTotalRAMSize": 51200, "maxServerGroups": 10, "maxServerGroupMembers": 10, "maxTotalFloatingIps": -1, "maxSecurityGroups": -1, "maxSecurityGroupRules": -1, "totalRAMUsed": 0, "totalCoresUsed": 0, "totalInstancesUsed": 0, "totalFloatingIpsUsed": 0, "totalSecurityGroupsUsed": 0, "totalServerGroupsUsed": 0}}} 2026-03-17 15:06:56.614768 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.89/compute/v2.1/limits?reserved=1 used request id req-17d2521a-b2bd-4484-8e2c-09a04ae37dfa 2026-03-17 15:06:56.933124 DEBUG:stevedore._cache:writing to /opt/stack/.cache/python-entrypoints/a3455f5205def10bdea0ef832f7345f6697d07c87a9bd52ff69ade34fcf13044 2026-03-17 15:06:56.938489 DEBUG neutronclient.client REQ: b'curl -i https://38.102.83.89/networking/v2.0/quotas/f0cde6631dcc4340a688f3402ae6d7bf/details -X GET -H "X-Auth-Token: {SHA256}38311cc09c2fb7aa04def5c8b4b2b720744f79eb15dcc96aceee92ed21b65fb7" -H "User-Agent: python-neutronclient"' 2026-03-17 15:06:57.004449 DEBUG neutronclient.client RESP: 200 {'Date': 'Tue, 17 Mar 2026 15:06:56 GMT', 'Server': 'Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12', 'Content-Type': 'application/json', 'Content-Length': '507', 'x-openstack-request-id': 'req-f0e87e91-aa57-4710-9b3a-c39362a39cc5', 'Connection': 'close'} {"quota": {"network": {"limit": 100, "used": 0, "reserved": 0}, "subnet": {"limit": 100, "used": 0, "reserved": 0}, "subnetpool": {"limit": -1, "used": 0, "reserved": 0}, "port": {"limit": 500, "used": 0, "reserved": 0}, "router": {"limit": 10, "used": 0, "reserved": 0}, "floatingip": {"limit": 50, "used": 0, "reserved": 0}, "rbac_policy": {"limit": 10, "used": 0, "reserved": 0}, "security_group": {"limit": 10, "used": 0, "reserved": 0}, "security_group_rule": {"limit": 100, "used": 0, "reserved": 0}}} 2026-03-17 15:06:57.004515 DEBUG neutronclient.client GET call to neutron for https://38.102.83.89/networking/v2.0/quotas/f0cde6631dcc4340a688f3402ae6d7bf/details used request id req-f0e87e91-aa57-4710-9b3a-c39362a39cc5 2026-03-17 15:06:58.010009 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/identity/v3/users/1f8adb6155be4f1691bb774a69803305/projects? -H "Accept: application/json" -H "User-Agent: python-keystoneclient" -H "X-Auth-Token: {SHA256}9279ff5c6811a28ca62c327102b44dccca115d95184712b3766663332c776c31" 2026-03-17 15:06:58.029443 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 517 Content-Type: application/json Date: Tue, 17 Mar 2026 15:06:58 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-948bdda6-ff17-449b-8a3a-4fc64de8d404 2026-03-17 15:06:58.029581 DEBUG keystoneauth.session RESP BODY: {"projects": [{"id": "f0cde6631dcc4340a688f3402ae6d7bf", "name": "tempest-TestDashboardBasicOps-546233789", "domain_id": "default", "description": "tempest-TestDashboardBasicOps-546233789-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "https://38.102.83.89/identity/v3/projects/f0cde6631dcc4340a688f3402ae6d7bf"}}], "links": {"next": null, "self": "https://38.102.83.89/identity/v3/users/1f8adb6155be4f1691bb774a69803305/projects", "previous": null}} 2026-03-17 15:06:58.029594 2026-03-17 15:06:58.029686 DEBUG keystoneauth.session GET call to identity for https://38.102.83.89/identity/v3/users/1f8adb6155be4f1691bb774a69803305/projects used request id req-948bdda6-ff17-449b-8a3a-4fc64de8d404 2026-03-17 15:06:58.273502 DEBUG:stevedore.extension:found extension EntryPoint(name='http', value='oslo_policy._external:HttpCheck', group='oslo.policy.rule_checks') 2026-03-17 15:06:58.273959 DEBUG:stevedore.extension:found extension EntryPoint(name='https', value='oslo_policy._external:HttpsCheck', group='oslo.policy.rule_checks') 2026-03-17 15:06:58.292522 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml 2026-03-17 15:06:58.396827 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml 2026-03-17 15:06:58.398856 DEBUG openstack_auth.policy adding enforcer for service: identity 2026-03-17 15:06:58.553367 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1644: DeprecationWarning: os_compute_api:os-flavor-extra-specs:index deprecated without deprecated_reason or deprecated_since. This will be an error in a future release 2026-03-17 15:06:58.553420 warnings.warn( 2026-03-17 15:06:58.559171 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml 2026-03-17 15:06:58.674554 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml 2026-03-17 15:06:58.674859 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/nova_policy.d/api-extensions.yaml 2026-03-17 15:06:58.675481 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.d/api-extensions.yaml 2026-03-17 15:06:58.677313 DEBUG openstack_auth.policy adding enforcer for service: compute 2026-03-17 15:06:58.891056 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1644: DeprecationWarning: volume_extension:quotas:show deprecated without deprecated_reason or deprecated_since. This will be an error in a future release 2026-03-17 15:06:58.891086 warnings.warn( 2026-03-17 15:06:58.897102 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml 2026-03-17 15:06:58.982003 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml 2026-03-17 15:06:58.983333 DEBUG openstack_auth.policy adding enforcer for service: volume 2026-03-17 15:06:59.035374 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml 2026-03-17 15:06:59.059092 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml 2026-03-17 15:06:59.059575 DEBUG openstack_auth.policy adding enforcer for service: image 2026-03-17 15:06:59.327735 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml 2026-03-17 15:06:59.453339 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml 2026-03-17 15:06:59.455891 DEBUG openstack_auth.policy adding enforcer for service: network 2026-03-17 15:06:59.456176 DEBUG oslo_policy.policy enforce: rule="get_images" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.456248 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1160: UserWarning: Policy "get_images": "rule:context_is_admin or (role:reader and project_id:%(project_id)s)" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-03-17 15:06:59.456252 warnings.warn(msg) 2026-03-17 15:06:59.456931 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-keypairs:index" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.456995 