Dec 03 22:03:00 localhost kernel: Linux version 5.14.0-645.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-14), GNU ld version 2.35.2-68.el9) #1 SMP PREEMPT_DYNAMIC Fri Nov 28 14:01:17 UTC 2025 Dec 03 22:03:00 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Dec 03 22:03:00 localhost kernel: Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-645.el9.x86_64 root=UUID=fcf6b761-831a-48a7-9f5f-068b5063763f ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Dec 03 22:03:00 localhost kernel: BIOS-provided physical RAM map: Dec 03 22:03:00 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 03 22:03:00 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 03 22:03:00 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 03 22:03:00 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Dec 03 22:03:00 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Dec 03 22:03:00 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 03 22:03:00 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 03 22:03:00 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable Dec 03 22:03:00 localhost kernel: NX (Execute Disable) protection: active Dec 03 22:03:00 localhost kernel: APIC: Static calls initialized Dec 03 22:03:00 localhost kernel: SMBIOS 2.8 present. Dec 03 22:03:00 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Dec 03 22:03:00 localhost kernel: Hypervisor detected: KVM Dec 03 22:03:00 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 03 22:03:00 localhost kernel: kvm-clock: using sched offset of 3150094484 cycles Dec 03 22:03:00 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 03 22:03:00 localhost kernel: tsc: Detected 2799.998 MHz processor Dec 03 22:03:00 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 03 22:03:00 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 03 22:03:00 localhost kernel: last_pfn = 0x240000 max_arch_pfn = 0x400000000 Dec 03 22:03:00 localhost kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Dec 03 22:03:00 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 03 22:03:00 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Dec 03 22:03:00 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Dec 03 22:03:00 localhost kernel: Using GB pages for direct mapping Dec 03 22:03:00 localhost kernel: RAMDISK: [mem 0x2d472000-0x32a30fff] Dec 03 22:03:00 localhost kernel: ACPI: Early table checksum verification disabled Dec 03 22:03:00 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Dec 03 22:03:00 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 03 22:03:00 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 03 22:03:00 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 03 22:03:00 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Dec 03 22:03:00 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 03 22:03:00 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 03 22:03:00 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Dec 03 22:03:00 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Dec 03 22:03:00 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Dec 03 22:03:00 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Dec 03 22:03:00 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Dec 03 22:03:00 localhost kernel: No NUMA configuration found Dec 03 22:03:00 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000023fffffff] Dec 03 22:03:00 localhost kernel: NODE_DATA(0) allocated [mem 0x23ffd3000-0x23fffdfff] Dec 03 22:03:00 localhost kernel: crashkernel reserved: 0x000000009e000000 - 0x00000000ae000000 (256 MB) Dec 03 22:03:00 localhost kernel: Zone ranges: Dec 03 22:03:00 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 03 22:03:00 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 03 22:03:00 localhost kernel: Normal [mem 0x0000000100000000-0x000000023fffffff] Dec 03 22:03:00 localhost kernel: Device empty Dec 03 22:03:00 localhost kernel: Movable zone start for each node Dec 03 22:03:00 localhost kernel: Early memory node ranges Dec 03 22:03:00 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 03 22:03:00 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Dec 03 22:03:00 localhost kernel: node 0: [mem 0x0000000100000000-0x000000023fffffff] Dec 03 22:03:00 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000023fffffff] Dec 03 22:03:00 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 03 22:03:00 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 03 22:03:00 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Dec 03 22:03:00 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Dec 03 22:03:00 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 03 22:03:00 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 03 22:03:00 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 03 22:03:00 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 03 22:03:00 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 03 22:03:00 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 03 22:03:00 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 03 22:03:00 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 03 22:03:00 localhost kernel: TSC deadline timer available Dec 03 22:03:00 localhost kernel: CPU topo: Max. logical packages: 8 Dec 03 22:03:00 localhost kernel: CPU topo: Max. logical dies: 8 Dec 03 22:03:00 localhost kernel: CPU topo: Max. dies per package: 1 Dec 03 22:03:00 localhost kernel: CPU topo: Max. threads per core: 1 Dec 03 22:03:00 localhost kernel: CPU topo: Num. cores per package: 1 Dec 03 22:03:00 localhost kernel: CPU topo: Num. threads per package: 1 Dec 03 22:03:00 localhost kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Dec 03 22:03:00 localhost kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Dec 03 22:03:00 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Dec 03 22:03:00 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Dec 03 22:03:00 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Dec 03 22:03:00 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Dec 03 22:03:00 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Dec 03 22:03:00 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Dec 03 22:03:00 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Dec 03 22:03:00 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Dec 03 22:03:00 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Dec 03 22:03:00 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Dec 03 22:03:00 localhost kernel: Booting paravirtualized kernel on KVM Dec 03 22:03:00 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 03 22:03:00 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Dec 03 22:03:00 localhost kernel: percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 Dec 03 22:03:00 localhost kernel: pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 Dec 03 22:03:00 localhost kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Dec 03 22:03:00 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Dec 03 22:03:00 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-645.el9.x86_64 root=UUID=fcf6b761-831a-48a7-9f5f-068b5063763f ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Dec 03 22:03:00 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-645.el9.x86_64", will be passed to user space. Dec 03 22:03:00 localhost kernel: random: crng init done Dec 03 22:03:00 localhost kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 03 22:03:00 localhost kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 03 22:03:00 localhost kernel: Fallback order for Node 0: 0 Dec 03 22:03:00 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 2064091 Dec 03 22:03:00 localhost kernel: Policy zone: Normal Dec 03 22:03:00 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 03 22:03:00 localhost kernel: software IO TLB: area num 8. Dec 03 22:03:00 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Dec 03 22:03:00 localhost kernel: ftrace: allocating 49335 entries in 193 pages Dec 03 22:03:00 localhost kernel: ftrace: allocated 193 pages with 3 groups Dec 03 22:03:00 localhost kernel: Dynamic Preempt: voluntary Dec 03 22:03:00 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Dec 03 22:03:00 localhost kernel: rcu: RCU event tracing is enabled. Dec 03 22:03:00 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Dec 03 22:03:00 localhost kernel: Trampoline variant of Tasks RCU enabled. Dec 03 22:03:00 localhost kernel: Rude variant of Tasks RCU enabled. Dec 03 22:03:00 localhost kernel: Tracing variant of Tasks RCU enabled. Dec 03 22:03:00 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 03 22:03:00 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Dec 03 22:03:00 localhost kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Dec 03 22:03:00 localhost kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Dec 03 22:03:00 localhost kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Dec 03 22:03:00 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Dec 03 22:03:00 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Dec 03 22:03:00 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Dec 03 22:03:00 localhost kernel: Console: colour VGA+ 80x25 Dec 03 22:03:00 localhost kernel: printk: console [ttyS0] enabled Dec 03 22:03:00 localhost kernel: ACPI: Core revision 20230331 Dec 03 22:03:00 localhost kernel: APIC: Switch to symmetric I/O mode setup Dec 03 22:03:00 localhost kernel: x2apic enabled Dec 03 22:03:00 localhost kernel: APIC: Switched APIC routing to: physical x2apic Dec 03 22:03:00 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 03 22:03:00 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Dec 03 22:03:00 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 03 22:03:00 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 03 22:03:00 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 03 22:03:00 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 03 22:03:00 localhost kernel: Spectre V2 : Mitigation: Retpolines Dec 03 22:03:00 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Dec 03 22:03:00 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 03 22:03:00 localhost kernel: RETBleed: Mitigation: untrained return thunk Dec 03 22:03:00 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 03 22:03:00 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Dec 03 22:03:00 localhost kernel: Speculative Return Stack Overflow: IBPB-extending microcode not applied! Dec 03 22:03:00 localhost kernel: Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options. Dec 03 22:03:00 localhost kernel: x86/bugs: return thunk changed Dec 03 22:03:00 localhost kernel: Speculative Return Stack Overflow: Vulnerable: Safe RET, no microcode Dec 03 22:03:00 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 03 22:03:00 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 03 22:03:00 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 03 22:03:00 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 03 22:03:00 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Dec 03 22:03:00 localhost kernel: Freeing SMP alternatives memory: 40K Dec 03 22:03:00 localhost kernel: pid_max: default: 32768 minimum: 301 Dec 03 22:03:00 localhost kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf Dec 03 22:03:00 localhost kernel: landlock: Up and running. Dec 03 22:03:00 localhost kernel: Yama: becoming mindful. Dec 03 22:03:00 localhost kernel: SELinux: Initializing. Dec 03 22:03:00 localhost kernel: LSM support for eBPF active Dec 03 22:03:00 localhost kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 03 22:03:00 localhost kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 03 22:03:00 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 03 22:03:00 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 03 22:03:00 localhost kernel: ... version: 0 Dec 03 22:03:00 localhost kernel: ... bit width: 48 Dec 03 22:03:00 localhost kernel: ... generic registers: 6 Dec 03 22:03:00 localhost kernel: ... value mask: 0000ffffffffffff Dec 03 22:03:00 localhost kernel: ... max period: 00007fffffffffff Dec 03 22:03:00 localhost kernel: ... fixed-purpose events: 0 Dec 03 22:03:00 localhost kernel: ... event mask: 000000000000003f Dec 03 22:03:00 localhost kernel: signal: max sigframe size: 1776 Dec 03 22:03:00 localhost kernel: rcu: Hierarchical SRCU implementation. Dec 03 22:03:00 localhost kernel: rcu: Max phase no-delay instances is 400. Dec 03 22:03:00 localhost kernel: smp: Bringing up secondary CPUs ... Dec 03 22:03:00 localhost kernel: smpboot: x86: Booting SMP configuration: Dec 03 22:03:00 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Dec 03 22:03:00 localhost kernel: smp: Brought up 1 node, 8 CPUs Dec 03 22:03:00 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Dec 03 22:03:00 localhost kernel: node 0 deferred pages initialised in 10ms Dec 03 22:03:00 localhost kernel: Memory: 7763932K/8388068K available (16384K kernel code, 5795K rwdata, 13908K rodata, 4196K init, 7156K bss, 618212K reserved, 0K cma-reserved) Dec 03 22:03:00 localhost kernel: devtmpfs: initialized Dec 03 22:03:00 localhost kernel: x86/mm: Memory block size: 128MB Dec 03 22:03:00 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 03 22:03:00 localhost kernel: futex hash table entries: 2048 (131072 bytes on 1 NUMA nodes, total 128 KiB, linear). Dec 03 22:03:00 localhost kernel: pinctrl core: initialized pinctrl subsystem Dec 03 22:03:00 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 03 22:03:00 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations Dec 03 22:03:00 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 03 22:03:00 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 03 22:03:00 localhost kernel: audit: initializing netlink subsys (disabled) Dec 03 22:03:00 localhost kernel: audit: type=2000 audit(1764817378.953:1): state=initialized audit_enabled=0 res=1 Dec 03 22:03:00 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Dec 03 22:03:00 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 03 22:03:00 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Dec 03 22:03:00 localhost kernel: cpuidle: using governor menu Dec 03 22:03:00 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 03 22:03:00 localhost kernel: PCI: Using configuration type 1 for base access Dec 03 22:03:00 localhost kernel: PCI: Using configuration type 1 for extended access Dec 03 22:03:00 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 03 22:03:00 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Dec 03 22:03:00 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Dec 03 22:03:00 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Dec 03 22:03:00 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Dec 03 22:03:00 localhost kernel: Demotion targets for Node 0: null Dec 03 22:03:00 localhost kernel: cryptd: max_cpu_qlen set to 1000 Dec 03 22:03:00 localhost kernel: ACPI: Added _OSI(Module Device) Dec 03 22:03:00 localhost kernel: ACPI: Added _OSI(Processor Device) Dec 03 22:03:00 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 03 22:03:00 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 03 22:03:00 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 03 22:03:00 localhost kernel: ACPI: _OSC evaluation for CPUs failed, trying _PDC Dec 03 22:03:00 localhost kernel: ACPI: Interpreter enabled Dec 03 22:03:00 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Dec 03 22:03:00 localhost kernel: ACPI: Using IOAPIC for interrupt routing Dec 03 22:03:00 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 03 22:03:00 localhost kernel: PCI: Using E820 reservations for host bridge windows Dec 03 22:03:00 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Dec 03 22:03:00 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 03 22:03:00 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Dec 03 22:03:00 localhost kernel: acpiphp: Slot [3] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [4] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [5] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [6] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [7] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [8] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [9] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [10] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [11] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [12] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [13] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [14] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [15] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [16] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [17] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [18] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [19] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [20] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [21] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [22] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [23] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [24] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [25] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [26] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [27] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [28] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [29] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [30] registered Dec 03 22:03:00 localhost kernel: acpiphp: Slot [31] registered Dec 03 22:03:00 localhost kernel: PCI host bridge to bus 0000:00 Dec 03 22:03:00 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 03 22:03:00 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 03 22:03:00 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 03 22:03:00 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 03 22:03:00 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x240000000-0x2bfffffff window] Dec 03 22:03:00 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 03 22:03:00 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Dec 03 22:03:00 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Dec 03 22:03:00 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Dec 03 22:03:00 localhost kernel: pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] Dec 03 22:03:00 localhost kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Dec 03 22:03:00 localhost kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Dec 03 22:03:00 localhost kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Dec 03 22:03:00 localhost kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Dec 03 22:03:00 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Dec 03 22:03:00 localhost kernel: pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] Dec 03 22:03:00 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Dec 03 22:03:00 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Dec 03 22:03:00 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Dec 03 22:03:00 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Dec 03 22:03:00 localhost kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Dec 03 22:03:00 localhost kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Dec 03 22:03:00 localhost kernel: pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] Dec 03 22:03:00 localhost kernel: pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] Dec 03 22:03:00 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 03 22:03:00 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Dec 03 22:03:00 localhost kernel: pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] Dec 03 22:03:00 localhost kernel: pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] Dec 03 22:03:00 localhost kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Dec 03 22:03:00 localhost kernel: pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] Dec 03 22:03:00 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Dec 03 22:03:00 localhost kernel: pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] Dec 03 22:03:00 localhost kernel: pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] Dec 03 22:03:00 localhost kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Dec 03 22:03:00 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Dec 03 22:03:00 localhost kernel: pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] Dec 03 22:03:00 localhost kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Dec 03 22:03:00 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint Dec 03 22:03:00 localhost kernel: pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] Dec 03 22:03:00 localhost kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Dec 03 22:03:00 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 03 22:03:00 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 03 22:03:00 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 03 22:03:00 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 03 22:03:00 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 03 22:03:00 localhost kernel: iommu: Default domain type: Translated Dec 03 22:03:00 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 03 22:03:00 localhost kernel: SCSI subsystem initialized Dec 03 22:03:00 localhost kernel: ACPI: bus type USB registered Dec 03 22:03:00 localhost kernel: usbcore: registered new interface driver usbfs Dec 03 22:03:00 localhost kernel: usbcore: registered new interface driver hub Dec 03 22:03:00 localhost kernel: usbcore: registered new device driver usb Dec 03 22:03:00 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Dec 03 22:03:00 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 03 22:03:00 localhost kernel: PTP clock support registered Dec 03 22:03:00 localhost kernel: EDAC MC: Ver: 3.0.0 Dec 03 22:03:00 localhost kernel: NetLabel: Initializing Dec 03 22:03:00 localhost kernel: NetLabel: domain hash size = 128 Dec 03 22:03:00 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Dec 03 22:03:00 localhost kernel: NetLabel: unlabeled traffic allowed by default Dec 03 22:03:00 localhost kernel: PCI: Using ACPI for IRQ routing Dec 03 22:03:00 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Dec 03 22:03:00 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 03 22:03:00 localhost kernel: e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] Dec 03 22:03:00 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Dec 03 22:03:00 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Dec 03 22:03:00 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 03 22:03:00 localhost kernel: vgaarb: loaded Dec 03 22:03:00 localhost kernel: clocksource: Switched to clocksource kvm-clock Dec 03 22:03:00 localhost kernel: VFS: Disk quotas dquot_6.6.0 Dec 03 22:03:00 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 03 22:03:00 localhost kernel: pnp: PnP ACPI init Dec 03 22:03:00 localhost kernel: pnp 00:03: [dma 2] Dec 03 22:03:00 localhost kernel: pnp: PnP ACPI: found 5 devices Dec 03 22:03:00 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 03 22:03:00 localhost kernel: NET: Registered PF_INET protocol family Dec 03 22:03:00 localhost kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 03 22:03:00 localhost kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 03 22:03:00 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 03 22:03:00 localhost kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 03 22:03:00 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 03 22:03:00 localhost kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 03 22:03:00 localhost kernel: MPTCP token hash table entries: 8192 (order: 5, 196608 bytes, linear) Dec 03 22:03:00 localhost kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 03 22:03:00 localhost kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 03 22:03:00 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 03 22:03:00 localhost kernel: NET: Registered PF_XDP protocol family Dec 03 22:03:00 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 03 22:03:00 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 03 22:03:00 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 03 22:03:00 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Dec 03 22:03:00 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x240000000-0x2bfffffff window] Dec 03 22:03:00 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Dec 03 22:03:00 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 03 22:03:00 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 03 22:03:00 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x160 took 99299 usecs Dec 03 22:03:00 localhost kernel: PCI: CLS 0 bytes, default 64 Dec 03 22:03:00 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 03 22:03:00 localhost kernel: software IO TLB: mapped [mem 0x00000000bbfdb000-0x00000000bffdb000] (64MB) Dec 03 22:03:00 localhost kernel: Trying to unpack rootfs image as initramfs... Dec 03 22:03:00 localhost kernel: ACPI: bus type thunderbolt registered Dec 03 22:03:00 localhost kernel: Initialise system trusted keyrings Dec 03 22:03:00 localhost kernel: Key type blacklist registered Dec 03 22:03:00 localhost kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 Dec 03 22:03:00 localhost kernel: zbud: loaded Dec 03 22:03:00 localhost kernel: integrity: Platform Keyring initialized Dec 03 22:03:00 localhost kernel: integrity: Machine keyring initialized Dec 03 22:03:00 