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1160: UserWarning: Policy "os_compute_api:os-keypairs:index": "(rule:context_is_admin) or user_id:%(user_id)s" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-03-17 15:06:59.456999 warnings.warn(msg) 2026-03-17 15:06:59.457458 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-server-groups:index" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.457489 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1160: UserWarning: Policy "os_compute_api:os-server-groups:index": "rule:project_reader_or_admin" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-03-17 15:06:59.457492 warnings.warn(msg) 2026-03-17 15:06:59.458067 DEBUG oslo_policy.policy enforce: rule="volume:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.458579 DEBUG oslo_policy.policy enforce: rule="backup:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.458987 DEBUG oslo_policy.policy enforce: rule="volume:get_all_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.459406 DEBUG oslo_policy.policy enforce: rule="group:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.459833 DEBUG oslo_policy.policy enforce: rule="group:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.471126 DEBUG oslo_policy.policy enforce: rule="group:get_all_group_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.471604 DEBUG oslo_policy.policy enforce: rule="group:get_all_group_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.481815 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.482528 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-hypervisors" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.482564 DEBUG oslo_policy.policy Rule [os_compute_api:os-hypervisors] does not exist 2026-03-17 15:06:59.482790 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.482819 DEBUG oslo_policy.policy Rule [default] does not exist 2026-03-17 15:06:59.483077 DEBUG oslo_policy.policy enforce: rule="compute_extension:aggregates" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.483104 DEBUG oslo_policy.policy Rule [compute_extension:aggregates] does not exist 2026-03-17 15:06:59.483334 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.483364 DEBUG oslo_policy.policy Rule [default] does not exist 2026-03-17 15:06:59.483617 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.483980 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.484272 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.484564 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.484828 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.485079 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.485356 DEBUG oslo_policy.policy enforce: rule="volume_extension:types_manage" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.485388 DEBUG oslo_policy.policy Rule [volume_extension:types_manage] does not exist 2026-03-17 15:06:59.485579 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.485605 DEBUG oslo_policy.policy Rule [default] does not exist 2026-03-17 15:06:59.485824 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.486087 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.486353 DEBUG oslo_policy.policy enforce: rule="group:group_types_manage" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.486391 DEBUG oslo_policy.policy Rule [group:group_types_manage] does not exist 2026-03-17 15:06:59.486626 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.486655 DEBUG oslo_policy.policy Rule [default] does not exist 2026-03-17 15:06:59.486919 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.487179 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.487451 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.488069 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.488424 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.488668 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.488955 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.489263 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.489580 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.489831 DEBUG oslo_policy.policy enforce: rule="admin_required" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.490110 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.490375 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.490655 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.490969 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.491242 DEBUG oslo_policy.policy enforce: rule="identity:get_domain" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.491832 DEBUG oslo_policy.policy enforce: rule="identity:list_domains" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.492403 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.492951 DEBUG oslo_policy.policy enforce: rule="identity:list_user_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.493633 DEBUG oslo_policy.policy enforce: rule="identity:get_user" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.494336 DEBUG oslo_policy.policy enforce: rule="identity:list_groups" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.495025 DEBUG oslo_policy.policy enforce: rule="identity:list_roles" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.495082 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1160: UserWarning: Policy "identity:list_roles": "rule:admin_required or (role:reader and system_scope:all)" failed scope check. The token used to make the request was domain scoped but the policy requires ['system', 'project'] scope. This behavior may change in the future where using the intended scope is required 2026-03-17 15:06:59.495085 warnings.warn(msg) 2026-03-17 15:06:59.495508 DEBUG openstack_dashboard.api.keystone Creating a new keystoneclient connection to https://38.102.83.89/identity/v3. 