localhost kernel: Freeing initrd memory: 87804K Dec 03 22:03:00 localhost kernel: NET: Registered PF_ALG protocol family Dec 03 22:03:00 localhost kernel: xor: automatically using best checksumming function avx Dec 03 22:03:00 localhost kernel: Key type asymmetric registered Dec 03 22:03:00 localhost kernel: Asymmetric key parser 'x509' registered Dec 03 22:03:00 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Dec 03 22:03:00 localhost kernel: io scheduler mq-deadline registered Dec 03 22:03:00 localhost kernel: io scheduler kyber registered Dec 03 22:03:00 localhost kernel: io scheduler bfq registered Dec 03 22:03:00 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Dec 03 22:03:00 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Dec 03 22:03:00 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Dec 03 22:03:00 localhost kernel: ACPI: button: Power Button [PWRF] Dec 03 22:03:00 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Dec 03 22:03:00 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 03 22:03:00 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 03 22:03:00 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 03 22:03:00 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 03 22:03:00 localhost kernel: Non-volatile memory driver v1.3 Dec 03 22:03:00 localhost kernel: rdac: device handler registered Dec 03 22:03:00 localhost kernel: hp_sw: device handler registered Dec 03 22:03:00 localhost kernel: emc: device handler registered Dec 03 22:03:00 localhost kernel: alua: device handler registered Dec 03 22:03:00 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Dec 03 22:03:00 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Dec 03 22:03:00 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Dec 03 22:03:00 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Dec 03 22:03:00 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Dec 03 22:03:00 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Dec 03 22:03:00 localhost kernel: usb usb1: Product: UHCI Host Controller Dec 03 22:03:00 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-645.el9.x86_64 uhci_hcd Dec 03 22:03:00 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Dec 03 22:03:00 localhost kernel: hub 1-0:1.0: USB hub found Dec 03 22:03:00 localhost kernel: hub 1-0:1.0: 2 ports detected Dec 03 22:03:00 localhost kernel: usbcore: registered new interface driver usbserial_generic Dec 03 22:03:00 localhost kernel: usbserial: USB Serial support registered for generic Dec 03 22:03:00 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 03 22:03:00 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 03 22:03:00 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 03 22:03:00 localhost kernel: mousedev: PS/2 mouse device common for all mice Dec 03 22:03:00 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Dec 03 22:03:00 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 03 22:03:00 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Dec 03 22:03:00 localhost kernel: rtc_cmos 00:04: registered as rtc0 Dec 03 22:03:00 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Dec 03 22:03:00 localhost kernel: rtc_cmos 00:04: setting system clock to 2025-12-04T03:02:59 UTC (1764817379) Dec 03 22:03:00 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Dec 03 22:03:00 localhost kernel: amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled Dec 03 22:03:00 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Dec 03 22:03:00 localhost kernel: usbcore: registered new interface driver usbhid Dec 03 22:03:00 localhost kernel: usbhid: USB HID core driver Dec 03 22:03:00 localhost kernel: drop_monitor: Initializing network drop monitor service Dec 03 22:03:00 localhost kernel: Initializing XFRM netlink socket Dec 03 22:03:00 localhost kernel: NET: Registered PF_INET6 protocol family Dec 03 22:03:00 localhost kernel: Segment Routing with IPv6 Dec 03 22:03:00 localhost kernel: NET: Registered PF_PACKET protocol family Dec 03 22:03:00 localhost kernel: mpls_gso: MPLS GSO support Dec 03 22:03:00 localhost kernel: IPI shorthand broadcast: enabled Dec 03 22:03:00 localhost kernel: AVX2 version of gcm_enc/dec engaged. Dec 03 22:03:00 localhost kernel: AES CTR mode by8 optimization enabled Dec 03 22:03:00 localhost kernel: sched_clock: Marking stable (1319006781, 139590770)->(1579452424, -120854873) Dec 03 22:03:00 localhost kernel: registered taskstats version 1 Dec 03 22:03:00 localhost kernel: Loading compiled-in X.509 certificates Dec 03 22:03:00 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 4c28336b4850d771d036b52fb2778fdb4f02f708' Dec 03 22:03:00 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Dec 03 22:03:00 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Dec 03 22:03:00 localhost kernel: Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' Dec 03 22:03:00 localhost kernel: Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' Dec 03 22:03:00 localhost kernel: Demotion targets for Node 0: null Dec 03 22:03:00 localhost kernel: page_owner is disabled Dec 03 22:03:00 localhost kernel: Key type .fscrypt registered Dec 03 22:03:00 localhost kernel: Key type fscrypt-provisioning registered Dec 03 22:03:00 localhost kernel: Key type big_key registered Dec 03 22:03:00 localhost kernel: Key type encrypted registered Dec 03 22:03:00 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Dec 03 22:03:00 localhost kernel: Loading compiled-in module X.509 certificates Dec 03 22:03:00 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 4c28336b4850d771d036b52fb2778fdb4f02f708' Dec 03 22:03:00 localhost kernel: ima: Allocated hash algorithm: sha256 Dec 03 22:03:00 localhost kernel: ima: No architecture policies found Dec 03 22:03:00 localhost kernel: evm: Initialising EVM extended attributes: Dec 03 22:03:00 localhost kernel: evm: security.selinux Dec 03 22:03:00 localhost kernel: evm: security.SMACK64 (disabled) Dec 03 22:03:00 localhost kernel: evm: security.SMACK64EXEC (disabled) Dec 03 22:03:00 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Dec 03 22:03:00 localhost kernel: evm: security.SMACK64MMAP (disabled) Dec 03 22:03:00 localhost kernel: evm: security.apparmor (disabled) Dec 03 22:03:00 localhost kernel: evm: security.ima Dec 03 22:03:00 localhost kernel: evm: security.capability Dec 03 22:03:00 localhost kernel: evm: HMAC attrs: 0x1 Dec 03 22:03:00 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Dec 03 22:03:00 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Dec 03 22:03:00 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Dec 03 22:03:00 localhost kernel: usb 1-1: Product: QEMU USB Tablet Dec 03 22:03:00 localhost kernel: usb 1-1: Manufacturer: QEMU Dec 03 22:03:00 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Dec 03 22:03:00 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Dec 03 22:03:00 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Dec 03 22:03:00 localhost kernel: Running certificate verification RSA selftest Dec 03 22:03:00 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Dec 03 22:03:00 localhost kernel: Running certificate verification ECDSA selftest Dec 03 22:03:00 localhost kernel: Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' Dec 03 22:03:00 localhost kernel: clk: Disabling unused clocks Dec 03 22:03:00 localhost kernel: Freeing unused decrypted memory: 2028K Dec 03 22:03:00 localhost kernel: Freeing unused kernel image (initmem) memory: 4196K Dec 03 22:03:00 localhost kernel: Write protecting the kernel read-only data: 30720k Dec 03 22:03:00 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 428K Dec 03 22:03:00 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Dec 03 22:03:00 localhost kernel: Run /init as init process Dec 03 22:03:00 localhost kernel: with arguments: Dec 03 22:03:00 localhost kernel: /init Dec 03 22:03:00 localhost kernel: with environment: Dec 03 22:03:00 localhost kernel: HOME=/ Dec 03 22:03:00 localhost kernel: TERM=linux Dec 03 22:03:00 localhost kernel: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-645.el9.x86_64 Dec 03 22:03:00 localhost systemd[1]: systemd 252-59.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 03 22:03:00 localhost systemd[1]: Detected virtualization kvm. Dec 03 22:03:00 localhost systemd[1]: Detected architecture x86-64. Dec 03 22:03:00 localhost systemd[1]: Running in initrd. Dec 03 22:03:00 localhost systemd[1]: No hostname configured, using default hostname. Dec 03 22:03:00 localhost systemd[1]: Hostname set to . Dec 03 22:03:00 localhost systemd[1]: Initializing machine ID from VM UUID. Dec 03 22:03:00 localhost systemd[1]: Queued start job for default target Initrd Default Target. Dec 03 22:03:00 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Dec 03 22:03:00 localhost systemd[1]: Reached target Local Encrypted Volumes. Dec 03 22:03:00 localhost systemd[1]: Reached target Initrd /usr File System. Dec 03 22:03:00 localhost systemd[1]: Reached target Local File Systems. Dec 03 22:03:00 localhost systemd[1]: Reached target Path Units. Dec 03 22:03:00 localhost systemd[1]: Reached target Slice Units. Dec 03 22:03:00 localhost systemd[1]: Reached target Swaps. Dec 03 22:03:00 localhost systemd[1]: Reached target Timer Units. Dec 03 22:03:00 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Dec 03 22:03:00 localhost systemd[1]: Listening on Journal Socket (/dev/log). Dec 03 22:03:00 localhost systemd[1]: Listening on Journal Socket. Dec 03 22:03:00 localhost systemd[1]: Listening on udev Control Socket. Dec 03 22:03:00 localhost systemd[1]: Listening on udev Kernel Socket. Dec 03 22:03:00 localhost systemd[1]: Reached target Socket Units. Dec 03 22:03:00 localhost systemd[1]: Starting Create List of Static Device Nodes... Dec 03 22:03:00 localhost systemd[1]: Starting Journal Service... Dec 03 22:03:00 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Dec 03 22:03:00 localhost systemd[1]: Starting Apply Kernel Variables... Dec 03 22:03:00 localhost systemd[1]: Starting Create System Users... Dec 03 22:03:00 localhost systemd[1]: Starting Setup Virtual Console... Dec 03 22:03:00 localhost systemd[1]: Finished Create List of Static Device Nodes. Dec 03 22:03:00 localhost systemd[1]: Finished Apply Kernel Variables. Dec 03 22:03:00 localhost systemd[1]: Finished Create System Users. Dec 03 22:03:00 localhost systemd-journald[307]: Journal started Dec 03 22:03:00 localhost systemd-journald[307]: Runtime Journal (/run/log/journal/9aa66859e8214c3d8c0834259b240751) is 8.0M, max 153.6M, 145.6M free. Dec 03 22:03:00 localhost systemd-sysusers[312]: Creating group 'users' with GID 100. Dec 03 22:03:00 localhost systemd-sysusers[312]: Creating group 'dbus' with GID 81. Dec 03 22:03:00 localhost systemd-sysusers[312]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Dec 03 22:03:00 localhost systemd[1]: Started Journal Service. Dec 03 22:03:00 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Dec 03 22:03:00 localhost systemd[1]: Starting Create Volatile Files and Directories... Dec 03 22:03:00 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Dec 03 22:03:00 localhost systemd[1]: Finished Create Volatile Files and Directories. Dec 03 22:03:00 localhost systemd[1]: Finished Setup Virtual Console. Dec 03 22:03:00 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Dec 03 22:03:00 localhost systemd[1]: Starting dracut cmdline hook... Dec 03 22:03:00 localhost dracut-cmdline[327]: dracut-9 dracut-057-102.git20250818.el9 Dec 03 22:03:00 localhost dracut-cmdline[327]: Using kernel command line parameters: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-645.el9.x86_64 root=UUID=fcf6b761-831a-48a7-9f5f-068b5063763f ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Dec 03 22:03:00 localhost systemd[1]: Finished dracut cmdline hook. Dec 03 22:03:00 localhost systemd[1]: Starting dracut pre-udev hook... Dec 03 22:03:00 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 03 22:03:00 localhost kernel: device-mapper: uevent: version 1.0.3 Dec 03 22:03:00 localhost kernel: device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev Dec 03 22:03:01 localhost kernel: RPC: Registered named UNIX socket transport module. Dec 03 22:03:01 localhost kernel: RPC: Registered udp transport module. Dec 03 22:03:01 localhost kernel: RPC: Registered tcp transport module. Dec 03 22:03:01 localhost kernel: RPC: Registered tcp-with-tls transport module. Dec 03 22:03:01 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 03 22:03:01 localhost rpc.statd[442]: Version 2.5.4 starting Dec 03 22:03:01 localhost rpc.statd[442]: Initializing NSM state Dec 03 22:03:01 localhost rpc.idmapd[447]: Setting log level to 0 Dec 03 22:03:01 localhost systemd[1]: Finished dracut pre-udev hook. Dec 03 22:03:01 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Dec 03 22:03:01 localhost systemd-udevd[460]: Using default interface naming scheme 'rhel-9.0'. Dec 03 22:03:01 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Dec 03 22:03:01 localhost systemd[1]: Starting dracut pre-trigger hook... Dec 03 22:03:01 localhost systemd[1]: Finished dracut pre-trigger hook. Dec 03 22:03:01 localhost systemd[1]: Starting Coldplug All udev Devices... Dec 03 22:03:01 localhost systemd[1]: Created slice Slice /system/modprobe. Dec 03 22:03:01 localhost systemd[1]: Starting Load Kernel Module configfs... Dec 03 22:03:01 localhost systemd[1]: Finished Coldplug All udev Devices. Dec 03 22:03:01 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 03 22:03:01 localhost systemd[1]: Finished Load Kernel Module configfs. Dec 03 22:03:01 localhost systemd[1]: Mounting Kernel Configuration File System... Dec 03 22:03:01 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Dec 03 22:03:01 localhost systemd[1]: Reached target Network. Dec 03 22:03:01 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Dec 03 22:03:01 localhost systemd[1]: Starting dracut initqueue hook... Dec 03 22:03:01 localhost systemd[1]: Mounted Kernel Configuration File System. Dec 03 22:03:01 localhost systemd[1]: Reached target System Initialization. Dec 03 22:03:01 localhost systemd[1]: Reached target Basic System. Dec 03 22:03:01 localhost kernel: virtio_blk virtio2: 8/0/0 default/read/poll queues Dec 03 22:03:01 localhost systemd-udevd[483]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:03:01 localhost kernel: virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) Dec 03 22:03:01 localhost kernel: vda: vda1 Dec 03 22:03:01 localhost kernel: libata version 3.00 loaded. Dec 03 22:03:01 localhost systemd[1]: Found device /dev/disk/by-uuid/fcf6b761-831a-48a7-9f5f-068b5063763f. Dec 03 22:03:01 localhost kernel: ata_piix 0000:00:01.1: version 2.13 Dec 03 22:03:01 localhost kernel: scsi host0: ata_piix Dec 03 22:03:01 localhost kernel: scsi host1: ata_piix Dec 03 22:03:01 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 Dec 03 22:03:01 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 Dec 03 22:03:01 localhost systemd[1]: Reached target Initrd Root Device. Dec 03 22:03:01 localhost kernel: ata1: found unknown device (class 0) Dec 03 22:03:01 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 03 22:03:01 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 03 22:03:01 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Dec 03 22:03:01 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 03 22:03:01 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 03 22:03:01 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 Dec 03 22:03:01 localhost systemd[1]: Finished dracut initqueue hook. Dec 03 22:03:01 localhost systemd[1]: Reached target Preparation for Remote File Systems. Dec 03 22:03:01 localhost systemd[1]: Reached target Remote Encrypted Volumes. Dec 03 22:03:01 localhost systemd[1]: Reached target Remote File Systems. Dec 03 22:03:02 localhost systemd[1]: Starting dracut pre-mount hook... Dec 03 22:03:02 localhost systemd[1]: Finished dracut pre-mount hook. Dec 03 22:03:02 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/fcf6b761-831a-48a7-9f5f-068b5063763f... Dec 03 22:03:02 localhost systemd-fsck[545]: /usr/sbin/fsck.xfs: XFS file system. Dec 03 22:03:02 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/fcf6b761-831a-48a7-9f5f-068b5063763f. Dec 03 22:03:02 localhost systemd[1]: Mounting /sysroot... Dec 03 22:03:02 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Dec 03 22:03:02 localhost kernel: XFS (vda1): Mounting V5 Filesystem fcf6b761-831a-48a7-9f5f-068b5063763f Dec 03 22:03:02 localhost kernel: XFS (vda1): Ending clean mount Dec 03 22:03:02 localhost systemd[1]: Mounted /sysroot. Dec 03 22:03:02 localhost systemd[1]: Reached target Initrd Root File System. Dec 03 22:03:02 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Dec 03 22:03:02 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Dec 03 22:03:02 localhost systemd[1]: Reached target Initrd File Systems. Dec 03 22:03:02 localhost systemd[1]: Reached target Initrd Default Target. Dec 03 22:03:02 localhost systemd[1]: Starting dracut mount hook... Dec 03 22:03:02 localhost systemd[1]: Finished dracut mount hook. Dec 03 22:03:02 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Dec 03 22:03:02 localhost rpc.idmapd[447]: exiting on signal 15 Dec 03 22:03:02 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Dec 03 22:03:02 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Dec 03 22:03:02 localhost systemd[1]: Stopped target Network. Dec 03 22:03:02 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Dec 03 22:03:02 localhost systemd[1]: Stopped target Timer Units. Dec 03 22:03:02 localhost systemd[1]: dbus.socket: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Dec 03 22:03:02 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Dec 03 22:03:02 localhost systemd[1]: Stopped target Initrd Default Target. Dec 03 22:03:02 localhost systemd[1]: Stopped target Basic System. Dec 03 22:03:02 localhost systemd[1]: Stopped target Initrd Root Device. Dec 03 22:03:02 localhost systemd[1]: Stopped target Initrd /usr File System. Dec 03 22:03:02 localhost systemd[1]: Stopped target Path Units. Dec 03 22:03:02 localhost systemd[1]: Stopped target Remote File Systems. Dec 03 22:03:02 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Dec 03 22:03:02 localhost systemd[1]: Stopped target Slice Units. Dec 03 22:03:02 localhost systemd[1]: Stopped target Socket Units. Dec 03 22:03:02 localhost systemd[1]: Stopped target System Initialization. Dec 03 22:03:02 localhost systemd[1]: Stopped target Local File Systems. Dec 03 22:03:02 localhost systemd[1]: Stopped target Swaps. Dec 03 22:03:02 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped dracut mount hook. Dec 03 22:03:02 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped dracut pre-mount hook. Dec 03 22:03:02 localhost systemd[1]: Stopped target Local Encrypted Volumes. Dec 03 22:03:02 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Dec 03 22:03:02 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped dracut initqueue hook. Dec 03 22:03:02 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped Apply Kernel Variables. Dec 03 22:03:02 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped Create Volatile Files and Directories. Dec 03 22:03:02 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped Coldplug All udev Devices. Dec 03 22:03:02 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped dracut pre-trigger hook. Dec 03 22:03:02 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Dec 03 22:03:02 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped Setup Virtual Console. Dec 03 22:03:02 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Dec 03 22:03:02 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Dec 03 22:03:02 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Closed udev Control Socket. Dec 03 22:03:02 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Closed udev Kernel Socket. Dec 03 22:03:02 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped dracut pre-udev hook. Dec 03 22:03:02 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped dracut cmdline hook. Dec 03 22:03:02 localhost systemd[1]: Starting Cleanup udev Database... Dec 03 22:03:02 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Dec 03 22:03:02 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped Create List of Static Device Nodes. Dec 03 22:03:02 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Stopped Create System Users. Dec 03 22:03:02 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 03 22:03:02 localhost systemd[1]: Finished Cleanup udev Database. Dec 03 22:03:02 localhost systemd[1]: Reached target Switch Root. Dec 03 22:03:02 localhost systemd[1]: Starting Switch Root... Dec 03 22:03:02 localhost systemd[1]: Switching root. Dec 03 22:03:02 localhost systemd-journald[307]: Received SIGTERM from PID 1 (systemd). Dec 03 22:03:02 localhost systemd-journald[307]: Journal stopped Dec 03 22:03:03 localhost kernel: audit: type=1404 audit(1764817383.023:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Dec 03 22:03:03 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 03 22:03:03 localhost kernel: SELinux: policy capability open_perms=1 Dec 03 22:03:03 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 03 22:03:03 localhost kernel: SELinux: policy capability always_check_network=0 Dec 03 22:03:03 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 03 22:03:03 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 03 22:03:03 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 03 22:03:03 localhost kernel: audit: type=1403 audit(1764817383.143:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 03 22:03:03 localhost systemd[1]: Successfully loaded SELinux policy in 123.266ms. Dec 03 22:03:03 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 25.202ms. Dec 03 22:03:03 localhost systemd[1]: systemd 252-59.