2026-03-17 15:06:59.497773 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/identity/v3 -H "Accept: application/json" -H "Forwarded: for=::1;by=openstack_dashboard keystoneauth1/5.13.1 python-requests/2.32.5 CPython/3.12.12" -H "User-Agent: openstack_dashboard keystoneauth1/5.13.1 python-requests/2.32.5 CPython/3.12.12" 2026-03-17 15:06:59.505283 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 257 Content-Type: application/json Date: Tue, 17 Mar 2026 15:06:59 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-ace69b2a-7258-4508-a0b8-3dd116e81fb8 2026-03-17 15:06:59.505346 DEBUG keystoneauth.session RESP BODY: {"version": {"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.89/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}} 2026-03-17 15:06:59.505379 DEBUG keystoneauth.session GET call to https://38.102.83.89/identity/v3 used request id req-ace69b2a-7258-4508-a0b8-3dd116e81fb8 2026-03-17 15:06:59.505785 DEBUG oslo_policy.policy enforce: rule="identity:list_credentials" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.505827 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1160: UserWarning: Policy "identity:list_credentials": "(role:reader and system_scope:all) or user_id:%(target.credential.user_id)s" failed scope check. The token used to make the request was domain scoped but the policy requires ['system', 'project'] scope. This behavior may change in the future where using the intended scope is required 2026-03-17 15:06:59.505830 warnings.warn(msg) 2026-03-17 15:06:59.506430 DEBUG oslo_policy.policy enforce: rule="identity:get_domain" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.507030 DEBUG oslo_policy.policy enforce: rule="identity:list_domains" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.507623 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.508181 DEBUG oslo_policy.policy enforce: rule="identity:list_user_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:06:59.563961 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/identity -H "Accept: application/json" -H "User-Agent: python-novaclient keystoneauth1/5.13.1 python-requests/2.32.5 CPython/3.12.12" 2026-03-17 15:06:59.577420 DEBUG keystoneauth.session RESP: [300] Connection: close Content-Length: 272 Content-Type: application/json Date: Tue, 17 Mar 2026 15:06:59 GMT Location: https://38.102.83.89/identity/v3/ Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-2cfe7edd-8361-472d-8b00-54fa7c1d4f83 2026-03-17 15:06:59.577555 DEBUG keystoneauth.session RESP BODY: {"versions": {"values": [{"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.89/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}]}} 2026-03-17 15:06:59.577623 DEBUG keystoneauth.session GET call to https://38.102.83.89/identity used request id req-2cfe7edd-8361-472d-8b00-54fa7c1d4f83 2026-03-17 15:06:59.578026 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.89/identity/v3/auth/tokens 2026-03-17 15:06:59.597600 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["token", "password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1f8adb6155be4f1691bb774a69803305", "name": "tempest-TestDashboardBasicOps-546233789-project-member", "password_expires_at": null}, "audit_ids": ["aLViEZfTSsWjQovnMlNcpA", "CahRjDWEROGEwkvUv0Ffdg"], "expires_at": "2026-03-17T16:06:55.000000Z", "issued_at": "2026-03-17T15:06:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cde6631dcc4340a688f3402ae6d7bf", "name": "tempest-TestDashboardBasicOps-546233789"}, "is_domain": false, "roles": [{"id": "8517a23e52084dfda5b116dfc235ee57", "name": "member"}, {"id": "0787a9713d9a441e926ee002df120507", "name": "reader"}], "catalog": [{"endpoints": [{"id": "4bdea49d7bf342c3bfb38a460f323c0c", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/networking", "region": "RegionOne"}], "id": "1606bbba0b224aaaa5aa0e55e1d612b9", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "adffec8e3ee34f4aa182cb30c6f88bd0", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/compute/v2.1", "region": "RegionOne"}], "id": "5d3a916de50e4f81940bdfe3ced67c38", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "77c8f13af7cb421b91a2d15b123d76b3", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/volume/v3", "region": "RegionOne"}], "id": "699eed5e1bd84800aaebbd33d78651ea", "type": "block-storage", "name": "cinder"}, {"endpoints": [{"id": "1b89cedc0212427dbd1a394aae636416", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/placement", "region": "RegionOne"}], "id": "925478c664944804aeef7b08273378bf", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "bbd0d04786ba422db1966944a75f3485", "interface": "admin", "region_id": "RegionOne", "url": "https://38.102.83.89:8080", "region": "RegionOne"}, {"id": "e05674dfba9d40b09cee94f6247c464c", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89:8080/v1/AUTH_f0cde6631dcc4340a688f3402ae6d7bf", "region": "RegionOne"}], "id": "9bfde825e4d14f5b9a88af13835367ce", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "20991b22519f4db9a40abe16e0562fd4", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/identity", "region": "RegionOne"}], "id": "af12d999be254010ae33a0b467a294f9", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "4ec9d40dd79c4ba383df17eb2d409b81", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/image", "region": "RegionOne"}], "id": "bcae50335b7647618b05279994454f51", "type": "image", "name": "glance"}, {"endpoints": [{"id": "ca4fbbd4e01c406c86f994d421183915", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/compute/v2/f0cde6631dcc4340a688f3402ae6d7bf", "region": "RegionOne"}], "id": "f4c1deeec8724866b2be2574d0f547ed", "type": "compute_legacy", "name": "nova_legacy"}]}} 2026-03-17 15:06:59.597977 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/compute/v2.1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}a835cf349f86428d1993926065c4a9a3f9b8c87154c843df54ca2736111ebd56" 2026-03-17 15:06:59.613112 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 391 Content-Type: application/json Date: Tue, 17 Mar 2026 15:06:59 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-792b8938-c03a-4af1-a069-f3f05e091788 x-openstack-request-id: req-792b8938-c03a-4af1-a069-f3f05e091788 2026-03-17 15:06:59.613242 DEBUG novaclient.v2.client RESP BODY: {"version": {"id": "v2.1", "status": "CURRENT", "version": "2.103", "min_version": "2.1", "updated": "2013-07-23T11:33:21Z", "links": [{"rel": "self", "href": "https://38.102.83.89/compute/v2.1/"}, {"rel": "describedby", "type": "text/html", "href": "http://docs.openstack.org/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.compute+json;version=2.1"}]}} 2026-03-17 15:06:59.613371 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.89/compute/v2.1 used request id req-792b8938-c03a-4af1-a069-f3f05e091788 2026-03-17 15:06:59.614978 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/identity -H "Accept: application/json" -H "User-Agent: python-novaclient keystoneauth1/5.13.1 python-requests/2.32.5 CPython/3.12.12" 2026-03-17 15:06:59.625019 DEBUG keystoneauth.session RESP: [300] Connection: close Content-Length: 272 Content-Type: application/json Date: Tue, 17 Mar 2026 15:06:59 GMT Location: https://38.102.83.89/identity/v3/ Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-df23e506-0a12-4352-a611-149307ae7e4c 2026-03-17 15:06:59.625134 DEBUG keystoneauth.session RESP BODY: {"versions": {"values": [{"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.89/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}]}} 2026-03-17 15:06:59.625204 DEBUG keystoneauth.session GET call to https://38.102.83.89/identity used request id req-df23e506-0a12-4352-a611-149307ae7e4c 2026-03-17 15:06:59.625607 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.89/identity/v3/auth/tokens 2026-03-17 15:06:59.643928 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["token", "password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1f8adb6155be4f1691bb774a69803305", "name": "tempest-TestDashboardBasicOps-546233789-project-member", "password_expires_at": null}, "audit_ids": ["ySxDdwIkRPStR9AazpxR0A", "CahRjDWEROGEwkvUv0Ffdg"], "expires_at": "2026-03-17T16:06:55.000000Z", "issued_at": "2026-03-17T15:06:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cde6631dcc4340a688f3402ae6d7bf", "name": "tempest-TestDashboardBasicOps-546233789"}, "is_domain": false, "roles": [{"id": "8517a23e52084dfda5b116dfc235ee57", "name": "member"}, {"id": "0787a9713d9a441e926ee002df120507", "name": "reader"}], "catalog": [{"endpoints": [{"id": "4bdea49d7bf342c3bfb38a460f323c0c", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/networking", "region": "RegionOne"}], "id": "1606bbba0b224aaaa5aa0e55e1d612b9", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "adffec8e3ee34f4aa182cb30c6f88bd0", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/compute/v2.1", "region": "RegionOne"}], "id": "5d3a916de50e4f81940bdfe3ced67c38", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "77c8f13af7cb421b91a2d15b123d76b3", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/volume/v3", "region": "RegionOne"}], "id": "699eed5e1bd84800aaebbd33d78651ea", "type": "block-storage", "name": "cinder"}, {"endpoints": [{"id": "1b89cedc0212427dbd1a394aae636416", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/placement", "region": "RegionOne"}], "id": "925478c664944804aeef7b08273378bf", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "bbd0d04786ba422db1966944a75f3485", "interface": "admin", "region_id": "RegionOne", "url": "https://38.102.83.89:8080", "region": "RegionOne"}, {"id": "e05674dfba9d40b09cee94f6247c464c", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89:8080/v1/AUTH_f0cde6631dcc4340a688f3402ae6d7bf", "region": "RegionOne"}], "id": "9bfde825e4d14f5b9a88af13835367ce", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "20991b22519f4db9a40abe16e0562fd4", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/identity", "region": "RegionOne"}], "id": "af12d999be254010ae33a0b467a294f9", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "4ec9d40dd79c4ba383df17eb2d409b81", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/image", "region": "RegionOne"}], "id": "bcae50335b7647618b05279994454f51", "type": "image", "name": "glance"}, {"endpoints": [{"id": "ca4fbbd4e01c406c86f994d421183915", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.89/compute/v2/f0cde6631dcc4340a688f3402ae6d7bf", "region": "RegionOne"}], "id": "f4c1deeec8724866b2be2574d0f547ed", "type": "compute_legacy", "name": "nova_legacy"}]}} 2026-03-17 15:06:59.644368 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/compute/v2.1/os-simple-tenant-usage/f0cde6631dcc4340a688f3402ae6d7bf?start=2026-03-16T00:00:00&end=2026-03-17T23:59:59 -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.40" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}4edb988c61cb7ecd476364695a2f66d8405e2f8560e67d16903c0fdef3929e4c" -H "X-OpenStack-Nova-API-Version: 2.40" 2026-03-17 15:06:59.767545 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 20 Content-Type: application/json Date: Tue, 17 Mar 2026 15:06:59 GMT OpenStack-API-Version: compute 2.40 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.40 x-compute-request-id: req-cd6c7b2e-423a-4838-a3cd-c64da44dceee x-openstack-request-id: req-cd6c7b2e-423a-4838-a3cd-c64da44dceee 2026-03-17 15:06:59.767659 DEBUG novaclient.v2.client RESP BODY: {"tenant_usage": {}} 2026-03-17 15:06:59.767732 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.89/compute/v2.1/os-simple-tenant-usage/f0cde6631dcc4340a688f3402ae6d7bf?start=2026-03-16T00:00:00&end=2026-03-17T23:59:59 used request id req-cd6c7b2e-423a-4838-a3cd-c64da44dceee 2026-03-17 15:06:59.782223 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/networking/v2.0/extensions -H "Accept: application/json" -H "Forwarded: for=::1;by=openstack keystoneauth1/5.13.1 python-requests/2.32.5 CPython/3.12.12" -H "User-Agent: openstack keystoneauth1/5.13.1 python-requests/2.32.5 CPython/3.12.12" -H "X-Auth-Token: {SHA256}38311cc09c2fb7aa04def5c8b4b2b720744f79eb15dcc96aceee92ed21b65fb7" 2026-03-17 15:06:59.797564 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 15208 Content-Type: application/json Date: Tue, 17 Mar 2026 15:06:59 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 x-openstack-request-id: req-4611455c-a48c-4325-84c5-0c7d186df207 2026-03-17 15:06:59.797928 DEBUG keystoneauth.session RESP BODY: {"extensions": [{"name": "Address group", "alias": "address-group", "description": "Support address group", "updated": "2020-07-15T10:00:00-00:00", "links": []}, {"name": "Address scope", "alias": "address-scope", "description": "Address scopes extension.", "updated": "2015-07-26T10:00:00-00:00", "links": []}, {"name": "agent", "alias": "agent", "description": "The