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 03 22:03:03 localhost systemd[1]: Detected virtualization kvm. Dec 03 22:03:03 localhost systemd[1]: Detected architecture x86-64. Dec 03 22:03:03 localhost systemd-rc-local-generator[627]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:03:03 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 03 22:03:03 localhost systemd[1]: Stopped Switch Root. Dec 03 22:03:03 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 03 22:03:03 localhost systemd[1]: Created slice Slice /system/getty. Dec 03 22:03:03 localhost systemd[1]: Created slice Slice /system/serial-getty. Dec 03 22:03:03 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Dec 03 22:03:03 localhost systemd[1]: Created slice User and Session Slice. Dec 03 22:03:03 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Dec 03 22:03:03 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Dec 03 22:03:03 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Dec 03 22:03:03 localhost systemd[1]: Reached target Local Encrypted Volumes. Dec 03 22:03:03 localhost systemd[1]: Stopped target Switch Root. Dec 03 22:03:03 localhost systemd[1]: Stopped target Initrd File Systems. Dec 03 22:03:03 localhost systemd[1]: Stopped target Initrd Root File System. Dec 03 22:03:03 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Dec 03 22:03:03 localhost systemd[1]: Reached target Path Units. Dec 03 22:03:03 localhost systemd[1]: Reached target rpc_pipefs.target. Dec 03 22:03:03 localhost systemd[1]: Reached target Slice Units. Dec 03 22:03:03 localhost systemd[1]: Reached target Swaps. Dec 03 22:03:03 localhost systemd[1]: Reached target Local Verity Protected Volumes. Dec 03 22:03:03 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Dec 03 22:03:03 localhost systemd[1]: Reached target RPC Port Mapper. Dec 03 22:03:03 localhost systemd[1]: Listening on Process Core Dump Socket. Dec 03 22:03:03 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Dec 03 22:03:03 localhost systemd[1]: Listening on udev Control Socket. Dec 03 22:03:03 localhost systemd[1]: Listening on udev Kernel Socket. Dec 03 22:03:03 localhost systemd[1]: Mounting Huge Pages File System... Dec 03 22:03:03 localhost systemd[1]: Mounting POSIX Message Queue File System... Dec 03 22:03:03 localhost systemd[1]: Mounting Kernel Debug File System... Dec 03 22:03:03 localhost systemd[1]: Mounting Kernel Trace File System... Dec 03 22:03:03 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Dec 03 22:03:03 localhost systemd[1]: Starting Create List of Static Device Nodes... Dec 03 22:03:03 localhost systemd[1]: Starting Load Kernel Module configfs... Dec 03 22:03:03 localhost systemd[1]: Starting Load Kernel Module drm... Dec 03 22:03:03 localhost systemd[1]: Starting Load Kernel Module efi_pstore... Dec 03 22:03:03 localhost systemd[1]: Starting Load Kernel Module fuse... Dec 03 22:03:03 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Dec 03 22:03:03 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 03 22:03:03 localhost systemd[1]: Stopped File System Check on Root Device. Dec 03 22:03:03 localhost systemd[1]: Stopped Journal Service. Dec 03 22:03:03 localhost systemd[1]: Starting Journal Service... Dec 03 22:03:03 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Dec 03 22:03:03 localhost systemd[1]: Starting Generate network units from Kernel command line... Dec 03 22:03:03 localhost systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 03 22:03:03 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Dec 03 22:03:03 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Dec 03 22:03:03 localhost systemd[1]: Starting Apply Kernel Variables... Dec 03 22:03:03 localhost systemd-journald[668]: Journal started Dec 03 22:03:03 localhost systemd-journald[668]: Runtime Journal (/run/log/journal/4d4ef2323cc3337bbfd9081b2a323b4e) is 8.0M, max 153.6M, 145.6M free. Dec 03 22:03:03 localhost systemd[1]: Queued start job for default target Multi-User System. Dec 03 22:03:03 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Dec 03 22:03:03 localhost systemd[1]: Starting Coldplug All udev Devices... Dec 03 22:03:03 localhost systemd[1]: Started Journal Service. Dec 03 22:03:03 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Dec 03 22:03:03 localhost systemd[1]: Mounted Huge Pages File System. Dec 03 22:03:03 localhost systemd[1]: Mounted POSIX Message Queue File System. Dec 03 22:03:03 localhost systemd[1]: Mounted Kernel Debug File System. Dec 03 22:03:03 localhost systemd[1]: Mounted Kernel Trace File System. Dec 03 22:03:03 localhost systemd[1]: Finished Create List of Static Device Nodes. Dec 03 22:03:03 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 03 22:03:03 localhost systemd[1]: Finished Load Kernel Module configfs. Dec 03 22:03:03 localhost kernel: ACPI: bus type drm_connector registered Dec 03 22:03:03 localhost systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 03 22:03:03 localhost systemd[1]: Finished Load Kernel Module efi_pstore. Dec 03 22:03:03 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 03 22:03:03 localhost systemd[1]: Finished Load Kernel Module drm. Dec 03 22:03:03 localhost kernel: fuse: init (API version 7.37) Dec 03 22:03:03 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Dec 03 22:03:03 localhost systemd[1]: Finished Generate network units from Kernel command line. Dec 03 22:03:03 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Dec 03 22:03:03 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 03 22:03:03 localhost systemd[1]: Finished Load Kernel Module fuse. Dec 03 22:03:03 localhost systemd[1]: Finished Apply Kernel Variables. Dec 03 22:03:03 localhost systemd[1]: Mounting FUSE Control File System... Dec 03 22:03:03 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Dec 03 22:03:03 localhost systemd[1]: Starting Rebuild Hardware Database... Dec 03 22:03:03 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Dec 03 22:03:03 localhost systemd[1]: Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 03 22:03:03 localhost systemd[1]: Starting Load/Save OS Random Seed... Dec 03 22:03:03 localhost systemd[1]: Starting Create System Users... Dec 03 22:03:03 localhost systemd[1]: Mounted FUSE Control File System. Dec 03 22:03:03 localhost systemd-journald[668]: Runtime Journal (/run/log/journal/4d4ef2323cc3337bbfd9081b2a323b4e) is 8.0M, max 153.6M, 145.6M free. Dec 03 22:03:03 localhost systemd-journald[668]: Received client request to flush runtime journal. Dec 03 22:03:03 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Dec 03 22:03:03 localhost systemd[1]: Finished Load/Save OS Random Seed. Dec 03 22:03:03 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Dec 03 22:03:03 localhost systemd[1]: Finished Coldplug All udev Devices. Dec 03 22:03:03 localhost systemd[1]: Finished Create System Users. Dec 03 22:03:03 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Dec 03 22:03:03 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Dec 03 22:03:03 localhost systemd[1]: Reached target Preparation for Local File Systems. Dec 03 22:03:03 localhost systemd[1]: Reached target Local File Systems. Dec 03 22:03:03 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Dec 03 22:03:03 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Dec 03 22:03:03 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Dec 03 22:03:03 localhost systemd[1]: Update Boot Loader Random Seed was skipped because no trigger condition checks were met. Dec 03 22:03:03 localhost systemd[1]: Starting Automatic Boot Loader Update... Dec 03 22:03:03 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Dec 03 22:03:03 localhost systemd[1]: Starting Create Volatile Files and Directories... Dec 03 22:03:03 localhost bootctl[685]: Couldn't find EFI system partition, skipping. Dec 03 22:03:03 localhost systemd[1]: Finished Automatic Boot Loader Update. Dec 03 22:03:04 localhost systemd[1]: Finished Create Volatile Files and Directories. Dec 03 22:03:04 localhost systemd[1]: Starting Security Auditing Service... Dec 03 22:03:04 localhost systemd[1]: Starting RPC Bind... Dec 03 22:03:04 localhost systemd[1]: Starting Rebuild Journal Catalog... Dec 03 22:03:04 localhost auditd[691]: audit dispatcher initialized with q_depth=2000 and 1 active plugins Dec 03 22:03:04 localhost auditd[691]: Init complete, auditd 3.1.5 listening for events (startup state enable) Dec 03 22:03:04 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Dec 03 22:03:04 localhost augenrules[696]: /sbin/augenrules: No change Dec 03 22:03:04 localhost systemd[1]: Finished Rebuild Journal Catalog. Dec 03 22:03:04 localhost systemd[1]: Started RPC Bind. Dec 03 22:03:04 localhost augenrules[711]: No rules Dec 03 22:03:04 localhost augenrules[711]: enabled 1 Dec 03 22:03:04 localhost augenrules[711]: failure 1 Dec 03 22:03:04 localhost augenrules[711]: pid 691 Dec 03 22:03:04 localhost augenrules[711]: rate_limit 0 Dec 03 22:03:04 localhost augenrules[711]: backlog_limit 8192 Dec 03 22:03:04 localhost augenrules[711]: lost 0 Dec 03 22:03:04 localhost augenrules[711]: backlog 3 Dec 03 22:03:04 localhost augenrules[711]: backlog_wait_time 60000 Dec 03 22:03:04 localhost augenrules[711]: backlog_wait_time_actual 0 Dec 03 22:03:04 localhost augenrules[711]: enabled 1 Dec 03 22:03:04 localhost augenrules[711]: failure 1 Dec 03 22:03:04 localhost augenrules[711]: pid 691 Dec 03 22:03:04 localhost augenrules[711]: rate_limit 0 Dec 03 22:03:04 localhost augenrules[711]: backlog_limit 8192 Dec 03 22:03:04 localhost augenrules[711]: lost 0 Dec 03 22:03:04 localhost augenrules[711]: backlog 3 Dec 03 22:03:04 localhost augenrules[711]: backlog_wait_time 60000 Dec 03 22:03:04 localhost augenrules[711]: backlog_wait_time_actual 0 Dec 03 22:03:04 localhost augenrules[711]: enabled 1 Dec 03 22:03:04 localhost augenrules[711]: failure 1 Dec 03 22:03:04 localhost augenrules[711]: pid 691 Dec 03 22:03:04 localhost augenrules[711]: rate_limit 0 Dec 03 22:03:04 localhost augenrules[711]: backlog_limit 8192 Dec 03 22:03:04 localhost augenrules[711]: lost 0 Dec 03 22:03:04 localhost augenrules[711]: backlog 0 Dec 03 22:03:04 localhost augenrules[711]: backlog_wait_time 60000 Dec 03 22:03:04 localhost augenrules[711]: backlog_wait_time_actual 0 Dec 03 22:03:04 localhost systemd[1]: Started Security Auditing Service. Dec 03 22:03:04 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Dec 03 22:03:04 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Dec 03 22:03:04 localhost systemd[1]: Finished Rebuild Hardware Database. Dec 03 22:03:04 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Dec 03 22:03:04 localhost systemd[1]: Starting Update is Completed... Dec 03 22:03:04 localhost systemd[1]: Finished Update is Completed. Dec 03 22:03:04 localhost systemd-udevd[719]: Using default interface naming scheme 'rhel-9.0'. Dec 03 22:03:04 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Dec 03 22:03:04 localhost systemd[1]: Reached target System Initialization. Dec 03 22:03:04 localhost systemd[1]: Started dnf makecache --timer. Dec 03 22:03:04 localhost systemd[1]: Started Daily rotation of log files. Dec 03 22:03:04 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Dec 03 22:03:04 localhost systemd[1]: Reached target Timer Units. Dec 03 22:03:04 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Dec 03 22:03:04 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Dec 03 22:03:04 localhost systemd[1]: Reached target Socket Units. Dec 03 22:03:04 localhost systemd[1]: Starting D-Bus System Message Bus... Dec 03 22:03:04 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 03 22:03:04 localhost systemd[1]: Starting Load Kernel Module configfs... Dec 03 22:03:04 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 03 22:03:04 localhost systemd[1]: Finished Load Kernel Module configfs. Dec 03 22:03:04 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Dec 03 22:03:04 localhost systemd-udevd[731]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:03:04 localhost systemd[1]: Started D-Bus System Message Bus. Dec 03 22:03:04 localhost systemd[1]: Reached target Basic System. Dec 03 22:03:04 localhost dbus-broker-lau[735]: Ready Dec 03 22:03:04 localhost systemd[1]: Starting NTP client/server... Dec 03 22:03:04 localhost systemd[1]: Starting Cloud-init: Local Stage (pre-network)... Dec 03 22:03:04 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Dec 03 22:03:04 localhost kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 03 22:03:04 localhost kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 03 22:03:04 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Dec 03 22:03:04 localhost systemd[1]: Starting IPv4 firewall with iptables... Dec 03 22:03:04 localhost systemd[1]: Started irqbalance daemon. Dec 03 22:03:04 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Dec 03 22:03:04 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 03 22:03:04 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 03 22:03:04 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 03 22:03:04 localhost systemd[1]: Reached target sshd-keygen.target. Dec 03 22:03:04 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Dec 03 22:03:04 localhost systemd[1]: Reached target User and Group Name Lookups. Dec 03 22:03:04 localhost chronyd[776]: chronyd version 4.8 starting (+CMDMON +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +NTS +SECHASH +IPV6 +DEBUG) Dec 03 22:03:04 localhost chronyd[776]: Loaded 0 symmetric keys Dec 03 22:03:04 localhost chronyd[776]: Using right/UTC timezone to obtain leap second data Dec 03 22:03:04 localhost chronyd[776]: Loaded seccomp filter (level 2) Dec 03 22:03:04 localhost systemd[1]: Starting User Login Management... Dec 03 22:03:04 localhost systemd[1]: Started NTP client/server. Dec 03 22:03:04 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Dec 03 22:03:04 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Dec 03 22:03:04 localhost systemd-logind[783]: Watching system buttons on /dev/input/event0 (Power Button) Dec 03 22:03:04 localhost systemd-logind[783]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Dec 03 22:03:04 localhost systemd-logind[783]: New seat seat0. Dec 03 22:03:04 localhost systemd[1]: Started User Login Management. Dec 03 22:03:04 localhost kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Dec 03 22:03:04 localhost kernel: Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled Dec 03 22:03:04 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Dec 03 22:03:04 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Dec 03 22:03:04 localhost kernel: kvm_amd: TSC scaling supported Dec 03 22:03:04 localhost kernel: kvm_amd: Nested Virtualization enabled Dec 03 22:03:04 localhost kernel: kvm_amd: Nested Paging enabled Dec 03 22:03:04 localhost kernel: kvm_amd: LBR virtualization supported Dec 03 22:03:04 localhost kernel: Console: switching to colour dummy device 80x25 Dec 03 22:03:04 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Dec 03 22:03:04 localhost kernel: [drm] features: -context_init Dec 03 22:03:04 localhost kernel: [drm] number of scanouts: 1 Dec 03 22:03:04 localhost kernel: [drm] number of cap sets: 0 Dec 03 22:03:04 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Dec 03 22:03:04 localhost kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Dec 03 22:03:04 localhost kernel: Console: switching to colour frame buffer device 128x48 Dec 03 22:03:04 localhost kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Dec 03 22:03:04 localhost iptables.init[768]: iptables: Applying firewall rules: [ OK ] Dec 03 22:03:04 localhost systemd[1]: Finished IPv4 firewall with iptables. Dec 03 22:03:05 localhost cloud-init[828]: Cloud-init v. 24.4-7.el9 running 'init-local' at Thu, 04 Dec 2025 03:03:05 +0000. Up 6.81 seconds. Dec 03 22:03:05 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3 Dec 03 22:03:05 localhost kernel: ISO 9660 Extensions: RRIP_1991A Dec 03 22:03:05 localhost systemd[1]: run-cloud\x2dinit-tmp-tmp5qezlkoe.mount: Deactivated successfully. Dec 03 22:03:05 localhost systemd[1]: Starting Hostname Service... Dec 03 22:03:05 localhost systemd[1]: Started Hostname Service. Dec 03 22:03:05 np0005544966.novalocal systemd-hostnamed[842]: Hostname set to (static) Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Finished Cloud-init: Local Stage (pre-network). Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Reached target Preparation for Network. Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Starting Network Manager... Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7112] NetworkManager (version 1.54.1-1.el9) is starting... (boot:4e0373a4-0f9d-4562-9abe-593ce8f56613) Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7118] Read config: /etc/NetworkManager/NetworkManager.conf, /run/NetworkManager/conf.d/15-carrier-timeout.conf Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7234] manager[0x55886a976080]: monitoring kernel firmware directory '/lib/firmware'. Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7288] hostname: hostname: using hostnamed Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7289] hostname: static hostname changed from (none) to "np0005544966.novalocal" Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7297] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7416] manager[0x55886a976080]: rfkill: Wi-Fi hardware radio set enabled Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7417] manager[0x55886a976080]: rfkill: WWAN hardware radio set enabled Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7457] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.54.1-1.el9/libnm-device-plugin-team.so) Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7458] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7458] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7459] manager: Networking is enabled by state file Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7460] settings: Loaded settings plugin: keyfile (internal) Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7470] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.54.1-1.el9/libnm-settings-plugin-ifcfg-rh.so") Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7491] Warning: the ifcfg-rh plugin is deprecated, please migrate connections to the keyfile format using "nmcli connection migrate" Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7510] dhcp: init: Using DHCP client 'internal' Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7513] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7532] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7544] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', managed-type: 'external') Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7557] device (lo): Activation: starting connection 'lo' (2bd39d14-4398-4692-b3be-2a7dc426d66c) Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7572] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7582] device (eth0): state change: unmanaged -> unavailable (reason 'managed', managed-type: 'external') Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7623] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7630] device (lo): state change: disconnected -> prepare (reason 'none', managed-type: 'external') Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7634] device (lo): state change: prepare -> config (reason 'none', managed-type: 'external') Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7637] device (lo): state change: config -> ip-config (reason 'none', managed-type: 'external') Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7641] device (eth0): carrier: link connected Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7647] device (lo): state change: ip-config -> ip-check (reason 'none', managed-type: 'external') Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7656] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', managed-type: 'full') Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7665] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7672] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7674] device (eth0): state change: disconnected -> prepare (reason 'none', managed-type: 'full') Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7678] manager: NetworkManager state is now CONNECTING Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7681] device (eth0): state change: prepare -> config (reason 'none', managed-type: 'full') Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7690] device (eth0): state change: config -> ip-config (reason 'none', managed-type: 'full') Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7694] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7747] dhcp4 (eth0): state changed new lease, address=38.102.83.17 Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Started Network Manager. Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7763] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Reached target Network. Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7802] device (eth0): state change: ip-config -> ip-check (reason 'none', managed-type: 'full') Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Starting Network Manager Wait Online... Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Started Network Manager Script Dispatcher Service. Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7964] device (lo): state change: ip-check -> secondaries (reason 'none', managed-type: 'external') Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7967] device (lo): state change: secondaries -> activated (reason 'none', managed-type: 'external') Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7976] device (lo): Activation: successful, device activated. Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7987] device (eth0): state change: ip-check -> secondaries (reason 'none', managed-type: 'full') Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7990] device (eth0): state change: secondaries -> activated (reason 'none', managed-type: 'full') Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7994] manager: NetworkManager state is now CONNECTED_SITE Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.7998] device (eth0): Activation: successful, device activated. Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.8006] manager: NetworkManager state is now CONNECTED_GLOBAL Dec 03 22:03:05 np0005544966.novalocal NetworkManager[846]: [1764817385.8010] manager: startup complete Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Dec 03 22:03:05 np0005544966.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Reached target NFS client services. Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Reached target Preparation for Remote File Systems. Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Reached target Remote File Systems. Dec 03 22:03:05 np0005544966.novalocal systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Finished Network Manager Wait Online. Dec 03 22:03:05 np0005544966.novalocal systemd[1]: Starting Cloud-init: Network Stage... Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: Cloud-init v. 24.4-7.el9 running 'init' at Thu, 04 Dec 2025 03:03:06 +0000. Up 7.88 seconds. Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: | eth0 | True | 38.102.83.17 | 255.255.255.0 | global | fa:16:3e:c2:96:98 | Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: | eth0 | True | fe80::f816:3eff:fec2:9698/64 | . | link | fa:16:3e:c2:96:98 | Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: | lo | True | ::1/128 | . | host | . | Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: +-------+-------------+---------+-----------+-------+ Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: | Route | Destination | Gateway | Interface | Flags | Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: +-------+-------------+---------+-----------+-------+ Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: | 3 | multicast | :: | eth0 | U | Dec 03 22:03:06 np0005544966.novalocal cloud-init[910]: ci-info: +-------+-------------+---------+-----------+-------+ Dec 03 22:03:06 np0005544966.novalocal useradd[976]: new group: name=cloud-user, GID=1001 Dec 03 22:03:06 np0005544966.novalocal useradd[976]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Dec 03 22:03:06 np0005544966.novalocal useradd[976]: add 'cloud-user' to group 'adm' Dec 03 22:03:06 np0005544966.novalocal useradd[976]: add 'cloud-user' to group 'systemd-journal' Dec 03 22:03:06 np0005544966.novalocal useradd[976]: add 'cloud-user' to shadow group 'adm' Dec 03 22:03:06 np0005544966.novalocal useradd[976]: add 'cloud-user' to shadow group 'systemd-journal' Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: Generating public/private rsa key pair. Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: The key fingerprint is: Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: SHA256:q2oqD8mEClXaWcRk6sNXhX8U6m450RSL0a4QQz+MsIU root@np0005544966.novalocal Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: The key's randomart image is: Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: +---[RSA 3072]----+ Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | .+*oo.o.o. | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | + =E++= +oo | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | o + . o+*oo | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: |.. o ....+o | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: |o. + . S.oo. | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: |=. o o.o | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: |+. . = | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: |.. . . . . | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | ooo... | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: +----[SHA256]-----+ Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: Generating public/private ecdsa key pair. Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: The key fingerprint is: Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: SHA256:BMJ5HIDAh+UfHYUuRHe4vb2ExuO09f915FVyqCMgJ48 root@np0005544966.novalocal Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: The key's randomart image is: Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: +---[ECDSA 256]---+ Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: |o.o++=o++o | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | oo.oo=+o . | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | ...o+.* o o| Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | ...X o . o.| Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | .E S = o o| Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | B = . o.| Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | + = o +| Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | o . . o| Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | ..o| Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: +----[SHA256]-----+ Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: Generating public/private ed25519 key pair. Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: The key fingerprint is: Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: SHA256:3+pmWy6zz5qoRSTzjhnXMFrHl1DZHi4RgqOPaBZueIE root@np0005544966.novalocal Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: The key's randomart image is: Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: +--[ED25519 256]--+ Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | .o.o+ | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | o. oo.o | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | . o.=.o o+ . | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | E o .B = .. o | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | o +ooS . . | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | . B .B.. . | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | = o o . o | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | . .=* | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: | ...+BB+ | Dec 03 22:03:07 np0005544966.novalocal cloud-init[910]: +----[SHA256]-----+ Dec 03 22:03:07 np0005544966.novalocal sm-notify[992]: Version 2.5.4 starting Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Finished Cloud-init: Network Stage. Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Reached target Cloud-config availability. Dec 03 22:03:07 np0005544966.novalocal sshd[994]: Server listening on 0.0.0.0 port 22. Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Reached target Network is Online. Dec 03 22:03:07 np0005544966.novalocal sshd[994]: Server listening on :: port 22. Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Starting Cloud-init: Config Stage... Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Starting Crash recovery kernel arming... Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Starting Notify NFS peers of a restart... Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Starting System Logging Service... Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Starting OpenSSH server daemon... Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Starting Permit User Sessions... Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Started Notify NFS peers of a restart. Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Started OpenSSH server daemon. Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Finished Permit User Sessions. Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Started Command Scheduler. Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Started Getty on tty1. Dec 03 22:03:07 np0005544966.novalocal crond[997]: (CRON) STARTUP (1.5.7) Dec 03 22:03:07 np0005544966.novalocal crond[997]: (CRON) INFO (Syslog will be used instead of sendmail.) Dec 03 22:03:07 np0005544966.novalocal crond[997]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 92% if used.) Dec 03 22:03:07 np0005544966.novalocal crond[997]: (CRON) INFO (running with inotify support) Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Started Serial Getty on ttyS0. Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Reached target Login Prompts. Dec 03 22:03:07 np0005544966.novalocal rsyslogd[993]: [origin software="rsyslogd" swVersion="8.2510.0-2.el9" x-pid="993" x-info="https://www.rsyslog.com"] start Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Started System Logging Service. Dec 03 22:03:07 np0005544966.novalocal rsyslogd[993]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2510.0-2.el9 try https://www.rsyslog.com/e/2040 ] Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Reached target Multi-User System. Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Starting Record Runlevel Change in UTMP... Dec 03 22:03:07 np0005544966.novalocal systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Finished Record Runlevel Change in UTMP. Dec 03 22:03:07 np0005544966.novalocal rsyslogd[993]: imjournal: journal files changed, reloading... [v8.2510.0-2.el9 try https://www.rsyslog.com/e/0 ] Dec 03 22:03:07 np0005544966.novalocal kdumpctl[1006]: kdump: No kdump initial ramdisk found. Dec 03 22:03:07 np0005544966.novalocal kdumpctl[1006]: kdump: Rebuilding /boot/initramfs-5.14.0-645.el9.x86_64kdump.img Dec 03 22:03:07 np0005544966.novalocal cloud-init[1081]: Cloud-init v. 24.4-7.el9 running 'modules:config' at Thu, 04 Dec 2025 03:03:07 +0000. Up 9.45 seconds. Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Finished Cloud-init: Config Stage. Dec 03 22:03:07 np0005544966.novalocal systemd[1]: Starting Cloud-init: Final Stage... Dec 03 22:03:07 np0005544966.novalocal sshd-session[1186]: Unable to negotiate with 38.102.83.114 port 33156: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Dec 03 22:03:08 np0005544966.novalocal sshd-session[1211]: Unable to negotiate with 38.102.83.114 port 33170: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Dec 03 22:03:08 np0005544966.novalocal sshd-session[1218]: Unable to negotiate with 38.102.83.114 port 33180: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Dec 03 22:03:08 np0005544966.novalocal sshd-session[1172]: Connection closed by 38.102.83.114 port 33144 [preauth] Dec 03 22:03:08 np0005544966.novalocal sshd-session[1201]: Connection closed by 38.102.83.114 port 33166 [preauth] Dec 03 22:03:08 np0005544966.novalocal cloud-init[1252]: Cloud-init v. 24.4-7.el9 running 'modules:final' at Thu, 04 Dec 2025 03:03:08 +0000. Up 9.86 seconds. Dec 03 22:03:08 np0005544966.novalocal sshd-session[1264]: Connection reset by 38.102.83.114 port 33204 [preauth] Dec 03 22:03:08 np0005544966.novalocal dracut[1271]: dracut-057-102.git20250818.el9 Dec 03 22:03:08 np0005544966.novalocal sshd-session[1269]: Unable to negotiate with 38.102.83.114 port 33208: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth] Dec 03 22:03:08 np0005544966.novalocal sshd-session[1275]: Unable to negotiate with 38.102.83.114 port 33214: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Dec 03 22:03:08 np0005544966.novalocal cloud-init[1290]: ############################################################# Dec 03 22:03:08 np0005544966.novalocal cloud-init[1292]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Dec 03 22:03:08 np0005544966.novalocal cloud-init[1294]: 256 SHA256:BMJ5HIDAh+UfHYUuRHe4vb2ExuO09f915FVyqCMgJ48 root@np0005544966.novalocal (ECDSA) Dec 03 22:03:08 np0005544966.novalocal sshd-session[1228]: Connection closed by 38.102.83.114 port 33192 [preauth] Dec 03 22:03:08 np0005544966.novalocal cloud-init[1296]: 256 SHA256:3+pmWy6zz5qoRSTzjhnXMFrHl1DZHi4RgqOPaBZueIE root@np0005544966.novalocal (ED25519) Dec 03 22:03:08 np0005544966.novalocal cloud-init[1298]: 3072 SHA256:q2oqD8mEClXaWcRk6sNXhX8U6m450RSL0a4QQz+MsIU root@np0005544966.novalocal (RSA) Dec 03 22:03:08 np0005544966.novalocal cloud-init[1299]: -----END SSH HOST KEY FINGERPRINTS----- Dec 03 22:03:08 np0005544966.novalocal cloud-init[1300]: ############################################################# Dec 03 22:03:08 np0005544966.novalocal cloud-init[1252]: Cloud-init v. 24.4-7.el9 finished at Thu, 04 Dec 2025 03:03:08 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 10.11 seconds Dec 03 22:03:08 np0005544966.novalocal dracut[1274]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics --mount "/dev/disk/by-uuid/fcf6b761-831a-48a7-9f5f-068b5063763f /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device --add-confdir /lib/kdump/dracut.conf.d -f /boot/initramfs-5.14.0-645.el9.x86_64kdump.img 5.14.0-645.el9.x86_64 Dec 03 22:03:08 np0005544966.novalocal systemd[1]: Finished Cloud-init: Final Stage. Dec 03 22:03:08 np0005544966.novalocal systemd[1]: Reached target Cloud-init target. Dec 03 22:03:08 np0005544966.novalocal dracut[1274]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Dec 03 22:03:08 np0005544966.novalocal dracut[1274]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Dec 03 22:03:08 np0005544966.novalocal dracut[1274]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Dec 03 22:03:08 np0005544966.novalocal dracut[1274]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Dec 03 22:03:08 np0005544966.novalocal dracut[1274]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: Module 'ifcfg' will not be installed, because it's in the list to be omitted! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: Module 'plymouth' will not be installed, because it's in the list to be omitted! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: Module 'resume' will not be installed, because it's in the list to be omitted! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: Module 'earlykdump' will not be installed, because it's in the list to be omitted! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: memstrack is not available Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Dec 03 22:03:09 np0005544966.novalocal dracut[1274]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Dec 03 22:03:10 np0005544966.novalocal dracut[1274]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Dec 03 22:03:10 np0005544966.novalocal dracut[1274]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Dec 03 22:03:10 np0005544966.novalocal dracut[1274]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Dec 03 22:03:10 np0005544966.novalocal dracut[1274]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Dec 03 22:03:10 np0005544966.novalocal dracut[1274]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Dec 03 22:03:10 np0005544966.novalocal dracut[1274]: memstrack is not available Dec 03 22:03:10 np0005544966.novalocal dracut[1274]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Dec 03 22:03:10 np0005544966.novalocal dracut[1274]: *** Including module: systemd *** Dec 03 22:03:10 np0005544966.novalocal chronyd[776]: Selected source 158.69.247.84 (2.centos.pool.ntp.org) Dec 03 22:03:10 np0005544966.novalocal chronyd[776]: System clock TAI offset set to 37 seconds Dec 03 22:03:10 np0005544966.novalocal dracut[1274]: *** Including module: fips *** Dec 03 22:03:11 np0005544966.novalocal dracut[1274]: *** Including module: systemd-initrd *** Dec 03 22:03:11 np0005544966.novalocal dracut[1274]: *** Including module: i18n *** Dec 03 22:03:11 np0005544966.novalocal dracut[1274]: *** Including module: drm *** Dec 03 22:03:11 np0005544966.novalocal dracut[1274]: *** Including module: prefixdevname *** Dec 03 22:03:11 np0005544966.novalocal dracut[1274]: *** Including module: kernel-modules *** Dec 03 22:03:12 np0005544966.novalocal kernel: block vda: the capability attribute has been deprecated. Dec 03 22:03:12 np0005544966.novalocal dracut[1274]: *** Including module: kernel-modules-extra *** Dec 03 22:03:12 np0005544966.novalocal dracut[1274]: kernel-modules-extra: configuration source "/run/depmod.d" does not exist Dec 03 22:03:12 np0005544966.novalocal dracut[1274]: kernel-modules-extra: configuration source "/lib/depmod.d" does not exist Dec 03 22:03:12 np0005544966.novalocal dracut[1274]: kernel-modules-extra: parsing configuration file "/etc/depmod.d/dist.conf" Dec 03 22:03:12 np0005544966.novalocal dracut[1274]: kernel-modules-extra: /etc/depmod.d/dist.conf: added "updates extra built-in weak-updates" to the list of search directories Dec 03 22:03:12 np0005544966.novalocal dracut[1274]: *** Including module: qemu *** Dec 03 22:03:12 np0005544966.novalocal chronyd[776]: Selected source 174.138.193.90 (2.centos.pool.ntp.org) Dec 03 22:03:12 np0005544966.novalocal dracut[1274]: *** Including module: fstab-sys *** Dec 03 22:03:12 np0005544966.novalocal dracut[1274]: *** Including module: rootfs-block *** Dec 03 22:03:12 np0005544966.novalocal dracut[1274]: *** Including module: terminfo *** Dec 03 22:03:12 np0005544966.novalocal dracut[1274]: *** Including module: udev-rules *** Dec 03 22:03:13 np0005544966.novalocal dracut[1274]: Skipping udev rule: 91-permissions.rules Dec 03 22:03:13 np0005544966.novalocal dracut[1274]: Skipping udev rule: 80-drivers-modprobe.rules Dec 03 22:03:13 np0005544966.novalocal dracut[1274]: *** Including module: virtiofs *** Dec 03 22:03:13 np0005544966.novalocal dracut[1274]: *** Including module: dracut-systemd *** Dec 03 22:03:14 np0005544966.novalocal dracut[1274]: *** Including module: usrmount *** Dec 03 22:03:14 np0005544966.novalocal dracut[1274]: *** Including module: base *** Dec 03 22:03:14 np0005544966.novalocal dracut[1274]: *** Including module: fs-lib *** Dec 03 22:03:14 np0005544966.novalocal dracut[1274]: *** Including module: kdumpbase *** Dec 03 22:03:14 np0005544966.novalocal dracut[1274]: *** Including module: microcode_ctl-fw_dir_override *** Dec 03 22:03:14 np0005544966.novalocal dracut[1274]: microcode_ctl module: mangling fw_dir Dec 03 22:03:14 np0005544966.novalocal dracut[1274]: microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware" Dec 03 22:03:14 np0005544966.novalocal dracut[1274]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Dec 03 22:03:14 np0005544966.novalocal dracut[1274]: microcode_ctl: configuration "intel" is ignored Dec 03 22:03:14 np0005544966.novalocal dracut[1274]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: configuration "intel-06-2d-07" is ignored Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: configuration "intel-06-4e-03" is ignored Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: configuration "intel-06-4f-01" is ignored Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: configuration "intel-06-55-04" is ignored Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: configuration "intel-06-5e-03" is ignored Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: Cannot change IRQ 35 affinity: Operation not permitted Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: IRQ 35 affinity is now unmanaged Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: Cannot change IRQ 33 affinity: Operation not permitted Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: IRQ 33 affinity is now unmanaged Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: Cannot change IRQ 31 affinity: Operation not permitted Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: IRQ 31 affinity is now unmanaged Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: Cannot change IRQ 28 affinity: Operation not permitted Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: IRQ 28 affinity is now unmanaged Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: Cannot change IRQ 34 affinity: Operation not permitted Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: IRQ 34 affinity is now unmanaged Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: Cannot change IRQ 32 affinity: Operation not permitted Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: IRQ 32 affinity is now unmanaged Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: Cannot change IRQ 30 affinity: Operation not permitted Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: IRQ 30 affinity is now unmanaged Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: Cannot change IRQ 29 affinity: Operation not permitted Dec 03 22:03:15 np0005544966.novalocal irqbalance[769]: IRQ 29 affinity is now unmanaged Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: configuration "intel-06-8c-01" is ignored Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8f-08"... Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: configuration "intel-06-8f-08" is ignored Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: microcode_ctl: final fw_dir: "/lib/firmware/updates /lib/firmware" Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: *** Including module: openssl *** Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: *** Including module: shutdown *** Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: *** Including module: squash *** Dec 03 22:03:15 np0005544966.novalocal sshd-session[3059]: Accepted publickey for zuul-worker from 38.102.83.114 port 54000 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: *** Including modules done *** Dec 03 22:03:15 np0005544966.novalocal dracut[1274]: *** Installing kernel module dependencies *** Dec 03 22:03:15 np0005544966.novalocal systemd[1]: Created slice User Slice of UID 1000. Dec 03 22:03:15 np0005544966.novalocal systemd[1]: Starting User Runtime Directory /run/user/1000... Dec 03 22:03:15 np0005544966.novalocal systemd-logind[783]: New session 1 of user zuul-worker. Dec 03 22:03:15 np0005544966.novalocal systemd[1]: Finished User Runtime Directory /run/user/1000. Dec 03 22:03:15 np0005544966.novalocal systemd[1]: Starting User Manager for UID 1000... Dec 03 22:03:15 np0005544966.novalocal systemd[3109]: pam_unix(systemd-user:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Dec 03 22:03:15 np0005544966.novalocal systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 03 22:03:15 np0005544966.novalocal systemd[3109]: Queued start job for default target Main User Target. Dec 03 22:03:16 np0005544966.novalocal systemd[3109]: Created slice User Application Slice. Dec 03 22:03:16 np0005544966.novalocal systemd[3109]: Started Mark boot as successful after the user session has run 2 minutes. Dec 03 22:03:16 np0005544966.novalocal systemd[3109]: Started Daily Cleanup of User's Temporary Directories. Dec 03 22:03:16 np0005544966.novalocal systemd[3109]: Reached target Paths. Dec 03 22:03:16 np0005544966.novalocal systemd[3109]: Reached target Timers. Dec 03 22:03:16 np0005544966.novalocal systemd[3109]: Starting D-Bus User Message Bus Socket... Dec 03 22:03:16 np0005544966.novalocal systemd[3109]: Starting Create User's Volatile Files and Directories... Dec 03 22:03:16 np0005544966.novalocal systemd[3109]: Finished Create User's Volatile Files and Directories. Dec 03 22:03:16 np0005544966.novalocal systemd[3109]: Listening on D-Bus User Message Bus Socket. Dec 03 22:03:16 np0005544966.novalocal systemd[3109]: Reached target Sockets. Dec 03 22:03:16 np0005544966.novalocal systemd[3109]: Reached target Basic System. Dec 03 22:03:16 np0005544966.novalocal systemd[3109]: Reached target Main User Target. Dec 03 22:03:16 np0005544966.novalocal systemd[3109]: Startup finished in 171ms. Dec 03 22:03:16 np0005544966.novalocal systemd[1]: Started User Manager for UID 1000. Dec 03 22:03:16 np0005544966.novalocal systemd[1]: Started Session 1 of User zuul-worker. Dec 03 22:03:16 np0005544966.novalocal sshd-session[3059]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Dec 03 22:03:16 np0005544966.novalocal dracut[1274]: *** Installing kernel module dependencies done *** Dec 03 22:03:16 np0005544966.novalocal dracut[1274]: *** Resolving executable dependencies *** Dec 03 22:03:16 np0005544966.novalocal python3[3192]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 03 22:03:18 np0005544966.novalocal python3[3717]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 03 22:03:18 np0005544966.novalocal dracut[1274]: *** Resolving executable dependencies done *** Dec 03 22:03:18 np0005544966.novalocal dracut[1274]: *** Generating early-microcode cpio image *** Dec 03 22:03:18 np0005544966.novalocal dracut[1274]: *** Store current command line parameters *** Dec 03 22:03:18 np0005544966.novalocal dracut[1274]: Stored kernel commandline: Dec 03 22:03:18 np0005544966.novalocal dracut[1274]: No dracut internal kernel commandline stored in the initramfs Dec 03 22:03:18 np0005544966.novalocal dracut[1274]: *** Install squash loader *** Dec 03 22:03:19 np0005544966.novalocal dracut[1274]: *** Squashing the files inside the initramfs *** Dec 03 22:03:20 np0005544966.novalocal dracut[1274]: *** Squashing the files inside the initramfs done *** Dec 03 22:03:20 np0005544966.novalocal dracut[1274]: *** Creating image file '/boot/initramfs-5.14.0-645.el9.x86_64kdump.img' *** Dec 03 22:03:20 np0005544966.novalocal dracut[1274]: *** Hardlinking files *** Dec 03 22:03:20 np0005544966.novalocal dracut[1274]: Mode: real Dec 03 22:03:20 np0005544966.novalocal dracut[1274]: Files: 50 Dec 03 22:03:20 np0005544966.novalocal dracut[1274]: Linked: 0 files Dec 03 22:03:20 np0005544966.novalocal dracut[1274]: Compared: 0 xattrs Dec 03 22:03:20 np0005544966.novalocal dracut[1274]: Compared: 0 files Dec 03 22:03:20 np0005544966.novalocal dracut[1274]: Saved: 0 B Dec 03 22:03:20 np0005544966.novalocal dracut[1274]: Duration: 0.000798 seconds Dec 03 22:03:20 np0005544966.novalocal dracut[1274]: *** Hardlinking files done *** Dec 03 22:03:21 np0005544966.novalocal dracut[1274]: *** Creating initramfs image file '/boot/initramfs-5.14.0-645.el9.x86_64kdump.img' done *** Dec 03 22:03:21 np0005544966.novalocal kdumpctl[1006]: kdump: kexec: loaded kdump kernel Dec 03 22:03:21 np0005544966.novalocal kdumpctl[1006]: kdump: Starting kdump: [OK] Dec 03 22:03:21 np0005544966.novalocal systemd[1]: Finished Crash recovery kernel arming. Dec 03 22:03:21 np0005544966.novalocal systemd[1]: Startup finished in 1.795s (kernel) + 2.979s (initrd) + 18.780s (userspace) = 23.555s. Dec 03 22:03:22 np0005544966.novalocal python3[4456]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 03 22:03:23 np0005544966.novalocal python3[4496]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Dec 03 22:03:24 np0005544966.novalocal python3[4522]: ansible-authorized_key Invoked with user=zuul-worker state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 03 22:03:25 np0005544966.novalocal python3[4546]: ansible-file Invoked with state=directory path=/home/zuul-worker/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:25 np0005544966.novalocal python3[4645]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 03 22:03:25 np0005544966.novalocal python3[4716]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1764817405.2388825-163-115950958496157/source dest=/home/zuul-worker/.ssh/id_rsa mode=384 force=False _original_basename=98e87dc1823a42279d70bcf1591c5e09_id_rsa follow=False checksum=f0edc49151a3ef772fa5f0eee71f429fb77131d9 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:26 np0005544966.novalocal python3[4839]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 03 22:03:26 np0005544966.novalocal python3[4910]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1764817406.1009924-174-126173972255537/source dest=/home/zuul-worker/.ssh/id_rsa.pub mode=420 force=False _original_basename=98e87dc1823a42279d70bcf1591c5e09_id_rsa.pub follow=False checksum=dec4deadf75d7a8521fc5fa0dab19f58d7831816 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:27 np0005544966.novalocal python3[4958]: ansible-ping Invoked with data=pong Dec 03 22:03:28 np0005544966.novalocal python3[4982]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 03 22:03:30 np0005544966.novalocal python3[5040]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Dec 03 22:03:31 np0005544966.novalocal python3[5072]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:31 np0005544966.novalocal python3[5096]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:31 np0005544966.novalocal python3[5120]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:31 np0005544966.novalocal python3[5144]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:32 np0005544966.novalocal python3[5168]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:32 np0005544966.novalocal python3[5192]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:34 np0005544966.novalocal python3[5216]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Dec 03 22:03:35 np0005544966.novalocal sshd-session[5219]: Accepted publickey for zuul-worker from 38.102.83.114 port 48500 ssh2: RSA SHA256:/9Shi6lqdkc95CqVg5fVW7IATh1WKi3SvT5N73+oNdw Dec 03 22:03:35 np0005544966.novalocal systemd-logind[783]: New session 3 of user zuul-worker. Dec 03 22:03:35 np0005544966.novalocal systemd[1]: Started Session 3 of User zuul-worker. Dec 03 22:03:35 np0005544966.novalocal sshd-session[5219]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Dec 03 22:03:35 np0005544966.novalocal systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 03 22:03:37 np0005544966.novalocal sshd-session[5222]: Received disconnect from 38.102.83.114 port 48500:11: disconnected by user Dec 03 22:03:37 np0005544966.novalocal sshd-session[5222]: Disconnected from user zuul-worker 38.102.83.114 port 48500 Dec 03 22:03:37 np0005544966.novalocal sshd-session[5219]: pam_unix(sshd:session): session closed for user zuul-worker Dec 03 22:03:37 np0005544966.novalocal systemd-logind[783]: Session 3 logged out. Waiting for processes to exit. Dec 03 22:03:37 np0005544966.novalocal systemd[1]: session-3.scope: Deactivated successfully. Dec 03 22:03:37 np0005544966.novalocal systemd[1]: session-3.scope: Consumed 1.722s CPU time. Dec 03 22:03:37 np0005544966.novalocal systemd-logind[783]: Removed session 3. Dec 03 22:03:37 np0005544966.novalocal python3[5274]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:38 np0005544966.novalocal python3[5298]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:38 np0005544966.novalocal sshd-session[5249]: Connection reset by authenticating user root 91.202.233.33 port 35366 [preauth] Dec 03 22:03:38 np0005544966.novalocal python3[5322]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:38 np0005544966.novalocal python3[5347]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:38 np0005544966.novalocal python3[5372]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:39 np0005544966.novalocal python3[5396]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:39 np0005544966.novalocal python3[5421]: ansible-ansible.legacy.command Invoked with _raw_params=sudo -n true zuul_log_id=fa163efc-24cc-40f5-7a04-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 03 22:03:39 np0005544966.novalocal sshd-session[5323]: Invalid user postgres from 91.202.233.33 port 35370 Dec 03 22:03:39 np0005544966.novalocal sudo[5422]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/true Dec 03 22:03:39 np0005544966.novalocal sudo[5422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:03:39 np0005544966.novalocal sudo[5422]: pam_unix(sudo:session): session closed for user root Dec 03 22:03:40 np0005544966.novalocal sshd-session[5323]: Connection reset by invalid user postgres 91.202.233.33 port 35370 [preauth] Dec 03 22:03:40 np0005544966.novalocal python3[5450]: ansible-file Invoked with path=/home/zuul-worker/.pydistutils.cfg state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:40 np0005544966.novalocal sudo[5528]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fefpcewbhmltmdjzdaqodvchyoigkawi ; /usr/bin/python3' Dec 03 22:03:40 np0005544966.novalocal sudo[5528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:03:40 np0005544966.novalocal python3[5530]: ansible-ansible.legacy.stat Invoked with path=/etc/pip.