agent management extension.", "updated": "2013-02-03T10:00:00-00:00", "links": []}, {"name": "Allowed Address Pairs", "alias": "allowed-address-pairs", "description": "Provides allowed address pairs", "updated": "2013-07-23T10:00:00-00:00", "links": []}, {"name": "Auto Allocated Topology Services", "alias": "auto-allocated-topology", "description": "Auto Allocated Topology Services.", "updated": "2016-01-01T00:00:00-00:00", "links": []}, {"name": "Availability Zone", "alias": "availability_zone", "description": "The availability zone extension.", "updated": "2015-01-01T10:00:00-00:00", "links": []}, {"name": "Default Subnetpools", "alias": "default-subnetpools", "description": "Provides ability to mark and use a subnetpool as the default.", "updated": "2016-02-18T18:00:00-00:00", "links": []}, {"name": "DHCP Agent Scheduler", "alias": "dhcp_agent_scheduler", "description": "Schedule networks among dhcp agents", "updated": "2013-02-07T10:00:00-00:00", "links": []}, {"name": "DNS Integration", "alias": "dns-integration", "description": "Provides integration with DNS.", "updated": "2015-08-15T18:00:00-00:00", "links": []}, {"name": "dns_domain for ports", "alias": "dns-domain-ports", "description": "Allows the DNS domain to be specified for a network port.", "updated": "2017-04-24T10:00:00-00:00", "links": []}, {"name": "DNS domain names with keywords allowed", "alias": "dns-integration-domain-keywords", "description": "Allows to use keywords like , , and as DNS domain name", "updated": "2020-06-15T18:00:00-00:00", "links": []}, {"name": "Empty String Filtering Extension", "alias": "empty-string-filtering", "description": "Allow filtering by attributes with empty string value", "updated": "2018-05-01T10:00:00-00:00", "links": []}, {"name": "Neutron external network", "alias": "external-net", "description": "Adds external network attribute to network resource.", "updated": "2013-01-14T10:00:00-00:00", "links": []}, {"name": "Neutron Extra DHCP options", "alias": "extra_dhcp_opt", "description": "Extra options configuration for DHCP. For example PXE boot options to DHCP clients can be specified (e.g. tftp-server, server-ip-address, bootfile-name)", "updated": "2013-03-17T12:00:00-00:00", "links": []}, {"name": "Neutron Extra Route", "alias": "extraroute", "description": "Extra routes configuration for L3 router", "updated": "2013-02-01T10:00:00-00:00", "links": []}, {"name": "Atomically add/remove extra routes", "alias": "extraroute-atomic", "description": "Edit extra routes of a router on server side by atomically adding/removing extra routes", "updated": "2019-07-10T00:00:00+00:00", "links": []}, {"name": "Filter parameters validation", "alias": "filter-validation", "description": "Provides validation on filter parameters.", "updated": "2018-07-04T10:00:00-00:00", "links": []}, {"name": "Floating IP port forwarding detail", "alias": "floating-ip-port-forwarding-detail", "description": "Allow list floating ip return more port forwarding data, include'id' and 'internal_port_id'", "updated": "2022-05-06T10:00:00-00:00", "links": []}, {"name": "Floating IP Port Details Extension", "alias": "fip-port-details", "description": "Add port_details attribute to Floating IP resource", "updated": "2018-04-09T10:00:00-00:00", "links": []}, {"name": "Neutron Service Flavors", "alias": "flavors", "description": "Flavor specification for Neutron advanced services.", "updated": "2015-09-17T10:00:00-00:00", "links": []}, {"name": "Floating IP Pools Extension", "alias": "floatingip-pools", "description": "Provides a floating IP pools API.", "updated": "2018-03-21T10:00:00-00:00", "links": []}, {"name": "Neutron L3 Router", "alias": "router", "description": "Router abstraction for basic L3 forwarding between L2 Neutron networks and access to external networks via a NAT gateway.", "updated": "2012-07-20T10:00:00-00:00", "links": []}, {"name": "Enable Default Route BFD", "alias": "enable-default-route-bfd", "description": "Enables configurable BFD behavior for default routes", "updated": "2023-02-27T00:00:00-00:00", "links": []}, {"name": "Enable Default Route ECMP", "alias": "enable-default-route-ecmp", "description": "Enables configurable ECMP behavior for default routes", "updated": "2023-02-27T00:00:00-00:00", "links": []}, {"name": "Neutron L3 Configurable external gateway mode", "alias": "ext-gw-mode", "description": "Extension of the router abstraction for specifying whether SNAT should occur on the external gateway", "updated": "2013-03-28T10:00:00-00:00", "links": []}, {"name": "HA Router extension", "alias": "l3-ha", "description": "Adds HA capability to routers.", "updated": "2014-04-26T00:00:00-00:00", "links": []}, {"name": "Neutron L3 External Gateway Multihoming", "alias": "external-gateway-multihoming", "description": "Allow multiple external gateway ports per router", "updated": "2023-01-18T00:00:00-00:00", "links": []}, {"name": "Router Flavor Extension", "alias": "l3-flavors", "description": "Flavor support for routers.", "updated": "2016-05-17T00:00:00-00:00", "links": []}, {"name": "Multi Provider Network", "alias": "multi-provider", "description": "Expose mapping of virtual networks to multiple physical networks", "updated": "2013-06-27T10:00:00-00:00", "links": []}, {"name": "Network MTU", "alias": "net-mtu", "description": "Provides MTU attribute for a network resource.", "updated": "2015-03-25T10:00:00-00:00", "links": []}, {"name": "Network MTU (writable)", "alias": "net-mtu-writable", "description": "Provides a writable MTU attribute for a network resource.", "updated": "2017-07-12T00:00:00-00:00", "links": []}, {"name": "Network Availability Zone", "alias": "network_availability_zone", "description": "Availability zone support for network.", "updated": "2015-01-01T10:00:00-00:00", "links": []}, {"name": "Network IP Availability", "alias": "network-ip-availability", "description": "Provides IP availability data for each network and subnet.", "updated": "2015-09-24T00:00:00-00:00", "links": []}, {"name": "Network IP Availability Details Extension", "alias": "network-ip-availability-details", "description": "Add ip_availability_details attribute to network-ip-availabilities resource.", "updated": "2025-10-31T00:00:00-00:00", "links": []}, {"name": "Pagination support", "alias": "pagination", "description": "Extension that indicates that pagination is enabled.", "updated": "2016-06-12T00:00:00-00:00", "links": []}, {"name": "Port device profile", "alias": "port-device-profile", "description": "Expose the port device profile (Cyborg)", "updated": "2020-12-17T10:00:00-00:00", "links": []}, {"name": "Neutron Port MAC address regenerate", "alias": "port-mac-address-regenerate", "description": "Network port MAC address regenerate", "updated": "2018-05-03T10:00:00-00:00", "links": []}, {"name": "Port NUMA affinity policy", "alias": "port-numa-affinity-policy", "description": "Expose the port NUMA affinity policy", "updated": "2020-07-08T10:00:00-00:00", "links": []}, {"name": "Port NUMA affinity policy \\"socket\\"", "alias": "port-numa-affinity-policy-socket", "description": "Adds \\"socket\\" to the supported port NUMA affinity policies", "updated": "2024-02-09T10:00:00-00:00", "links": []}, {"name": "Port Binding", "alias": "binding", "description": "Expose port bindings of a virtual port to external application", "updated": "2014-02-03T10:00:00-00:00", "links": []}, {"name": "Port Bindings Extended", "alias": "binding-extended", "description": "Expose port bindings of a virtual port to external application", "updated": "2017-07-17T10:00:00-00:00", "links": []}, {"name": "Port Security", "alias": "port-security", "description": "Provides port security", "updated": "20 2026-03-17 15:06:59.798049 DEBUG keystoneauth.session GET call to network for https://38.102.83.89/networking/v2.0/extensions used request id req-4611455c-a48c-4325-84c5-0c7d186df207 2026-03-17 15:06:59.876440 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/compute/v2.1/limits?reserved=1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}a835cf349f86428d1993926065c4a9a3f9b8c87154c843df54ca2736111ebd56" 2026-03-17 15:06:59.878402 WARNING neutronclient.v2_0.client The python binding code in neutronclient is deprecated in favor of OpenstackSDK, please use that as this will be removed in a future release. 2026-03-17 15:06:59.893578 DEBUG cinderclient.client 2026-03-17 15:06:59.893608 REQ: curl -i https://38.102.83.89/volume/v3/limits?tenant_id=f0cde6631dcc4340a688f3402ae6d7bf -X GET-H 'X-Auth-Token: {SHA1}8f06d8849634306dc59ed061c5e575007d13fe8e'-H 'X-Auth-Project-Id: f0cde6631dcc4340a688f3402ae6d7bf'-H 'User-Agent: python-cinderclient'-H 'Accept: application/json'-H 'OpenStack-API-Version: volume 3.55' 2026-03-17 15:06:59.893620 2026-03-17 15:06:59.898051 DEBUG:stevedore._cache:reading /opt/stack/.cache/python-entrypoints/a3455f5205def10bdea0ef832f7345f6697d07c87a9bd52ff69ade34fcf13044 2026-03-17 15:06:59.901587 DEBUG neutronclient.client REQ: b'curl -i https://38.102.83.89/networking/v2.0/quotas/f0cde6631dcc4340a688f3402ae6d7bf/details -X GET -H "X-Auth-Token: {SHA256}38311cc09c2fb7aa04def5c8b4b2b720744f79eb15dcc96aceee92ed21b65fb7" -H "User-Agent: python-neutronclient"' 2026-03-17 15:06:59.939253 DEBUG cinderclient.client RESP: [200] {'Date': 'Tue, 17 Mar 2026 15:06:59 GMT', 'Server': 'Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12', 'Content-Type': 'application/json', 'x-compute-request-id': 'req-fa27dbdc-34f7-4ae5-9d1d-25c4224cf1d5', 'Content-Length': '302', 'OpenStack-API-Version': 'volume 3.55', 'Vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fa27dbdc-34f7-4ae5-9d1d-25c4224cf1d5', 'Connection': 'close'} 2026-03-17 15:06:59.939292 RESP BODY: {"limits": {"rate": [], "absolute": {"maxTotalVolumes": 10, "maxTotalSnapshots": 10, "maxTotalVolumeGigabytes": 1000, "maxTotalBackups": 10, "maxTotalBackupGigabytes": 1000, "totalVolumesUsed": 0, "totalGigabytesUsed": 0, "totalSnapshotsUsed": 0, "totalBackupsUsed": 0, "totalBackupGigabytesUsed": 0}}} 2026-03-17 15:06:59.939327 2026-03-17 15:06:59.961289 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 511 Content-Type: application/json Date: Tue, 17 Mar 2026 15:06:59 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-fb12e473-c3f1-427a-9b54-36a7e43a5b64 x-openstack-request-id: req-fb12e473-c3f1-427a-9b54-36a7e43a5b64 2026-03-17 15:06:59.961515 DEBUG novaclient.v2.client RESP BODY: {"limits": {"rate": [], "absolute": {"maxTotalCores": 20, "maxPersonality": 5, "maxPersonalitySize": 10240, "maxTotalInstances": 10, "maxTotalKeypairs": 100, "maxServerMeta": 128, "maxImageMeta": 128, "maxTotalRAMSize": 51200, "maxServerGroups": 10, "maxServerGroupMembers": 10, "maxTotalFloatingIps": -1, "maxSecurityGroups": -1, "maxSecurityGroupRules": -1, "totalRAMUsed": 0, "totalCoresUsed": 0, "totalInstancesUsed": 0, "totalFloatingIpsUsed": 0, "totalSecurityGroupsUsed": 0, "totalServerGroupsUsed": 0}}} 2026-03-17 15:06:59.961593 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.89/compute/v2.1/limits?reserved=1 used request id req-fb12e473-c3f1-427a-9b54-36a7e43a5b64 2026-03-17 15:06:59.969146 DEBUG neutronclient.client RESP: 200 {'Date': 'Tue, 17 Mar 2026 15:06:59 GMT', 'Server': 'Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12', 'Content-Type': 'application/json', 'Content-Length': '507', 'x-openstack-request-id': 'req-dcaf23fe-13b4-4457-a9ce-d8a8ac33fec5', 'Connection': 'close'} {"quota": {"network": {"limit": 100, "used": 0, "reserved": 0}, "subnet": {"limit": 100, "used": 0, "reserved": 0}, "subnetpool": {"limit": -1, "used": 0, "reserved": 0}, "port": {"limit": 500, "used": 0, "reserved": 0}, "router": {"limit": 10, "used": 0, "reserved": 0}, "floatingip": {"limit": 50, "used": 0, "reserved": 0}, "rbac_policy": {"limit": 10, "used": 0, "reserved": 0}, "security_group": {"limit": 10, "used": 0, "reserved": 0}, "security_group_rule": {"limit": 100, "used": 0, "reserved": 0}}} 2026-03-17 15:06:59.969245 DEBUG neutronclient.client GET call to neutron for https://38.102.83.89/networking/v2.0/quotas/f0cde6631dcc4340a688f3402ae6d7bf/details used request id req-dcaf23fe-13b4-4457-a9ce-d8a8ac33fec5 2026-03-17 15:07:00.994036 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/identity/v3/users/1f8adb6155be4f1691bb774a69803305/projects? -H "Accept: application/json" -H "User-Agent: python-keystoneclient" -H "X-Auth-Token: {SHA256}9279ff5c6811a28ca62c327102b44dccca115d95184712b3766663332c776c31" 2026-03-17 15:07:01.013207 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 517 Content-Type: application/json Date: Tue, 17 Mar 2026 15:07:01 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-5d77151e-88b0-49c7-a288-d295b7ac5b2e 2026-03-17 15:07:01.013367 DEBUG keystoneauth.session RESP BODY: {"projects": [{"id": "f0cde6631dcc4340a688f3402ae6d7bf", "name": "tempest-TestDashboardBasicOps-546233789", "domain_id": "default", "description": "tempest-TestDashboardBasicOps-546233789-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "https://38.102.83.89/identity/v3/projects/f0cde6631dcc4340a688f3402ae6d7bf"}}], "links": {"next": null, "self": "https://38.102.83.89/identity/v3/users/1f8adb6155be4f1691bb774a69803305/projects", "previous": null}} 2026-03-17 15:07:01.013379 2026-03-17 15:07:01.013453 DEBUG keystoneauth.session GET call to identity for https://38.102.83.89/identity/v3/users/1f8adb6155be4f1691bb774a69803305/projects used request id req-5d77151e-88b0-49c7-a288-d295b7ac5b2e 2026-03-17 15:07:01.256586 DEBUG:stevedore.extension:found extension EntryPoint(name='http', value='oslo_policy._external:HttpCheck', group='oslo.policy.rule_checks') 2026-03-17 15:07:01.257110 DEBUG:stevedore.extension:found extension EntryPoint(name='https', value='oslo_policy._external:HttpsCheck', group='oslo.policy.rule_checks') 2026-03-17 15:07:01.274821 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml 2026-03-17 15:07:01.380375 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml 2026-03-17 15:07:01.382443 DEBUG openstack_auth.policy adding enforcer for service: identity 2026-03-17 15:07:01.538719 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1644: DeprecationWarning: os_compute_api:os-flavor-extra-specs:index deprecated without deprecated_reason or deprecated_since. This will be an error in a future release 2026-03-17 15:07:01.538748 warnings.warn( 2026-03-17 15:07:01.544462 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml 2026-03-17 15:07:01.661214 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml 2026-03-17 15:07:01.661515 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/nova_policy.d/api-extensions.yaml 2026-03-17 15:07:01.662217 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.d/api-extensions.yaml 2026-03-17 15:07:01.664008 DEBUG openstack_auth.policy adding enforcer for service: compute 2026-03-17 15:07:01.819162 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1644: DeprecationWarning: volume_extension:quotas:show deprecated without deprecated_reason or deprecated_since. This will be an error in a future release 2026-03-17 15:07:01.819201 warnings.warn( 2026-03-17 15:07:01.826388 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml 2026-03-17 15:07:01.920641 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml 2026-03-17 15:07:01.922495 DEBUG openstack_auth.policy adding enforcer for service: volume 2026-03-17 15:07:02.052918 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml 2026-03-17 15:07:02.077061 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml 2026-03-17 15:07:02.077610 DEBUG openstack_auth.policy adding enforcer for service: image 2026-03-17 15:07:02.363686 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml 2026-03-17 15:07:02.491370 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml 2026-03-17 15:07:02.493669 DEBUG openstack_auth.policy adding enforcer for service: network 2026-03-17 15:07:02.493963 DEBUG oslo_policy.policy enforce: rule="get_images" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.494035 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1160: UserWarning: Policy "get_images": "rule:context_is_admin or (role:reader and project_id:%(project_id)s)" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-03-17 15:07:02.494038 warnings.warn(msg) 2026-03-17 15:07:02.494700 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-keypairs:index" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.494756 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1160: UserWarning: Policy "os_compute_api:os-keypairs:index": "(rule:context_is_admin) or user_id:%(user_id)s" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-03-17 15:07:02.494760 warnings.warn(msg) 2026-03-17 15:07:02.495213 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-server-groups:index" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.495247 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1160: UserWarning: Policy "os_compute_api:os-server-groups:index": "rule:project_reader_or_admin" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-03-17 15:07:02.495250 warnings.warn(msg) 2026-03-17 15:07:02.495890 DEBUG oslo_policy.policy enforce: rule="volume:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.496323 DEBUG oslo_policy.policy enforce: rule="backup:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.496741 DEBUG oslo_policy.policy enforce: rule="volume:get_all_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.497141 DEBUG oslo_policy.policy enforce: rule="group:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.497582 DEBUG oslo_policy.policy enforce: rule="group:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.508429 DEBUG oslo_policy.policy enforce: rule="group:get_all_group_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.508909 DEBUG oslo_policy.policy enforce: rule="group:get_all_group_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.518890 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.519682 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-hypervisors" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.519727 DEBUG oslo_policy.policy Rule [os_compute_api:os-hypervisors] does not exist 2026-03-17 15:07:02.519959 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.519989 DEBUG oslo_policy.policy Rule [default] does not exist 2026-03-17 15:07:02.520255 DEBUG oslo_policy.policy enforce: rule="compute_extension:aggregates" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.520283 DEBUG oslo_policy.policy Rule [compute_extension:aggregates] does not exist 2026-03-17 15:07:02.520521 