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 03 22:03:40 np0005544966.novalocal sudo[5528]: pam_unix(sudo:session): session closed for user root Dec 03 22:03:41 np0005544966.novalocal sudo[5601]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qwkliecgmdxjmjqpwppvpbmuzyzwyfmg ; /usr/bin/python3' Dec 03 22:03:41 np0005544966.novalocal sudo[5601]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:03:41 np0005544966.novalocal python3[5603]: ansible-ansible.legacy.copy Invoked with dest=/etc/pip.conf group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1764817420.5465722-91-61906037158056/source follow=False _original_basename=pip.conf.j2 checksum=5b65c9094402b8db60a77928be1f816342638afe backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:41 np0005544966.novalocal sudo[5601]: pam_unix(sudo:session): session closed for user root Dec 03 22:03:41 np0005544966.novalocal sudo[5703]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cpfwaplbflnwspoeyrgxjpyspeaggvlh ; /usr/bin/python3' Dec 03 22:03:41 np0005544966.novalocal sudo[5703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:03:42 np0005544966.novalocal python3[5705]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 03 22:03:42 np0005544966.novalocal sudo[5703]: pam_unix(sudo:session): session closed for user root Dec 03 22:03:42 np0005544966.novalocal sudo[5778]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kyuzgbngelizstdrcedyuzlnckdhrveo ; /usr/bin/python3' Dec 03 22:03:42 np0005544966.novalocal sudo[5778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:03:42 np0005544966.novalocal sshd-session[5451]: Connection reset by authenticating user root 91.202.233.33 port 53350 [preauth] Dec 03 22:03:42 np0005544966.novalocal python3[5780]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1764817421.6787138-103-47939630232384/source follow=False _original_basename=centos.repo.j2 checksum=0268eb1686bc9b047a2096dbaf287658b0d20a19 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:42 np0005544966.novalocal sudo[5778]: pam_unix(sudo:session): session closed for user root Dec 03 22:03:42 np0005544966.novalocal sudo[5881]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ybkrugpnfmxmfyfzqvkcjnxawtntknxr ; /usr/bin/python3' Dec 03 22:03:42 np0005544966.novalocal sudo[5881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:03:42 np0005544966.novalocal python3[5883]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos-addons.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 03 22:03:43 np0005544966.novalocal sudo[5881]: pam_unix(sudo:session): session closed for user root Dec 03 22:03:43 np0005544966.novalocal sudo[5957]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mdiapasqvxdwpyskjtdgbfgpccqojmfm ; /usr/bin/python3' Dec 03 22:03:43 np0005544966.novalocal sudo[5957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:03:43 np0005544966.novalocal python3[5959]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos-addons.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1764817422.6215496-103-17871489208830/source follow=False _original_basename=centos-addons.repo.j2 checksum=2917e612982cadeb3009a3bf37bf30cbcd7f2044 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:43 np0005544966.novalocal sudo[5957]: pam_unix(sudo:session): session closed for user root Dec 03 22:03:43 np0005544966.novalocal sudo[6007]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-munflhfmwdnlzxtstpwiclkrawpzeayc ; /usr/bin/python3' Dec 03 22:03:43 np0005544966.novalocal sudo[6007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:03:44 np0005544966.novalocal python3[6009]: ansible-ini_file Invoked with path=/etc/dnf.conf section=main option=deltarpm value=0 mode=420 backup=False state=present exclusive=True no_extra_spaces=False ignore_spaces=False allow_no_value=False create=True follow=False unsafe_writes=False values=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:44 np0005544966.novalocal python3[6009]: ansible-ini_file [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Dec 03 22:03:44 np0005544966.novalocal sudo[6007]: pam_unix(sudo:session): session closed for user root Dec 03 22:03:44 np0005544966.novalocal sudo[6033]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gyedhvmgywacieififovdmtlwfksbcta ; /usr/bin/python3' Dec 03 22:03:44 np0005544966.novalocal sudo[6033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:03:44 np0005544966.novalocal python3[6035]: ansible-ansible.legacy.command Invoked with _raw_params=dnf clean all zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 03 22:03:44 np0005544966.novalocal sshd-session[5805]: Connection reset by authenticating user root 91.202.233.33 port 53360 [preauth] Dec 03 22:03:44 np0005544966.novalocal sudo[6033]: pam_unix(sudo:session): session closed for user root Dec 03 22:03:44 np0005544966.novalocal sudo[6062]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-moljacryzljihoarrxjyavasmwalmfqe ; /usr/bin/python3' Dec 03 22:03:44 np0005544966.novalocal sudo[6062]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:03:45 np0005544966.novalocal python3[6064]: ansible-ansible.legacy.command Invoked with _raw_params=dnf makecache -v zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 03 22:03:47 np0005544966.novalocal sshd-session[6043]: Connection reset by authenticating user root 91.202.233.33 port 53364 [preauth] Dec 03 22:03:55 np0005544966.novalocal sudo[6062]: pam_unix(sudo:session): session closed for user root Dec 03 22:03:56 np0005544966.novalocal python3[6106]: ansible-file Invoked with path=/home/zuul-worker/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:03:57 np0005544966.novalocal python3[6131]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=PYTHON2=0 PYTHON3=1 # Not all platforms install a `pip` when installing python # specific pip packages. We first check if pip$VERSION is # available and if not fallback to checking if just `pip` # is present. if [ "$PYTHON2" -eq "1" ] ; then command -v pip2 || command -v pip || exit 1 python2 -m wheel --help || exit 1 fi if [ "$PYTHON3" -eq "1" ] ; then command -v pip3 || command -v pip || exit 1 python3 -m wheel --help || exit 1 fi _uses_shell=True zuul_log_id=fa163efc-24cc-0498-d565-000000000089-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Dec 03 22:03:57 np0005544966.novalocal sudo[6159]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-utsqkxaerrebmqjavqgcbphebaxeznvm ; /usr/bin/python3' Dec 03 22:03:57 np0005544966.novalocal sudo[6159]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:03:58 np0005544966.novalocal python3[6161]: ansible-ansible.legacy.dnf Invoked with name=['python3-pip', 'python3-setuptools', 'python3-wheel'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 03 22:03:59 np0005544966.novalocal sudo[6159]: pam_unix(sudo:session): session closed for user root Dec 03 22:04:00 np0005544966.novalocal python3[6193]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v python3 _uses_shell=True zuul_log_id=fa163efc-24cc-0498-d565-000000000093-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Dec 03 22:04:01 np0005544966.novalocal python3[6221]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v tox /home/zuul-worker/.local/tox/bin/tox || exit 1 _uses_shell=True zuul_log_id=fa163efc-24cc-0498-d565-000000000021-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Dec 03 22:04:01 np0005544966.novalocal python3[6249]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/bin/python3 -m venv /home/zuul-worker/.local/tox zuul_log_id=fa163efc-24cc-0498-d565-000000000024-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 03 22:04:04 np0005544966.novalocal python3[6281]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/pip install tox zuul_log_id=fa163efc-24cc-0498-d565-000000000025-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 03 22:04:07 np0005544966.novalocal python3[6311]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/tox --version zuul_log_id=fa163efc-24cc-0498-d565-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 03 22:04:08 np0005544966.novalocal sudo[6340]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cuncthyhhsnmtepgqfaauwadxklaltjt ; /usr/bin/python3' Dec 03 22:04:08 np0005544966.novalocal sudo[6340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:04:08 np0005544966.novalocal python3[6342]: ansible-file Invoked with state=link src=/home/zuul-worker/.local/tox/bin/tox dest=/usr/local/bin/tox path=/usr/local/bin/tox recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:04:08 np0005544966.novalocal sudo[6340]: pam_unix(sudo:session): session closed for user root Dec 03 22:04:08 np0005544966.novalocal python3[6367]: ansible-ansible.legacy.command Invoked with _raw_params=export WBASE="/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo"; mkdir -p $WBASE/playbooks/roles ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-common" $WBASE/playbooks/roles/common; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-logs" $WBASE/playbooks/roles/logs; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-kolla" $WBASE/playbooks/roles/kolla; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-packstack" $WBASE/playbooks/roles/packstack; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-puppet-openstack" $WBASE/playbooks/roles/puppet-openstack; # noqa 204 ln -s "/home/zuul-worker/src/github.com/openstack-k8s-operators/ci-framework/roles/build_containers" $WBASE/playbooks/roles/build_containers; # noqa 204 _uses_shell=True zuul_log_id=fa163efc-24cc-0498-d565-00000000003f-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 03 22:04:09 np0005544966.novalocal sudo[6400]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nxtopjjbzepbrkvyxbxzlmyijbkthfcd ; /usr/bin/python3' Dec 03 22:04:09 np0005544966.novalocal sudo[6400]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:04:09 np0005544966.novalocal python3[6402]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:04:09 np0005544966.novalocal sudo[6400]: pam_unix(sudo:session): session closed for user root Dec 03 22:04:09 np0005544966.novalocal sudo[6478]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xhsqomobjlpobigoqonjdslkxycsyvgr ; /usr/bin/python3' Dec 03 22:04:09 np0005544966.novalocal sudo[6478]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:04:09 np0005544966.novalocal python3[6480]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 03 22:04:09 np0005544966.novalocal sudo[6478]: pam_unix(sudo:session): session closed for user root Dec 03 22:04:10 np0005544966.novalocal sshd-session[6315]: Invalid user django from 45.78.222.175 port 37660 Dec 03 22:04:10 np0005544966.novalocal sudo[6551]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ozsdvllvhbprhxwppypnbfccqzrudpmo ; /usr/bin/python3' Dec 03 22:04:10 np0005544966.novalocal sudo[6551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:04:10 np0005544966.novalocal python3[6553]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1764817449.348275-81-213899694312387/source follow=False _original_basename=mirror_info.sh.j2 checksum=ea5d641d750b2605d80a15d4106dfb6027081c92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 03 22:04:10 np0005544966.novalocal sudo[6551]: pam_unix(sudo:session): session closed for user root Dec 03 22:04:10 np0005544966.novalocal sshd-session[6315]: Received disconnect from 45.78.222.175 port 37660:11: Bye Bye [preauth] Dec 03 22:04:10 np0005544966.novalocal sshd-session[6315]: Disconnected from invalid user django 45.78.222.175 port 37660 [preauth] Dec 03 22:04:10 np0005544966.novalocal sudo[6602]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ffjbocqxaakmxxspemhigozjxmtivjbu ; /usr/bin/python3' Dec 03 22:04:10 np0005544966.novalocal sudo[6602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:04:10 np0005544966.novalocal python3[6604]: ansible-ansible.legacy.command Invoked with _raw_params=dnf install -y python3-pip rpmlint python3-rpm _uses_shell=True zuul_log_id=fa163efc-24cc-0498-d565-000000000052-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 03 22:04:11 np0005544966.novalocal sudo[6602]: pam_unix(sudo:session): session closed for user root Dec 03 22:04:11 np0005544966.novalocal python3[6631]: ansible-pip Invoked with name=['rdopkg'] virtualenv=/home/zuul-worker/rdopkg-venv virtualenv_command=/usr/bin/python3 -m venv virtualenv_site_packages=True state=present editable=False version=None requirements=None virtualenv_python=None extra_args=None chdir=None executable=None umask=None Dec 03 22:04:18 np0005544966.novalocal python3[6664]: ansible-ansible.legacy.command Invoked with _raw_params=set -e -x source '/home/zuul-worker/rdopkg-venv/bin/activate' MASTER="$(rdopkg info | grep -e "in development phase" | awk '{print $1}')" RELEASE="dalmatian" DIST_VER="9" # Find out if it is puppet or packstack and scenario if [[ "weirdo-dalmatian-promote-puppet-scenario005-centos-stream-9" == *"puppet"* ]]; then project="puppet-openstack" else project="packstack" fi scenario="scenario005" # Set version related variables if [ $RELEASE = $MASTER ]; then VERSION="master" O_RELEASE="master" else VERSION="$(rdopkg release -r "$RELEASE" | grep upstream_branch | awk '{print $2}')" O_RELEASE="$RELEASE" fi if [[ "promotion" == "promotion" ]]; then enable_puppet_modules_rpm=false dlrn_repo="puppet-ci-testing" else enable_puppet_modules_rpm=true dlrn_repo="puppet-passed-ci" fi # Prepare Ansible inventory to use localhost pushd /home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo cat <hosts localhost ansible_connection=local ansible_python_interpreter=/usr/bin/python3 [openstack_nodes] localhost log_destination=/var/log/weirdo EOF REPOS_URL="http://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/${dlrn_repo}/delorean.repo,https://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/delorean-deps.repo" # noqa 204 tox -e ansible-playbook -- -vv -b -i hosts playbooks/$project-$scenario.yml \ -e version=$VERSION \ -e openstack_release=$O_RELEASE \ -e selinux_enforcing="false" \ -e tempest_from_source=false \ -e enable_puppet_modules_rpm=${enable_puppet_modules_rpm} \ -e trunk_repositories=$REPOS_URL \ _uses_shell=True zuul_log_id=fa163efc-24cc-0498-d565-000000000005-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 03 22:04:31 np0005544966.novalocal sshd-session[6702]: Connection reset by authenticating user root 45.140.17.124 port 60744 [preauth] Dec 03 22:04:33 np0005544966.novalocal sshd-session[6708]: Connection reset by authenticating user root 45.140.17.124 port 20590 [preauth] Dec 03 22:04:34 np0005544966.novalocal sshd-session[6712]: Invalid user user from 45.140.17.124 port 20604 Dec 03 22:04:34 np0005544966.novalocal sshd-session[6712]: Connection reset by invalid user user 45.140.17.124 port 20604 [preauth] Dec 03 22:04:36 np0005544966.novalocal sshd-session[6717]: Invalid user username from 45.140.17.124 port 20618 Dec 03 22:04:37 np0005544966.novalocal sshd-session[6717]: Connection reset by invalid user username 45.140.17.124 port 20618 [preauth] Dec 03 22:04:39 np0005544966.novalocal sshd-session[6721]: Connection reset by authenticating user root 45.140.17.124 port 20620 [preauth] Dec 03 22:05:04 np0005544966.novalocal sshd-session[6781]: Invalid user mailuser from 45.78.222.160 port 56532 Dec 03 22:05:04 np0005544966.novalocal sshd-session[6781]: Received disconnect from 45.78.222.160 port 56532:11: Bye Bye [preauth] Dec 03 22:05:04 np0005544966.novalocal sshd-session[6781]: Disconnected from invalid user mailuser 45.78.222.160 port 56532 [preauth] Dec 03 22:05:12 np0005544966.novalocal sshd[994]: Timeout before authentication for connection from 14.103.112.1 to 38.102.83.17, pid = 1788 Dec 03 22:05:15 np0005544966.novalocal sshd-session[6787]: Invalid user mysql from 103.19.254.14 port 48154 Dec 03 22:05:15 np0005544966.novalocal sshd-session[6787]: Received disconnect from 103.19.254.14 port 48154:11: Bye Bye [preauth] Dec 03 22:05:15 np0005544966.novalocal sshd-session[6787]: Disconnected from invalid user mysql 103.19.254.14 port 48154 [preauth] Dec 03 22:05:24 np0005544966.novalocal sudo[6957]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pdggzjogeqzogfnmmcxbcqckdcwlsgiz ; /usr/bin/python3' Dec 03 22:05:24 np0005544966.novalocal sudo[6957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:24 np0005544966.novalocal python3[6959]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=* fact_path=/etc/ansible/facts.d Dec 03 22:05:24 np0005544966.novalocal sudo[6957]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:24 np0005544966.novalocal sudo[6997]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gpozdijdkjtwvkndddnnqreowxpnbsbg ; /usr/bin/python3' Dec 03 22:05:24 np0005544966.novalocal sudo[6997]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:25 np0005544966.novalocal python3[6999]: ansible-command Invoked with _raw_params=sudo dnf config-manager --enable crb _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 03 22:05:25 np0005544966.novalocal python3[6999]: ansible-command [WARNING] Consider using 'become', 'become_method', and 'become_user' rather than running sudo Dec 03 22:05:25 np0005544966.novalocal sudo[7000]: root : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/dnf config-manager --enable crb Dec 03 22:05:25 np0005544966.novalocal sudo[7000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:05:25 np0005544966.novalocal sudo[7000]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:25 np0005544966.novalocal sudo[6997]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:25 np0005544966.novalocal sudo[7011]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jfrcrpzpcffdkdroojgpdceswpiouhtf ; /usr/bin/python3' Dec 03 22:05:25 np0005544966.novalocal sudo[7011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:25 np0005544966.novalocal python3[7013]: ansible-systemd Invoked with name=firewalld state=stopped daemon_reload=False daemon_reexec=False no_block=False enabled=None force=None masked=None user=None scope=None Dec 03 22:05:25 np0005544966.novalocal sudo[7011]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:26 np0005544966.novalocal sudo[7022]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-eiajakqncjaquyedneksrupgcvpfbfav ; /usr/bin/python3' Dec 03 22:05:26 np0005544966.novalocal sudo[7022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:26 np0005544966.novalocal python3[7024]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 03 22:05:27 np0005544966.novalocal sudo[7022]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:27 np0005544966.novalocal sudo[7040]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-anpxtohlxykehiblkailqkrcpojqlnas ; /usr/bin/python3' Dec 03 22:05:27 np0005544966.novalocal sudo[7040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:27 np0005544966.novalocal python3[7042]: ansible-dnf Invoked with name=['tuned', 'subscription-manager'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 03 22:05:30 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:05:30 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:05:30 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:05:30 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:05:30 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:05:30 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:05:31 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:05:31 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:05:31 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:05:31 np0005544966.novalocal systemd-rc-local-generator[7114]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:05:31 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:05:33 np0005544966.novalocal sudo[7040]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:33 np0005544966.novalocal sudo[8357]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-auypbblibfavjwhshnoporsswnwiecym ; /usr/bin/python3' Dec 03 22:05:33 np0005544966.novalocal sudo[8357]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:33 np0005544966.novalocal python3[8387]: ansible-systemd Invoked with name=tuned enabled=True state=started daemon_reload=False daemon_reexec=False no_block=False force=None masked=None user=None scope=None Dec 03 22:05:33 np0005544966.novalocal systemd[1]: Starting Dynamic System Tuning Daemon... Dec 03 22:05:33 np0005544966.novalocal systemd[1]: Starting Authorization Manager... Dec 03 22:05:33 np0005544966.novalocal systemd[1]: Started Dynamic System Tuning Daemon. Dec 03 22:05:33 np0005544966.novalocal polkitd[9249]: Started polkitd version 0.117 Dec 03 22:05:33 np0005544966.novalocal sudo[8357]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:33 np0005544966.novalocal polkitd[9249]: Loading rules from directory /etc/polkit-1/rules.d Dec 03 22:05:33 np0005544966.novalocal polkitd[9249]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 03 22:05:33 np0005544966.novalocal polkitd[9249]: Finished loading, compiling and executing 2 rules Dec 03 22:05:33 np0005544966.novalocal systemd[1]: Started Authorization Manager. Dec 03 22:05:33 np0005544966.novalocal polkitd[9249]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 03 22:05:33 np0005544966.novalocal sudo[9415]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rcrxmeftjjxqdgnhqzhxykkhioyhfxbc ; /usr/bin/python3' Dec 03 22:05:33 np0005544966.novalocal sudo[9415]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:34 np0005544966.novalocal python3[9446]: ansible-command Invoked with _raw_params=tuned-adm active warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 03 22:05:34 np0005544966.novalocal sudo[9415]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:34 np0005544966.novalocal sudo[9852]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wddbgphhlggxigwxavdishbygldyedhn ; /usr/bin/python3' Dec 03 22:05:34 np0005544966.novalocal sudo[9852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:34 np0005544966.novalocal python3[9881]: ansible-command Invoked with _raw_params=tuned-adm profile throughput-performance warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 03 22:05:35 np0005544966.novalocal sudo[9852]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:35 np0005544966.novalocal sudo[11156]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rbkiwplpxrxtlpgfjrqoavxjhlqfdwsv ; /usr/bin/python3' Dec 03 22:05:35 np0005544966.novalocal sudo[11156]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:36 np0005544966.novalocal python3[11168]: ansible-file Invoked with path=/var/log/weirdo state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Dec 03 22:05:36 np0005544966.novalocal sudo[11156]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:36 np0005544966.novalocal sudo[11311]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ylsdlaonlahcswuitkciwlblapxwhgnn ; /usr/bin/python3' Dec 03 22:05:36 np0005544966.novalocal sudo[11311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:36 np0005544966.novalocal python3[11329]: ansible-file Invoked with path=/var/log/weirdo-project state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Dec 03 22:05:36 np0005544966.novalocal sudo[11311]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:36 np0005544966.novalocal sudo[11741]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-onkkvjmtnuuwlnktllakbwkrewcumtqh ; /usr/bin/python3' Dec 03 22:05:36 np0005544966.novalocal sudo[11741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:37 np0005544966.novalocal python3[11757]: ansible-get_url Invoked with url=http://trunk.rdoproject.org/centos9-dalmatian/puppet-ci-testing/delorean.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Dec 03 22:05:37 np0005544966.novalocal sudo[11741]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:37 np0005544966.novalocal sudo[12032]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nxkanrxasiiqctuhmybslrvuvfwghfij ; /usr/bin/python3' Dec 03 22:05:37 np0005544966.novalocal sudo[12032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:37 np0005544966.novalocal python3[12051]: ansible-get_url Invoked with url=https://trunk.rdoproject.org/centos9-dalmatian/delorean-deps.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Dec 03 22:05:37 np0005544966.novalocal sudo[12032]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:37 np0005544966.novalocal sudo[12301]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kmijrpqhnuqsenskuowofnwadvvlwsco ; /usr/bin/python3' Dec 03 22:05:37 np0005544966.novalocal sudo[12301]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:37 np0005544966.novalocal python3[12319]: ansible-command Invoked with _raw_params=if [ -f /etc/ci/mirror_info.sh ]; then source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|${NODEPOOL_RDO_PROXY}|g" /etc/yum.repos.d/*.repo # For CentOS8 sed -i -e "s|http://mirror.centos.org/centos|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo # For CentOS9 sed -i -e "s|http://mirror.stream.centos.org|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo fi _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 03 22:05:37 np0005544966.novalocal sudo[12301]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:37 np0005544966.novalocal sudo[12707]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-splfsvrdnnrvqjyrngnpzykegldtfovf ; /usr/bin/python3' Dec 03 22:05:37 np0005544966.novalocal sudo[12707]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:38 np0005544966.novalocal python3[12726]: ansible-command Invoked with _raw_params=repoquery --disablerepo='*' --enablerepo='delorean*' -a --qf '%{sourcerpm}'|sort -u|sed 's/.src.rpm//g' >/var/log/weirdo/rdo-trunk-deps-start.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 03 22:05:41 np0005544966.novalocal sudo[12707]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:41 np0005544966.novalocal sudo[14079]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rcrqwwjdnlhoyxkuhocrvycefcbjqshs ; /usr/bin/python3' Dec 03 22:05:41 np0005544966.novalocal sudo[14079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:41 np0005544966.novalocal python3[14090]: ansible-command Invoked with _raw_params=dnf clean all _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 03 22:05:41 np0005544966.novalocal python3[14090]: ansible-command [WARNING] Consider using the dnf module rather than running 'dnf'. If you need to use command because dnf is insufficient you can add 'warn: false' to this command task or set 'command_warnings=False' in ansible.cfg to get rid of this message. Dec 03 22:05:42 np0005544966.novalocal sudo[14079]: pam_unix(sudo:session): session closed for user root Dec 03 22:05:42 np0005544966.novalocal sudo[14364]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zluygrldjcomjtqzkqsnqvqlzijojegx ; /usr/bin/python3' Dec 03 22:05:42 np0005544966.novalocal sudo[14364]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:05:42 np0005544966.novalocal python3[14377]: ansible-dnf Invoked with name=['*'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 03 22:05:54 np0005544966.novalocal sshd-session[15322]: Received disconnect from 14.103.118.167 port 37492:11: Bye Bye [preauth] Dec 03 22:05:54 np0005544966.novalocal sshd-session[15322]: Disconnected from 14.103.118.167 port 37492 [preauth] Dec 03 22:06:08 np0005544966.novalocal systemd[3109]: Starting Mark boot as successful... Dec 03 22:06:09 np0005544966.novalocal systemd[3109]: Finished Mark boot as successful. Dec 03 22:06:09 np0005544966.novalocal sudo[14364]: pam_unix(sudo:session): session closed for user root Dec 03 22:06:09 np0005544966.novalocal sudo[23960]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bhetacmldslkaeyovvtkchpfjirqpjcs ; /usr/bin/python3' Dec 03 22:06:09 np0005544966.novalocal sudo[23960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:06:10 np0005544966.novalocal python3[23970]: ansible-dnf Invoked with name=['gettext', 'diffstat', 'doxygen', 'patch', 'patchutils', 'subversion', 'systemtap', 'git', 'wget', 'python3-libselinux', 'python3-setuptools', 'rubygem-rexml'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 03 22:06:21 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:06:21 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:06:21 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Consumed 1min 642ms CPU time. Dec 03 22:06:21 np0005544966.novalocal systemd[1]: run-r9bbeceea8cfc44ab83a23e5ecfaf6376.service: Deactivated successfully. Dec 03 22:06:27 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:06:27 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:06:44 np0005544966.novalocal sshd-session[28037]: Connection closed by 14.103.117.85 port 53142 [preauth] Dec 03 22:07:16 np0005544966.novalocal groupadd[44787]: group added to /etc/group: name=rtkit, GID=172 Dec 03 22:07:16 np0005544966.novalocal groupadd[44787]: group added to /etc/gshadow: name=rtkit Dec 03 22:07:16 np0005544966.novalocal groupadd[44787]: new group: name=rtkit, GID=172 Dec 03 22:07:16 np0005544966.novalocal useradd[44795]: new user: name=rtkit, UID=172, GID=172, home=/, shell=/sbin/nologin, from=none Dec 03 22:07:17 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:07:17 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:07:17 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:07:17 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:07:17 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:07:27 np0005544966.novalocal kernel: SELinux: Converting 451 SID table entries... Dec 03 22:07:27 np0005544966.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 03 22:07:27 np0005544966.novalocal kernel: SELinux: policy capability open_perms=1 Dec 03 22:07:27 np0005544966.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 03 22:07:27 np0005544966.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 03 22:07:27 np0005544966.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 03 22:07:27 np0005544966.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 03 22:07:27 np0005544966.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 03 22:07:35 np0005544966.novalocal groupadd[44868]: group added to /etc/group: name=geoclue, GID=993 Dec 03 22:07:35 np0005544966.novalocal groupadd[44868]: group added to /etc/gshadow: name=geoclue Dec 03 22:07:35 np0005544966.novalocal groupadd[44868]: new group: name=geoclue, GID=993 Dec 03 22:07:35 np0005544966.novalocal useradd[44875]: new user: name=geoclue, UID=993, GID=993, home=/var/lib/geoclue, shell=/sbin/nologin, from=none Dec 03 22:07:35 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:07:35 np0005544966.novalocal dbus-broker-launch[759]: avc: op=load_policy lsm=selinux seqno=2 res=1 Dec 03 22:07:35 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:07:35 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:07:35 np0005544966.novalocal polkitd[9249]: Reloading rules Dec 03 22:07:35 np0005544966.novalocal polkitd[9249]: Collecting garbage unconditionally... Dec 03 22:07:36 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Loading rules from directory /etc/polkit-1/rules.d Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Finished loading, compiling and executing 3 rules Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Reloading rules Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Collecting garbage unconditionally... Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Loading rules from directory /etc/polkit-1/rules.d Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Finished loading, compiling and executing 3 rules Dec 03 22:07:36 np0005544966.novalocal groupadd[44887]: group added to /etc/group: name=flatpak, GID=992 Dec 03 22:07:36 np0005544966.novalocal groupadd[44887]: group added to /etc/gshadow: name=flatpak Dec 03 22:07:36 np0005544966.novalocal groupadd[44887]: new group: name=flatpak, GID=992 Dec 03 22:07:36 np0005544966.novalocal useradd[44894]: new user: name=flatpak, UID=992, GID=992, home=/, shell=/usr/sbin/nologin, from=none Dec 03 22:07:36 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:07:36 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:07:36 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Reloading rules Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Collecting garbage unconditionally... Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Loading rules from directory /etc/polkit-1/rules.d Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Finished loading, compiling and executing 4 rules Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Reloading rules Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Collecting garbage unconditionally... Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Loading rules from directory /etc/polkit-1/rules.d Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 03 22:07:36 np0005544966.novalocal polkitd[9249]: Finished loading, compiling and executing 4 rules Dec 03 22:07:37 np0005544966.novalocal sshd-session[44819]: Invalid user bitrix from 45.78.222.160 port 60422 Dec 03 22:07:37 np0005544966.novalocal sshd[994]: Received signal 15; terminating. Dec 03 22:07:37 np0005544966.novalocal systemd[1]: Stopping OpenSSH server daemon... Dec 03 22:07:37 np0005544966.novalocal systemd[1]: sshd.service: Deactivated successfully. Dec 03 22:07:37 np0005544966.novalocal systemd[1]: sshd.service: Unit process 25372 (sshd-session) remains running after unit stopped. Dec 03 22:07:37 np0005544966.novalocal systemd[1]: sshd.service: Unit process 27979 (sshd-session) remains running after unit stopped. Dec 03 22:07:37 np0005544966.novalocal systemd[1]: sshd.service: Unit process 44819 (sshd-session) remains running after unit stopped. Dec 03 22:07:37 np0005544966.novalocal systemd[1]: sshd.service: Unit process 44820 (sshd-session) remains running after unit stopped. Dec 03 22:07:37 np0005544966.novalocal systemd[1]: Stopped OpenSSH server daemon. Dec 03 22:07:37 np0005544966.novalocal systemd[1]: Stopped target sshd-keygen.target. Dec 03 22:07:37 np0005544966.novalocal systemd[1]: Stopping sshd-keygen.target... Dec 03 22:07:37 np0005544966.novalocal systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 03 22:07:37 np0005544966.novalocal systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 03 22:07:37 np0005544966.novalocal systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 03 22:07:37 np0005544966.novalocal systemd[1]: Reached target sshd-keygen.target. Dec 03 22:07:37 np0005544966.novalocal systemd[1]: Starting OpenSSH server daemon... Dec 03 22:07:37 np0005544966.novalocal sshd[44935]: Server listening on 0.0.0.0 port 22. Dec 03 22:07:37 np0005544966.novalocal sshd[44935]: Server listening on :: port 22. Dec 03 22:07:37 np0005544966.novalocal systemd[1]: Started OpenSSH server daemon. Dec 03 22:07:38 np0005544966.novalocal sshd-session[44819]: Received disconnect from 45.78.222.160 port 60422:11: Bye Bye [preauth] Dec 03 22:07:38 np0005544966.novalocal sshd-session[44819]: Disconnected from invalid user bitrix 45.78.222.160 port 60422 [preauth] Dec 03 22:07:38 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:07:38 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:07:39 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:07:39 np0005544966.novalocal systemd-rc-local-generator[45027]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:07:39 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:07:41 np0005544966.novalocal sudo[23960]: pam_unix(sudo:session): session closed for user root Dec 03 22:07:42 np0005544966.novalocal sudo[47784]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-sukxesblihrelxnqqvpfhvdxujelskba ; /usr/bin/python3' Dec 03 22:07:42 np0005544966.novalocal sudo[47784]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:07:42 np0005544966.novalocal python3[47810]: ansible-dnf Invoked with name=['net-tools', 'lsof', 'sysstat', 'psmisc', 'dnf-utils'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 03 22:07:47 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:07:47 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:07:47 np0005544966.novalocal systemd-rc-local-generator[52557]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:07:47 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:07:48 np0005544966.novalocal sudo[47784]: pam_unix(sudo:session): session closed for user root Dec 03 22:07:48 np0005544966.novalocal sudo[53256]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-myjedvkzmhzrflvnssprfaxoymezoytz ; /usr/bin/python3' Dec 03 22:07:48 np0005544966.novalocal sudo[53256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:07:48 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:07:48 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:07:48 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Consumed 12.250s CPU time. Dec 03 22:07:48 np0005544966.novalocal systemd[1]: run-r4553eacef2d44a2a8e10f7cb0d44c9d1.service: Deactivated successfully. Dec 03 22:07:48 np0005544966.novalocal systemd[1]: run-rcfcaea9b2ee24a1daae872ebbed27da0.service: Deactivated successfully. Dec 03 22:07:48 np0005544966.novalocal python3[53262]: ansible-replace Invoked with dest=/usr/lib/systemd/system/sysstat-collect.timer regexp=10 replace=1 path=/usr/lib/systemd/system/sysstat-collect.timer backup=False encoding=utf-8 follow=False unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Dec 03 22:07:48 np0005544966.novalocal sudo[53256]: pam_unix(sudo:session): session closed for user root Dec 03 22:07:48 np0005544966.novalocal sudo[53282]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-slijregsrtmptkoiwpqcnxaypilngoun ; /usr/bin/python3' Dec 03 22:07:48 np0005544966.novalocal sudo[53282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:07:49 np0005544966.novalocal python3[53284]: ansible-systemd Invoked with name=sysstat enabled=True daemon_reload=True state=started daemon_reexec=False no_block=False force=None masked=None user=None scope=None Dec 03 22:07:49 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:07:49 np0005544966.novalocal systemd-rc-local-generator[53302]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:07:49 np0005544966.novalocal systemd[1]: Started Run system activity accounting tool every 1 minutes. Dec 03 22:07:49 np0005544966.novalocal systemd[1]: Started Generate summary of yesterday's process accounting. Dec 03 22:07:49 np0005544966.novalocal systemd[1]: Starting Resets System Activity Logs... Dec 03 22:07:49 np0005544966.novalocal systemd[1]: Finished Resets System Activity Logs. Dec 03 22:07:49 np0005544966.novalocal sudo[53282]: pam_unix(sudo:session): session closed for user root Dec 03 22:07:49 np0005544966.novalocal sudo[53331]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pwirkdkatpdrnrwkbugdhqtqgkyocixs ; /usr/bin/python3' Dec 03 22:07:49 np0005544966.novalocal sudo[53331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:07:49 np0005544966.novalocal python3[53333]: ansible-lineinfile Invoked with dest=/etc/hosts line=127.0.0.1 np0005544966 np0005544966.novalocal state=present path=/etc/hosts backrefs=False create=False backup=False firstmatch=False follow=False unsafe_writes=False regexp=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Dec 03 22:07:49 np0005544966.novalocal sudo[53331]: pam_unix(sudo:session): session closed for user root Dec 03 22:07:49 np0005544966.novalocal sudo[53340]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hkkjynybissyflzidgfzkliwvsquzgnt ; /usr/bin/python3' Dec 03 22:07:49 np0005544966.novalocal sudo[53340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:07:50 np0005544966.novalocal python3[53342]: ansible-dnf Invoked with name=['libxml2-devel', 'libxslt-devel', 'ruby-devel', 'rubygems', 'qemu-img'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 03 22:07:51 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:07:51 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:07:52 np0005544966.novalocal sudo[53340]: pam_unix(sudo:session): session closed for user root Dec 03 22:07:52 np0005544966.novalocal sudo[53697]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vrwbkgryndvyrqmszrgshpmajeitglab ; /usr/bin/python3' Dec 03 22:07:52 np0005544966.novalocal sudo[53697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:07:52 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:07:52 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:07:52 np0005544966.novalocal python3[53699]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Dec 03 22:07:52 np0005544966.novalocal python3[53699]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Dec 03 22:07:52 np0005544966.novalocal sudo[53697]: pam_unix(sudo:session): session closed for user root Dec 03 22:07:52 np0005544966.novalocal systemd[1]: run-r68fd48b4e7684429963be41fe86c43f5.service: Deactivated successfully. Dec 03 22:07:52 np0005544966.novalocal sudo[53711]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nztbephivpjylrrvenfgdhfydbkggbpw ; /usr/bin/python3' Dec 03 22:07:52 np0005544966.novalocal sudo[53711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:07:52 np0005544966.novalocal python3[53713]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Dec 03 22:07:52 np0005544966.novalocal python3[53713]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Dec 03 22:07:52 np0005544966.novalocal sudo[53711]: pam_unix(sudo:session): session closed for user root Dec 03 22:07:53 np0005544966.novalocal sudo[53722]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nlzwukrkivszjlkmcggoeedumxtjcgwv ; /usr/bin/python3' Dec 03 22:07:53 np0005544966.novalocal sudo[53722]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:07:53 np0005544966.novalocal python3[53724]: ansible-git Invoked with repo=https://review.opendev.org/openstack/puppet-openstack-integration dest=/tmp/puppet-openstack version=stable/2024.2 force=True remote=origin clone=True update=True verify_commit=False gpg_whitelist=[] accept_hostkey=False bare=False recursive=True track_submodules=False refspec=None reference=None depth=None key_file=None ssh_opts=None executable=None umask=None archive=None separate_git_dir=None Dec 03 22:07:54 np0005544966.novalocal sudo[53722]: pam_unix(sudo:session): session closed for user root Dec 03 22:07:54 np0005544966.novalocal sudo[53755]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bceywpbxypbofmnfphfdtzgjwndsorgt ; /usr/bin/python3' Dec 03 22:07:54 np0005544966.novalocal sudo[53755]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:07:54 np0005544966.novalocal python3[53757]: ansible-file Invoked with path=/tmp/puppet-openstack/.bundled_gems state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Dec 03 22:07:54 np0005544966.novalocal sudo[53755]: pam_unix(sudo:session): session closed for user root Dec 03 22:07:55 np0005544966.novalocal sudo[53779]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-egwcbslybzbsykebqfhjbuwubcrntykq ; /usr/bin/python3' Dec 03 22:07:55 np0005544966.novalocal sudo[53779]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:07:55 np0005544966.novalocal python3[53781]: ansible-file Invoked with path=/usr/zuul-env/bin/zuul-cloner state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Dec 03 22:07:55 np0005544966.novalocal sudo[53779]: pam_unix(sudo:session): session closed for user root Dec 03 22:07:55 np0005544966.novalocal sudo[53789]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bclveescvzzttxzxanqyjodlqtfdhvaj ; MANAGE_REPOS=false SCENARIO=scenario005 GEM_HOME=/tmp/puppet-openstack/.bundled_gems TEMPEST_VERSION=\'\' WORKSPACE=/var/log/weirdo-project TEMPEST_FROM_SOURCE=false PUPPETFILE_DIR=/etc/puppet/modules PUPPET_PKG=puppet PUPPET_ARGS=--modulepath=/usr/share/openstack-puppet/modules:/etc/puppet/modules SWAP_SIZE_GB=8 /usr/bin/python3' Dec 03 22:07:55 np0005544966.novalocal sudo[53789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:07:55 np0005544966.novalocal python3[53791]: ansible-command Invoked with chdir=/tmp/puppet-openstack _raw_params=./run_tests.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None creates=None removes=None stdin=None Dec 03 22:08:00 np0005544966.novalocal sshd-session[53823]: Received disconnect from 103.19.254.14 port 48524:11: Bye Bye [preauth] Dec 03 22:08:00 np0005544966.novalocal sshd-session[53823]: Disconnected from authenticating user root 103.19.254.14 port 48524 [preauth] Dec 03 22:08:10 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:08:10 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:08:10 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:08:40 np0005544966.novalocal kernel: Adding 8388604k swap on /swapfile. Priority:-2 extents:36 across:10326548k Dec 03 22:08:40 np0005544966.novalocal systemd[3109]: Created slice User Background Tasks Slice. Dec 03 22:08:40 np0005544966.novalocal systemd[3109]: Starting Cleanup of User's Temporary Files and Directories... Dec 03 22:08:40 np0005544966.novalocal systemd[3109]: Finished Cleanup of User's Temporary Files and Directories. Dec 03 22:08:47 np0005544966.novalocal groupadd[53860]: group added to /etc/group: name=puppet, GID=52 Dec 03 22:08:47 np0005544966.novalocal groupadd[53860]: group added to /etc/gshadow: name=puppet Dec 03 22:08:47 np0005544966.novalocal groupadd[53860]: new group: name=puppet, GID=52 Dec 03 22:08:48 np0005544966.novalocal useradd[53867]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Dec 03 22:08:49 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:08:49 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:08:49 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:08:49 np0005544966.novalocal systemd-rc-local-generator[53906]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:08:50 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:08:52 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:08:52 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:08:52 np0005544966.novalocal systemd[1]: run-rda6abc340b3f4ea7b5d81b3856bbbfb9.service: Deactivated successfully. Dec 03 22:09:03 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:09:03 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:09:03 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:09:16 np0005544966.novalocal sshd-session[54210]: Received disconnect from 45.78.222.175 port 42954:11: Bye Bye [preauth] Dec 03 22:09:16 np0005544966.novalocal sshd-session[54210]: Disconnected from authenticating user root 45.78.222.175 port 42954 [preauth] Dec 03 22:09:16 np0005544966.novalocal kernel: SELinux: Converting 483 SID table entries... Dec 03 22:09:16 np0005544966.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 03 22:09:16 np0005544966.novalocal kernel: SELinux: policy capability open_perms=1 Dec 03 22:09:16 np0005544966.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 03 22:09:16 np0005544966.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 03 22:09:16 np0005544966.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 03 22:09:16 np0005544966.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 03 22:09:16 np0005544966.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 03 22:09:18 np0005544966.novalocal dbus-broker-launch[759]: avc: op=load_policy lsm=selinux seqno=3 res=1 Dec 03 22:09:18 np0005544966.novalocal systemd[1]: Starting PCP Reboot Initialization Helper Service... Dec 03 22:09:18 np0005544966.novalocal systemd[1]: Finished PCP Reboot Initialization Helper Service. Dec 03 22:09:18 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:09:18 np0005544966.novalocal systemd-rc-local-generator[54715]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:09:26 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:09:26 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:09:28 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:09:28 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:09:29 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:09:29 np0005544966.novalocal systemd-rc-local-generator[54994]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:09:29 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:09:30 np0005544966.novalocal sshd-session[54900]: Received disconnect from 103.19.254.14 port 40908:11: Bye Bye [preauth] Dec 03 22:09:30 np0005544966.novalocal sshd-session[54900]: Disconnected from authenticating user root 103.19.254.14 port 40908 [preauth] Dec 03 22:09:35 np0005544966.novalocal dbus-broker-launch[759]: avc: op=setenforce lsm=selinux enforcing=0 res=1 Dec 03 22:09:35 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:09:35 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:09:35 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.014s CPU time. Dec 03 22:09:35 np0005544966.novalocal systemd[1]: run-rc94cf63040684a33a2e480a9a73ff6a4.service: Deactivated successfully. Dec 03 22:10:01 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:10:01 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:10:01 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:10:39 np0005544966.novalocal setsebool[61265]: The virt_use_nfs policy boolean was changed to 1 by root Dec 03 22:10:39 np0005544966.novalocal setsebool[61265]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Dec 03 22:10:50 np0005544966.novalocal kernel: SELinux: Converting 519 SID table entries... Dec 03 22:10:50 np0005544966.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 03 22:10:50 np0005544966.novalocal kernel: SELinux: policy capability open_perms=1 Dec 03 22:10:50 np0005544966.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 03 22:10:50 np0005544966.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 03 22:10:50 np0005544966.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 03 22:10:50 np0005544966.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 03 22:10:50 np0005544966.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 03 22:10:54 np0005544966.novalocal sshd-session[61294]: Invalid user redis from 103.19.254.14 port 35110 Dec 03 22:10:54 np0005544966.novalocal sshd-session[61294]: Received disconnect from 103.19.254.14 port 35110:11: Bye Bye [preauth] Dec 03 22:10:54 np0005544966.novalocal sshd-session[61294]: Disconnected from invalid user redis 103.19.254.14 port 35110 [preauth] Dec 03 22:11:01 np0005544966.novalocal sshd-session[61305]: Connection closed by 14.103.118.167 port 60806 [preauth] Dec 03 22:11:08 np0005544966.novalocal dbus-broker-launch[759]: avc: op=load_policy lsm=selinux seqno=5 res=1 Dec 03 22:11:08 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:11:08 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:11:08 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:11:38 np0005544966.novalocal sshd-session[61440]: Received disconnect from 80.94.93.119 port 15354:11: [preauth] Dec 03 22:11:38 np0005544966.novalocal sshd-session[61440]: Disconnected from authenticating user root 80.94.93.119 port 15354 [preauth] Dec 03 22:11:54 np0005544966.novalocal kernel: SELinux: Converting 2734 SID table entries... Dec 03 22:11:54 np0005544966.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 03 22:11:54 np0005544966.novalocal kernel: SELinux: policy capability open_perms=1 Dec 03 22:11:54 np0005544966.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 03 22:11:54 np0005544966.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 03 22:11:54 np0005544966.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 03 22:11:54 np0005544966.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 03 22:11:54 np0005544966.