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.520550 DEBUG oslo_policy.policy Rule [default] does not exist 2026-03-17 15:07:02.520827 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.521190 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.521521 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.521809 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.522068 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.522337 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.522595 DEBUG oslo_policy.policy enforce: rule="volume_extension:types_manage" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.522632 DEBUG oslo_policy.policy Rule [volume_extension:types_manage] does not exist 2026-03-17 15:07:02.522819 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.522843 DEBUG oslo_policy.policy Rule [default] does not exist 2026-03-17 15:07:02.523058 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.523331 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.523586 DEBUG oslo_policy.policy enforce: rule="group:group_types_manage" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.523612 DEBUG oslo_policy.policy Rule [group:group_types_manage] does not exist 2026-03-17 15:07:02.523824 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.523864 DEBUG oslo_policy.policy Rule [default] does not exist 2026-03-17 15:07:02.524287 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.524706 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.525065 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.525827 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.526155 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.526409 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.526708 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.527018 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.527267 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.527536 DEBUG oslo_policy.policy enforce: rule="admin_required" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.527844 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.528122 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.528426 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.528767 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.529049 DEBUG oslo_policy.policy enforce: rule="identity:get_domain" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.529711 DEBUG oslo_policy.policy enforce: rule="identity:list_domains" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.530272 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.530832 DEBUG oslo_policy.policy enforce: rule="identity:list_user_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.531503 DEBUG oslo_policy.policy enforce: rule="identity:get_user" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.532151 DEBUG oslo_policy.policy enforce: rule="identity:list_groups" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.533009 DEBUG oslo_policy.policy enforce: rule="identity:list_roles" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.533089 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1160: UserWarning: Policy "identity:list_roles": "rule:admin_required or (role:reader and system_scope:all)" failed scope check. The token used to make the request was domain scoped but the policy requires ['system', 'project'] scope. This behavior may change in the future where using the intended scope is required 2026-03-17 15:07:02.533093 warnings.warn(msg) 2026-03-17 15:07:02.533545 DEBUG openstack_dashboard.api.keystone Creating a new keystoneclient connection to https://38.102.83.89/identity/v3. 2026-03-17 15:07:02.535763 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.89/identity/v3 -H "Accept: application/json" -H "Forwarded: for=::1;by=openstack_dashboard keystoneauth1/5.13.1 python-requests/2.32.5 CPython/3.12.12" -H "User-Agent: openstack_dashboard keystoneauth1/5.13.1 python-requests/2.32.5 CPython/3.12.12" 2026-03-17 15:07:02.545101 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 257 Content-Type: application/json Date: Tue, 17 Mar 2026 15:07:02 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.5 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-bb804dfb-fca0-48bb-bb4b-34c58fb9122f 2026-03-17 15:07:02.545153 DEBUG keystoneauth.session RESP BODY: {"version": {"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.89/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}} 2026-03-17 15:07:02.545183 DEBUG keystoneauth.session GET call to https://38.102.83.89/identity/v3 used request id req-bb804dfb-fca0-48bb-bb4b-34c58fb9122f 2026-03-17 15:07:02.545599 DEBUG oslo_policy.policy enforce: rule="identity:list_credentials" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.545639 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1160: UserWarning: Policy "identity:list_credentials": "(role:reader and system_scope:all) or user_id:%(target.credential.user_id)s" failed scope check. The token used to make the request was domain scoped but the policy requires ['system', 'project'] scope. This behavior may change in the future where using the intended scope is required 2026-03-17 15:07:02.545647 warnings.warn(msg) 2026-03-17 15:07:02.546171 DEBUG oslo_policy.policy enforce: rule="identity:get_domain" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.546840 DEBUG oslo_policy.policy enforce: rule="identity:list_domains" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.547635 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"} 2026-03-17 15:07:02.548314 DEBUG oslo_policy.policy enforce: rule="identity:list_user_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_name": "tempest-TestDashboardBasicOps-546233789", "roles": ["member", "reader"], "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user_id": "1f8adb6155be4f1691bb774a69803305", "username": "tempest-TestDashboardBasicOps-546233789-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "f0cde6631dcc4340a688f3402ae6d7bf", "project_id": "f0cde6631dcc4340a688f3402ae6d7bf", "tenant_id": "f0cde6631dcc4340a688f3402ae6d7bf", "user.domain_id": "default", "user.id": "1f8adb6155be4f1691bb774a69803305", "user_id": "1f8adb6155be4f1691bb774a69803305"}