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 03 22:12:08 np0005544966.novalocal dbus-broker-launch[759]: avc: op=load_policy lsm=selinux seqno=7 res=1 Dec 03 22:12:08 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:12:08 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:12:08 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:12:16 np0005544966.novalocal sshd-session[62225]: Invalid user ts2 from 103.19.254.14 port 59368 Dec 03 22:12:16 np0005544966.novalocal sshd-session[62225]: Received disconnect from 103.19.254.14 port 59368:11: Bye Bye [preauth] Dec 03 22:12:16 np0005544966.novalocal sshd-session[62225]: Disconnected from invalid user ts2 103.19.254.14 port 59368 [preauth] Dec 03 22:12:31 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:12:31 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:12:31 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:12:31 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:12:31 np0005544966.novalocal systemd[1]: run-r0c6ca8342bf543d286872e0d03f6c5ba.service: Deactivated successfully. Dec 03 22:12:40 np0005544966.novalocal sshd-session[62319]: Invalid user tibero from 14.103.118.167 port 54728 Dec 03 22:12:41 np0005544966.novalocal sshd-session[62319]: Received disconnect from 14.103.118.167 port 54728:11: Bye Bye [preauth] Dec 03 22:12:41 np0005544966.novalocal sshd-session[62319]: Disconnected from invalid user tibero 14.103.118.167 port 54728 [preauth] Dec 03 22:12:43 np0005544966.novalocal kernel: SELinux: Converting 2734 SID table entries... Dec 03 22:12:43 np0005544966.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 03 22:12:43 np0005544966.novalocal kernel: SELinux: policy capability open_perms=1 Dec 03 22:12:43 np0005544966.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 03 22:12:43 np0005544966.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 03 22:12:43 np0005544966.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 03 22:12:43 np0005544966.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 03 22:12:43 np0005544966.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 03 22:12:43 np0005544966.novalocal groupadd[62329]: group added to /etc/group: name=memcached, GID=989 Dec 03 22:12:43 np0005544966.novalocal groupadd[62329]: group added to /etc/gshadow: name=memcached Dec 03 22:12:43 np0005544966.novalocal groupadd[62329]: new group: name=memcached, GID=989 Dec 03 22:12:43 np0005544966.novalocal useradd[62336]: new user: name=memcached, UID=989, GID=989, home=/, shell=/sbin/nologin, from=none Dec 03 22:12:45 np0005544966.novalocal dbus-broker-launch[759]: avc: op=load_policy lsm=selinux seqno=8 res=1 Dec 03 22:12:45 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:12:45 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:12:45 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:12:45 np0005544966.novalocal systemd-rc-local-generator[62771]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:12:45 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:12:45 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:12:45 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:12:45 np0005544966.novalocal systemd[1]: run-rbccee15ad42a4da289bcd296e4bb3c42.service: Deactivated successfully. Dec 03 22:12:46 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:12:46 np0005544966.novalocal systemd-rc-local-generator[62942]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:12:46 np0005544966.novalocal systemd[1]: Started memcached daemon. Dec 03 22:12:46 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:12:46 np0005544966.novalocal systemd-rc-local-generator[62988]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:12:46 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:12:47 np0005544966.novalocal systemd-rc-local-generator[63018]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:12:50 np0005544966.novalocal groupadd[63034]: group added to /etc/group: name=epmd, GID=988 Dec 03 22:12:50 np0005544966.novalocal groupadd[63034]: group added to /etc/gshadow: name=epmd Dec 03 22:12:50 np0005544966.novalocal groupadd[63034]: new group: name=epmd, GID=988 Dec 03 22:12:50 np0005544966.novalocal useradd[63041]: new user: name=epmd, UID=988, GID=988, home=/dev/null, shell=/sbin/nologin, from=none Dec 03 22:12:50 np0005544966.novalocal groupadd[63050]: group added to /etc/group: name=rabbitmq, GID=987 Dec 03 22:12:50 np0005544966.novalocal groupadd[63050]: group added to /etc/gshadow: name=rabbitmq Dec 03 22:12:50 np0005544966.novalocal groupadd[63050]: new group: name=rabbitmq, GID=987 Dec 03 22:12:50 np0005544966.novalocal useradd[63057]: new user: name=rabbitmq, UID=987, GID=987, home=/var/lib/rabbitmq, shell=/sbin/nologin, from=none Dec 03 22:12:51 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:12:52 np0005544966.novalocal systemd-rc-local-generator[63086]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:12:52 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:12:52 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:12:52 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:12:52 np0005544966.novalocal systemd-rc-local-generator[63121]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:12:53 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:12:53 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:12:53 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:12:53 np0005544966.novalocal systemd[1]: run-rf35f10e682d8418face82e562a98575b.service: Deactivated successfully. Dec 03 22:12:56 np0005544966.novalocal runuser[63942]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:12:57 np0005544966.novalocal runuser[63942]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:13:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:13:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:13:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:13:13 np0005544966.novalocal kernel: SELinux: Converting 2740 SID table entries... Dec 03 22:13:13 np0005544966.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 03 22:13:13 np0005544966.novalocal kernel: SELinux: policy capability open_perms=1 Dec 03 22:13:13 np0005544966.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 03 22:13:13 np0005544966.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 03 22:13:13 np0005544966.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 03 22:13:13 np0005544966.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 03 22:13:13 np0005544966.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 03 22:13:13 np0005544966.novalocal groupadd[64454]: group added to /etc/group: name=mysql, GID=27 Dec 03 22:13:13 np0005544966.novalocal groupadd[64454]: group added to /etc/gshadow: name=mysql Dec 03 22:13:13 np0005544966.novalocal groupadd[64454]: new group: name=mysql, GID=27 Dec 03 22:13:13 np0005544966.novalocal useradd[64460]: new user: name=mysql, UID=27, GID=27, home=/var/lib/mysql, shell=/sbin/nologin, from=none Dec 03 22:13:15 np0005544966.novalocal dbus-broker-launch[759]: avc: op=load_policy lsm=selinux seqno=9 res=1 Dec 03 22:13:15 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:13:15 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:13:15 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:13:15 np0005544966.novalocal systemd-rc-local-generator[64936]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:13:15 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:13:19 np0005544966.novalocal groupadd[67369]: group added to /etc/group: name=redis, GID=986 Dec 03 22:13:19 np0005544966.novalocal groupadd[67369]: group added to /etc/gshadow: name=redis Dec 03 22:13:19 np0005544966.novalocal groupadd[67369]: new group: name=redis, GID=986 Dec 03 22:13:19 np0005544966.novalocal useradd[67407]: new user: name=redis, UID=986, GID=986, home=/var/lib/redis, shell=/sbin/nologin, from=none Dec 03 22:13:19 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:13:19 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:13:19 np0005544966.novalocal systemd-rc-local-generator[67774]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:13:20 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:13:20 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:13:20 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:13:20 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Consumed 5.986s CPU time. Dec 03 22:13:20 np0005544966.novalocal systemd[1]: run-r1c468e5bb5f24f41912120833891f66d.service: Deactivated successfully. Dec 03 22:13:20 np0005544966.novalocal systemd[1]: run-r61f7ca9a29c7470fa5c8e40396c8266f.service: Deactivated successfully. Dec 03 22:13:31 np0005544966.novalocal kernel: SELinux: Converting 2743 SID table entries... Dec 03 22:13:31 np0005544966.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 03 22:13:31 np0005544966.novalocal kernel: SELinux: policy capability open_perms=1 Dec 03 22:13:31 np0005544966.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 03 22:13:31 np0005544966.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 03 22:13:31 np0005544966.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 03 22:13:31 np0005544966.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 03 22:13:31 np0005544966.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 03 22:13:31 np0005544966.novalocal groupadd[68313]: group added to /etc/group: name=unbound, GID=985 Dec 03 22:13:31 np0005544966.novalocal groupadd[68313]: group added to /etc/gshadow: name=unbound Dec 03 22:13:31 np0005544966.novalocal groupadd[68313]: new group: name=unbound, GID=985 Dec 03 22:13:31 np0005544966.novalocal useradd[68320]: new user: name=unbound, UID=985, GID=985, home=/var/lib/unbound, shell=/sbin/nologin, from=none Dec 03 22:13:32 np0005544966.novalocal dbus-broker-launch[759]: avc: op=load_policy lsm=selinux seqno=10 res=1 Dec 03 22:13:32 np0005544966.novalocal systemd[1]: Started daily update of the root trust anchor for DNSSEC. Dec 03 22:13:32 np0005544966.novalocal groupadd[68333]: group added to /etc/group: name=openvswitch, GID=984 Dec 03 22:13:32 np0005544966.novalocal groupadd[68333]: group added to /etc/gshadow: name=openvswitch Dec 03 22:13:32 np0005544966.novalocal groupadd[68333]: new group: name=openvswitch, GID=984 Dec 03 22:13:32 np0005544966.novalocal useradd[68340]: new user: name=openvswitch, UID=984, GID=984, home=/, shell=/sbin/nologin, from=none Dec 03 22:13:32 np0005544966.novalocal groupadd[68348]: group added to /etc/group: name=hugetlbfs, GID=983 Dec 03 22:13:32 np0005544966.novalocal groupadd[68348]: group added to /etc/gshadow: name=hugetlbfs Dec 03 22:13:32 np0005544966.novalocal groupadd[68348]: new group: name=hugetlbfs, GID=983 Dec 03 22:13:32 np0005544966.novalocal usermod[68356]: add 'openvswitch' to group 'hugetlbfs' Dec 03 22:13:32 np0005544966.novalocal usermod[68356]: add 'openvswitch' to shadow group 'hugetlbfs' Dec 03 22:13:34 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:13:34 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:13:34 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:13:34 np0005544966.novalocal systemd-sysv-generator[68838]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:13:34 np0005544966.novalocal systemd-rc-local-generator[68835]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:13:34 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:13:35 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:13:35 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:13:35 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.298s CPU time. Dec 03 22:13:35 np0005544966.novalocal systemd[1]: run-r323070a4820a4f04aee1d051d8664603.service: Deactivated successfully. Dec 03 22:13:35 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:13:35 np0005544966.novalocal systemd-sysv-generator[69403]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:13:35 np0005544966.novalocal systemd-rc-local-generator[69400]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:13:36 np0005544966.novalocal systemd[1]: Starting Open vSwitch Database Unit... Dec 03 22:13:36 np0005544966.novalocal chown[69411]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Dec 03 22:13:36 np0005544966.novalocal ovs-ctl[69416]: /etc/openvswitch/conf.db does not exist ... (warning). Dec 03 22:13:36 np0005544966.novalocal ovs-ctl[69416]: Creating empty database /etc/openvswitch/conf.db [ OK ] Dec 03 22:13:36 np0005544966.novalocal ovs-ctl[69416]: Starting ovsdb-server [ OK ] Dec 03 22:13:36 np0005544966.novalocal ovs-vsctl[69465]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Dec 03 22:13:36 np0005544966.novalocal ovs-vsctl[69484]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.5-115.el9s "external-ids:system-id=\"97a912a2-1c6c-447a-a555-c43c312ffe93\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"centos\"" "system-version=\"9\"" Dec 03 22:13:36 np0005544966.novalocal ovs-ctl[69416]: Configuring Open vSwitch system IDs [ OK ] Dec 03 22:13:36 np0005544966.novalocal ovs-vsctl[69489]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005544966 Dec 03 22:13:36 np0005544966.novalocal ovs-ctl[69416]: Enabling remote OVSDB managers [ OK ] Dec 03 22:13:36 np0005544966.novalocal systemd[1]: Started Open vSwitch Database Unit. Dec 03 22:13:36 np0005544966.novalocal systemd[1]: Starting Open vSwitch Delete Transient Ports... Dec 03 22:13:36 np0005544966.novalocal systemd[1]: Finished Open vSwitch Delete Transient Ports. Dec 03 22:13:36 np0005544966.novalocal systemd[1]: Starting Open vSwitch Forwarding Unit... Dec 03 22:13:36 np0005544966.novalocal kernel: openvswitch: Open vSwitch switching datapath Dec 03 22:13:36 np0005544966.novalocal ovs-ctl[69534]: Inserting openvswitch module [ OK ] Dec 03 22:13:36 np0005544966.novalocal ovs-ctl[69503]: Starting ovs-vswitchd [ OK ] Dec 03 22:13:36 np0005544966.novalocal ovs-vsctl[69551]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005544966 Dec 03 22:13:36 np0005544966.novalocal ovs-ctl[69503]: Enabling remote OVSDB managers [ OK ] Dec 03 22:13:36 np0005544966.novalocal systemd[1]: Started Open vSwitch Forwarding Unit. Dec 03 22:13:36 np0005544966.novalocal systemd[1]: Starting Open vSwitch... Dec 03 22:13:36 np0005544966.novalocal systemd[1]: Finished Open vSwitch. Dec 03 22:13:37 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:13:37 np0005544966.novalocal systemd-rc-local-generator[69575]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:13:37 np0005544966.novalocal systemd-sysv-generator[69578]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:13:37 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:13:37 np0005544966.novalocal systemd-rc-local-generator[69606]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:13:37 np0005544966.novalocal systemd-sysv-generator[69610]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:13:39 np0005544966.novalocal sshd-session[69620]: Invalid user testing from 103.19.254.14 port 60388 Dec 03 22:13:39 np0005544966.novalocal sshd-session[69620]: Received disconnect from 103.19.254.14 port 60388:11: Bye Bye [preauth] Dec 03 22:13:39 np0005544966.novalocal sshd-session[69620]: Disconnected from invalid user testing 103.19.254.14 port 60388 [preauth] Dec 03 22:13:39 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:13:39 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:13:39 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:13:39 np0005544966.novalocal systemd-rc-local-generator[69665]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:13:39 np0005544966.novalocal systemd-sysv-generator[69669]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:13:40 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:13:40 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:13:40 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:13:40 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.078s CPU time. Dec 03 22:13:40 np0005544966.novalocal systemd[1]: run-rc40e4c4701e54a0397d33cd4f7ce9c61.service: Deactivated successfully. Dec 03 22:13:43 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:13:43 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:13:43 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:13:43 np0005544966.novalocal systemd-rc-local-generator[70089]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:13:43 np0005544966.novalocal systemd-sysv-generator[70092]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:13:43 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:13:43 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:13:43 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:13:43 np0005544966.novalocal systemd[1]: run-rbd94fc85822f46f3b043e580a7595f83.service: Deactivated successfully. Dec 03 22:13:44 np0005544966.novalocal ovs-vsctl[70162]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:[::1]:6642 Dec 03 22:13:44 np0005544966.novalocal ovs-vsctl[70164]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Dec 03 22:13:44 np0005544966.novalocal ovs-vsctl[70166]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=::1 Dec 03 22:13:44 np0005544966.novalocal ovs-vsctl[70169]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005544966.novalocal Dec 03 22:13:44 np0005544966.novalocal ovs-vsctl[70171]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Dec 03 22:13:44 np0005544966.novalocal ovs-vsctl[70173]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Dec 03 22:13:45 np0005544966.novalocal ovs-vsctl[70175]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-openflow-probe-interval=60 Dec 03 22:13:45 np0005544966.novalocal ovs-vsctl[70177]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=false Dec 03 22:13:45 np0005544966.novalocal ovs-vsctl[70179]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Dec 03 22:13:45 np0005544966.novalocal ovs-vsctl[70181]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-cms-options=enable-chassis-as-gw Dec 03 22:13:45 np0005544966.novalocal ovs-vsctl[70185]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=external:br-ex Dec 03 22:13:45 np0005544966.novalocal ovs-vsctl[70189]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Dec 03 22:13:55 np0005544966.novalocal groupadd[70209]: group added to /etc/group: name=keystone, GID=163 Dec 03 22:13:55 np0005544966.novalocal groupadd[70209]: group added to /etc/gshadow: name=keystone Dec 03 22:13:56 np0005544966.novalocal groupadd[70209]: new group: name=keystone, GID=163 Dec 03 22:13:56 np0005544966.novalocal useradd[70216]: new user: name=keystone, UID=163, GID=163, home=/var/lib/keystone, shell=/sbin/nologin, from=none Dec 03 22:13:56 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:13:56 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:13:57 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:13:57 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:13:57 np0005544966.novalocal systemd[1]: run-r99475f9512ac41829d89fd172576de32.service: Deactivated successfully. Dec 03 22:14:03 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:14:03 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:14:03 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:14:03 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:14:03 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:14:03 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:14:03 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:14:04 np0005544966.novalocal systemd[1]: run-rc838a4dfa2dd4b6ab5c545aa9a8bb41b.service: Deactivated successfully. Dec 03 22:14:11 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:14:11 np0005544966.novalocal systemd-rc-local-generator[70923]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:14:11 np0005544966.novalocal systemd-sysv-generator[70928]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:14:11 np0005544966.novalocal systemd[1]: Listening on Device-mapper event daemon FIFOs. Dec 03 22:14:11 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:14:12 np0005544966.novalocal systemd-sysv-generator[70960]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:14:12 np0005544966.novalocal systemd-rc-local-generator[70956]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:14:12 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:14:12 np0005544966.novalocal systemd-rc-local-generator[70987]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:14:12 np0005544966.novalocal systemd-sysv-generator[70990]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:14:12 np0005544966.novalocal systemd-logind[783]: Watching system buttons on /dev/input/event0 (Power Button) Dec 03 22:14:12 np0005544966.novalocal systemd-logind[783]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Dec 03 22:14:14 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:14:14 np0005544966.novalocal systemd-rc-local-generator[71085]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:14:14 np0005544966.novalocal systemd-sysv-generator[71089]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:14:15 np0005544966.novalocal systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Dec 03 22:14:15 np0005544966.novalocal systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Dec 03 22:14:15 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:14:15 np0005544966.novalocal systemd-rc-local-generator[71118]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:14:15 np0005544966.novalocal systemd-sysv-generator[71123]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:14:15 np0005544966.novalocal systemd[1]: Listening on LVM2 poll daemon socket. Dec 03 22:14:17 np0005544966.novalocal groupadd[71133]: group added to /etc/group: name=cinder, GID=165 Dec 03 22:14:17 np0005544966.novalocal groupadd[71133]: group added to /etc/gshadow: name=cinder Dec 03 22:14:17 np0005544966.novalocal groupadd[71133]: new group: name=cinder, GID=165 Dec 03 22:14:17 np0005544966.novalocal useradd[71140]: new user: name=cinder, UID=165, GID=165, home=/var/lib/cinder, shell=/sbin/nologin, from=none Dec 03 22:14:17 np0005544966.novalocal useradd[71140]: add 'cinder' to group 'nobody' Dec 03 22:14:17 np0005544966.novalocal useradd[71140]: add 'cinder' to group 'cinder' Dec 03 22:14:17 np0005544966.novalocal useradd[71140]: add 'cinder' to shadow group 'nobody' Dec 03 22:14:17 np0005544966.novalocal useradd[71140]: add 'cinder' to shadow group 'cinder' Dec 03 22:14:18 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:14:18 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:14:18 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:14:18 np0005544966.novalocal systemd-rc-local-generator[71184]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:14:18 np0005544966.novalocal systemd-sysv-generator[71188]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:14:18 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:14:21 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:14:21 np0005544966.novalocal systemd-rc-local-generator[73253]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:14:21 np0005544966.novalocal systemd-sysv-generator[73258]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:14:21 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:14:21 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:14:21 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Consumed 3.240s CPU time. Dec 03 22:14:21 np0005544966.novalocal systemd[1]: run-re6d7bfff020d48bf9a2cef9a05853478.service: Deactivated successfully. Dec 03 22:14:21 np0005544966.novalocal systemd[1]: One time configuration for iscsi.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/iscsi/initiatorname.iscsi). Dec 03 22:14:21 np0005544966.novalocal systemd[1]: Starting Open-iSCSI... Dec 03 22:14:21 np0005544966.novalocal kernel: Loading iSCSI transport class v2.0-870. Dec 03 22:14:21 np0005544966.novalocal systemd[1]: Started Open-iSCSI. Dec 03 22:14:21 np0005544966.novalocal systemd[1]: Starting Logout off all iSCSI sessions on shutdown... Dec 03 22:14:21 np0005544966.novalocal systemd[1]: Finished Logout off all iSCSI sessions on shutdown. Dec 03 22:14:21 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:14:21 np0005544966.novalocal systemd-sysv-generator[73302]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:14:21 np0005544966.novalocal systemd-rc-local-generator[73298]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:14:21 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:14:22 np0005544966.novalocal systemd-sysv-generator[73331]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:14:22 np0005544966.novalocal systemd-rc-local-generator[73328]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:14:24 np0005544966.novalocal groupadd[73346]: group added to /etc/group: name=glance, GID=161 Dec 03 22:14:24 np0005544966.novalocal groupadd[73346]: group added to /etc/gshadow: name=glance Dec 03 22:14:24 np0005544966.novalocal groupadd[73346]: new group: name=glance, GID=161 Dec 03 22:14:24 np0005544966.novalocal useradd[73353]: new user: name=glance, UID=161, GID=161, home=/var/lib/glance, shell=/sbin/nologin, from=none Dec 03 22:14:24 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:14:25 np0005544966.novalocal systemd-sysv-generator[73392]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:14:25 np0005544966.novalocal systemd-rc-local-generator[73388]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:14:25 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:14:28 np0005544966.novalocal kernel: SELinux: Converting 2764 SID table entries... Dec 03 22:14:28 np0005544966.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 03 22:14:28 np0005544966.novalocal kernel: SELinux: policy capability open_perms=1 Dec 03 22:14:28 np0005544966.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 03 22:14:28 np0005544966.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 03 22:14:28 np0005544966.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 03 22:14:28 np0005544966.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 03 22:14:28 np0005544966.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 03 22:14:28 np0005544966.novalocal setsebool[73401]: The os_neutron_dac_override policy boolean was changed to on by root Dec 03 22:14:28 np0005544966.novalocal ovs-vsctl[73408]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl add-br br-ex Dec 03 22:14:28 np0005544966.novalocal kernel: ovs-system: entered promiscuous mode Dec 03 22:14:28 np0005544966.novalocal NetworkManager[846]: [1764818068.4065] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Dec 03 22:14:28 np0005544966.novalocal NetworkManager[846]: [1764818068.4087] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/3) Dec 03 22:14:28 np0005544966.novalocal kernel: Timeout policy base is empty Dec 03 22:14:28 np0005544966.novalocal dbus-broker-launch[759]: avc: op=load_policy lsm=selinux seqno=12 res=1 Dec 03 22:14:28 np0005544966.novalocal kernel: br-ex: entered promiscuous mode Dec 03 22:14:28 np0005544966.novalocal NetworkManager[846]: [1764818068.4614] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Dec 03 22:14:28 np0005544966.novalocal NetworkManager[846]: [1764818068.4623] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Dec 03 22:14:28 np0005544966.novalocal systemd-udevd[73424]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:14:28 np0005544966.novalocal systemd-udevd[73426]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:14:28 np0005544966.novalocal NetworkManager[846]: [1764818068.5294] device (br-ex): carrier: link connected Dec 03 22:14:28 np0005544966.novalocal NetworkManager[846]: [1764818068.5739] manager: (loop1): new Dummy device (/org/freedesktop/NetworkManager/Devices/5) Dec 03 22:14:28 np0005544966.novalocal systemd-udevd[73425]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:14:28 np0005544966.novalocal NetworkManager[846]: [1764818068.8238] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73445 uid=0 result="success" Dec 03 22:14:28 np0005544966.novalocal ifdown[73446]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Dec 03 22:14:28 np0005544966.novalocal ifdown[73447]: 'network-scripts' will be removed from distribution in near future. Dec 03 22:14:28 np0005544966.novalocal ifdown[73448]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 03 22:14:28 np0005544966.novalocal NetworkManager[846]: [1764818068.8686] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73454 uid=0 result="success" Dec 03 22:14:28 np0005544966.novalocal NetworkManager[846]: [1764818068.9200] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73462 uid=0 result="success" Dec 03 22:14:28 np0005544966.novalocal NetworkManager[846]: [1764818068.9587] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73471 uid=0 result="success" Dec 03 22:14:29 np0005544966.novalocal NetworkManager[846]: [1764818069.0617] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73494 uid=0 result="success" Dec 03 22:14:29 np0005544966.novalocal ovs-vsctl[73499]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-br br-ex Dec 03 22:14:29 np0005544966.novalocal kernel: br-ex: left promiscuous mode Dec 03 22:14:29 np0005544966.novalocal kernel: ovs-system: left promiscuous mode Dec 03 22:14:29 np0005544966.novalocal NetworkManager[846]: [1764818069.1701] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73517 uid=0 result="success" Dec 03 22:14:29 np0005544966.novalocal ifdown[73521]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Dec 03 22:14:29 np0005544966.novalocal ifdown[73522]: 'network-scripts' will be removed from distribution in near future. Dec 03 22:14:29 np0005544966.novalocal ifdown[73523]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 03 22:14:29 np0005544966.novalocal NetworkManager[846]: [1764818069.2202] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73529 uid=0 result="success" Dec 03 22:14:29 np0005544966.novalocal NetworkManager[846]: [1764818069.2757] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73540 uid=0 result="success" Dec 03 22:14:29 np0005544966.novalocal NetworkManager[846]: [1764818069.3242] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73552 uid=0 result="success" Dec 03 22:14:29 np0005544966.novalocal NetworkManager[846]: [1764818069.4343] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73578 uid=0 result="success" Dec 03 22:14:29 np0005544966.novalocal ovs-vsctl[73586]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.0140] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73593 uid=0 result="success" Dec 03 22:14:30 np0005544966.novalocal ifup[73597]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 03 22:14:30 np0005544966.novalocal ifup[73598]: 'network-scripts' will be removed from distribution in near future. Dec 03 22:14:30 np0005544966.novalocal ifup[73599]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.0597] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73605 uid=0 result="success" Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.1151] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73617 uid=0 result="success" Dec 03 22:14:30 np0005544966.novalocal ifup[73618]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 03 22:14:30 np0005544966.novalocal ifup[73619]: 'network-scripts' will be removed from distribution in near future. Dec 03 22:14:30 np0005544966.novalocal ifup[73620]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.1453] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73626 uid=0 result="success" Dec 03 22:14:30 np0005544966.novalocal ovs-vsctl[73628]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Dec 03 22:14:30 np0005544966.novalocal kernel: ovs-system: entered promiscuous mode Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.1687] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.1702] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Dec 03 22:14:30 np0005544966.novalocal kernel: No such timeout policy "ovs_test_tp" Dec 03 22:14:30 np0005544966.novalocal kernel: br-ex: entered promiscuous mode Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.1784] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.1796] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.2108] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73650 uid=0 result="success" Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.2555] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73661 uid=0 result="success" Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.3228] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73679 uid=0 result="success" Dec 03 22:14:30 np0005544966.novalocal ovs-vsctl[73699]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 -- add-port br-ex loop1 Dec 03 22:14:30 np0005544966.novalocal kernel: loop1: entered promiscuous mode Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.3954] device (loop1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.3970] device (loop1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.4298] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73706 uid=0 result="success" Dec 03 22:14:30 np0005544966.novalocal ifup[73707]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 03 22:14:30 np0005544966.novalocal ifup[73708]: 'network-scripts' will be removed from distribution in near future. Dec 03 22:14:30 np0005544966.novalocal ifup[73709]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.4693] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73715 uid=0 result="success" Dec 03 22:14:30 np0005544966.novalocal ovs-vsctl[73719]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.5548] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73726 uid=0 result="success" Dec 03 22:14:30 np0005544966.novalocal ifup[73727]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 03 22:14:30 np0005544966.novalocal ifup[73728]: 'network-scripts' will be removed from distribution in near future. Dec 03 22:14:30 np0005544966.novalocal ifup[73729]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.5963] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73735 uid=0 result="success" Dec 03 22:14:30 np0005544966.novalocal ovs-vsctl[73739]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Dec 03 22:14:30 np0005544966.novalocal NetworkManager[846]: [1764818070.7032] device (br-ex): carrier: link connected Dec 03 22:14:36 np0005544966.novalocal groupadd[73767]: group added to /etc/group: name=radvd, GID=75 Dec 03 22:14:36 np0005544966.novalocal groupadd[73767]: group added to /etc/gshadow: name=radvd Dec 03 22:14:36 np0005544966.novalocal groupadd[73767]: new group: name=radvd, GID=75 Dec 03 22:14:36 np0005544966.novalocal useradd[73776]: new user: name=radvd, UID=75, GID=75, home=/, shell=/sbin/nologin, from=none Dec 03 22:14:36 np0005544966.novalocal groupadd[73791]: group added to /etc/group: name=haproxy, GID=982 Dec 03 22:14:36 np0005544966.novalocal groupadd[73791]: group added to /etc/gshadow: name=haproxy Dec 03 22:14:36 np0005544966.novalocal groupadd[73791]: new group: name=haproxy, GID=982 Dec 03 22:14:36 np0005544966.novalocal useradd[73798]: new user: name=haproxy, UID=983, GID=982, home=/var/lib/haproxy, shell=/usr/sbin/nologin, from=none Dec 03 22:14:36 np0005544966.novalocal groupadd[73810]: group added to /etc/group: name=dnsmasq, GID=981 Dec 03 22:14:36 np0005544966.novalocal groupadd[73810]: group added to /etc/gshadow: name=dnsmasq Dec 03 22:14:36 np0005544966.novalocal groupadd[73810]: new group: name=dnsmasq, GID=981 Dec 03 22:14:36 np0005544966.novalocal useradd[73817]: new user: name=dnsmasq, UID=982, GID=981, home=/var/lib/dnsmasq, shell=/usr/sbin/nologin, from=none Dec 03 22:14:36 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:14:37 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:14:39 np0005544966.novalocal groupadd[73829]: group added to /etc/group: name=neutron, GID=980 Dec 03 22:14:39 np0005544966.novalocal groupadd[73829]: group added to /etc/gshadow: name=neutron Dec 03 22:14:39 np0005544966.novalocal groupadd[73829]: new group: name=neutron, GID=980 Dec 03 22:14:39 np0005544966.novalocal useradd[73836]: new user: name=neutron, UID=981, GID=980, home=/var/lib/neutron, shell=/sbin/nologin, from=none Dec 03 22:14:40 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:14:40 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:14:40 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:14:40 np0005544966.novalocal systemd-sysv-generator[73894]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:14:40 np0005544966.novalocal systemd-rc-local-generator[73891]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:14:41 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:14:41 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:14:41 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:14:41 np0005544966.novalocal systemd[1]: run-r3ffc49ef4e714fafbdec660c09b7231d.service: Deactivated successfully. Dec 03 22:14:46 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:14:46 np0005544966.novalocal systemd-sysv-generator[74482]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:14:46 np0005544966.novalocal systemd-rc-local-generator[74479]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:14:46 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:14:47 np0005544966.novalocal ovs-vsctl[74493]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set-manager ptcp:6640:127.0.0.1 Dec 03 22:14:49 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:14:49 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:14:49 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:14:49 np0005544966.novalocal systemd-rc-local-generator[74531]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:14:49 np0005544966.novalocal systemd-sysv-generator[74535]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:14:49 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:14:50 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:14:50 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:14:50 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.055s CPU time. Dec 03 22:14:50 np0005544966.novalocal systemd[1]: run-r3f88f7ef62e44374a276eb381e525220.service: Deactivated successfully. Dec 03 22:14:52 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:14:52 np0005544966.novalocal systemd-rc-local-generator[74962]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:14:52 np0005544966.novalocal systemd-sysv-generator[74966]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:14:52 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:15:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:15:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:15:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:15:00 np0005544966.novalocal groupadd[74988]: group added to /etc/group: name=placement, GID=979 Dec 03 22:15:00 np0005544966.novalocal groupadd[74988]: group added to /etc/gshadow: name=placement Dec 03 22:15:00 np0005544966.novalocal groupadd[74988]: new group: name=placement, GID=979 Dec 03 22:15:00 np0005544966.novalocal useradd[74996]: new user: name=placement, UID=980, GID=979, home=/, shell=/bin/bash, from=none Dec 03 22:15:02 np0005544966.novalocal sshd-session[75006]: Invalid user username from 103.19.254.14 port 34532 Dec 03 22:15:03 np0005544966.novalocal sshd-session[75006]: Received disconnect from 103.19.254.14 port 34532:11: Bye Bye [preauth] Dec 03 22:15:03 np0005544966.novalocal sshd-session[75006]: Disconnected from invalid user username 103.19.254.14 port 34532 [preauth] Dec 03 22:15:06 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:15:06 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:15:06 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:15:06 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:15:06 np0005544966.novalocal systemd[1]: run-rb24919e7743f4965879e2f0768e98092.service: Deactivated successfully. Dec 03 22:15:08 np0005544966.novalocal groupadd[75169]: group added to /etc/group: name=nova, GID=162 Dec 03 22:15:08 np0005544966.novalocal groupadd[75169]: group added to /etc/gshadow: name=nova Dec 03 22:15:08 np0005544966.novalocal groupadd[75169]: new group: name=nova, GID=162 Dec 03 22:15:08 np0005544966.novalocal useradd[75176]: new user: name=nova, UID=162, GID=162, home=/var/lib/nova, shell=/sbin/nologin, from=none Dec 03 22:15:08 np0005544966.novalocal useradd[75176]: add 'nova' to group 'nobody' Dec 03 22:15:08 np0005544966.novalocal useradd[75176]: add 'nova' to group 'nova' Dec 03 22:15:08 np0005544966.novalocal useradd[75176]: add 'nova' to shadow group 'nobody' Dec 03 22:15:08 np0005544966.novalocal useradd[75176]: add 'nova' to shadow group 'nova' Dec 03 22:15:27 np0005544966.novalocal kernel: SELinux: Converting 2771 SID table entries... Dec 03 22:15:27 np0005544966.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 03 22:15:27 np0005544966.novalocal kernel: SELinux: policy capability open_perms=1 Dec 03 22:15:27 np0005544966.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 03 22:15:27 np0005544966.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 03 22:15:27 np0005544966.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 03 22:15:27 np0005544966.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 03 22:15:27 np0005544966.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 03 22:15:36 np0005544966.novalocal kernel: SELinux: Converting 2771 SID table entries... Dec 03 22:15:36 np0005544966.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 03 22:15:36 np0005544966.novalocal kernel: SELinux: policy capability open_perms=1 Dec 03 22:15:36 np0005544966.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 03 22:15:36 np0005544966.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 03 22:15:36 np0005544966.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 03 22:15:36 np0005544966.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 03 22:15:36 np0005544966.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 03 22:15:45 np0005544966.novalocal kernel: SELinux: Converting 2771 SID table entries... Dec 03 22:15:45 np0005544966.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 03 22:15:45 np0005544966.novalocal kernel: SELinux: policy capability open_perms=1 Dec 03 22:15:45 np0005544966.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 03 22:15:45 np0005544966.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 03 22:15:45 np0005544966.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 03 22:15:45 np0005544966.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 03 22:15:45 np0005544966.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 03 22:15:54 np0005544966.novalocal kernel: SELinux: Converting 2771 SID table entries... Dec 03 22:15:54 np0005544966.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 03 22:15:54 np0005544966.novalocal kernel: SELinux: policy capability open_perms=1 Dec 03 22:15:54 np0005544966.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 03 22:15:54 np0005544966.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 03 22:15:54 np0005544966.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 03 22:15:54 np0005544966.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 03 22:15:54 np0005544966.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 03 22:16:03 np0005544966.novalocal kernel: SELinux: Converting 2771 SID table entries... Dec 03 22:16:03 np0005544966.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 03 22:16:03 np0005544966.novalocal kernel: SELinux: policy capability open_perms=1 Dec 03 22:16:03 np0005544966.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 03 22:16:03 np0005544966.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 03 22:16:03 np0005544966.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 03 22:16:03 np0005544966.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 03 22:16:03 np0005544966.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 03 22:16:08 np0005544966.novalocal dbus-broker-launch[759]: avc: op=load_policy lsm=selinux seqno=17 res=1 Dec 03 22:16:08 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:16:08 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:16:08 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:16:13 np0005544966.novalocal kernel: SELinux: Converting 2772 SID table entries... Dec 03 22:16:13 np0005544966.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 03 22:16:13 np0005544966.novalocal kernel: SELinux: policy capability open_perms=1 Dec 03 22:16:13 np0005544966.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 03 22:16:13 np0005544966.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 03 22:16:13 np0005544966.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 03 22:16:13 np0005544966.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 03 22:16:13 np0005544966.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 03 22:16:14 np0005544966.novalocal groupadd[75339]: group added to /etc/group: name=qemu, GID=107 Dec 03 22:16:14 np0005544966.novalocal groupadd[75339]: group added to /etc/gshadow: name=qemu Dec 03 22:16:14 np0005544966.novalocal groupadd[75339]: new group: name=qemu, GID=107 Dec 03 22:16:14 np0005544966.novalocal useradd[75346]: new user: name=qemu, UID=107, GID=107, home=/, shell=/sbin/nologin, from=none Dec 03 22:16:14 np0005544966.novalocal useradd[75346]: add 'qemu' to group 'kvm' Dec 03 22:16:14 np0005544966.novalocal useradd[75346]: add 'qemu' to shadow group 'kvm' Dec 03 22:16:14 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:16:14 np0005544966.novalocal dbus-broker-launch[759]: avc: op=load_policy lsm=selinux seqno=18 res=1 Dec 03 22:16:14 np0005544966.novalocal dbus-broker-launch[735]: Noticed file-system modification, trigger reload. Dec 03 22:16:15 np0005544966.novalocal groupadd[75384]: group added to /etc/group: name=libvirt, GID=978 Dec 03 22:16:15 np0005544966.novalocal groupadd[75384]: group added to /etc/gshadow: name=libvirt Dec 03 22:16:15 np0005544966.novalocal groupadd[75384]: new group: name=libvirt, GID=978 Dec 03 22:16:15 np0005544966.novalocal polkitd[9249]: Reloading rules Dec 03 22:16:15 np0005544966.novalocal polkitd[9249]: Collecting garbage unconditionally... Dec 03 22:16:15 np0005544966.novalocal polkitd[9249]: Loading rules from directory /etc/polkit-1/rules.d Dec 03 22:16:15 np0005544966.novalocal polkitd[9249]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 03 22:16:15 np0005544966.novalocal polkitd[9249]: Finished loading, compiling and executing 5 rules Dec 03 22:16:15 np0005544966.novalocal polkitd[9249]: Reloading rules Dec 03 22:16:15 np0005544966.novalocal polkitd[9249]: Collecting garbage unconditionally... Dec 03 22:16:15 np0005544966.novalocal polkitd[9249]: Loading rules from directory /etc/polkit-1/rules.d Dec 03 22:16:15 np0005544966.novalocal polkitd[9249]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 03 22:16:15 np0005544966.novalocal polkitd[9249]: Finished loading, compiling and executing 5 rules Dec 03 22:16:16 np0005544966.novalocal sshd[44935]: Timeout before authentication for connection from 14.103.118.167 to 38.102.83.17, pid = 71044 Dec 03 22:16:20 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:16:20 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:16:20 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:16:20 np0005544966.novalocal systemd-rc-local-generator[76093]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:16:20 np0005544966.novalocal systemd-sysv-generator[76096]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:16:20 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:16:24 np0005544966.novalocal groupadd[78468]: group added to /etc/group: name=octavia, GID=977 Dec 03 22:16:24 np0005544966.novalocal groupadd[78468]: group added to /etc/gshadow: name=octavia Dec 03 22:16:24 np0005544966.novalocal groupadd[78468]: new group: name=octavia, GID=977 Dec 03 22:16:24 np0005544966.novalocal useradd[78504]: new user: name=octavia, UID=979, GID=977, home=/var/lib/octavia, shell=/sbin/nologin, from=none Dec 03 22:16:26 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:16:26 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:16:26 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Consumed 7.829s CPU time. Dec 03 22:16:26 np0005544966.novalocal systemd[1]: run-r5b40b7cede4643c088a3ef1a92d346af.service: Deactivated successfully. Dec 03 22:16:28 np0005544966.novalocal sshd-session[79523]: Invalid user roott from 103.19.254.14 port 34218 Dec 03 22:16:29 np0005544966.novalocal sshd-session[79523]: Received disconnect from 103.19.254.14 port 34218:11: Bye Bye [preauth] Dec 03 22:16:29 np0005544966.novalocal sshd-session[79523]: Disconnected from invalid user roott 103.19.254.14 port 34218 [preauth] Dec 03 22:16:30 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:16:30 np0005544966.novalocal systemd-rc-local-generator[79559]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:16:30 np0005544966.novalocal systemd-sysv-generator[79563]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:16:31 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:16:36 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:16:36 np0005544966.novalocal systemd-rc-local-generator[79607]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:16:36 np0005544966.novalocal systemd-sysv-generator[79610]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:16:36 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:16:38 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:16:38 np0005544966.novalocal systemd-sysv-generator[79649]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:16:38 np0005544966.novalocal systemd-rc-local-generator[79644]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:16:39 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:16:41 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:16:41 np0005544966.novalocal systemd-rc-local-generator[79686]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:16:41 np0005544966.novalocal systemd-sysv-generator[79690]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:16:41 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:16:44 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:16:44 np0005544966.novalocal systemd-sysv-generator[79730]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:16:44 np0005544966.novalocal systemd-rc-local-generator[79726]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:16:44 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:16:55 np0005544966.novalocal groupadd[79760]: group added to /etc/group: name=apache, GID=48 Dec 03 22:16:55 np0005544966.novalocal groupadd[79760]: group added to /etc/gshadow: name=apache Dec 03 22:16:55 np0005544966.novalocal groupadd[79760]: new group: name=apache, GID=48 Dec 03 22:16:55 np0005544966.novalocal useradd[79769]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Dec 03 22:16:57 np0005544966.novalocal sshd-session[79756]: Invalid user supervisor from 45.135.232.92 port 42418 Dec 03 22:16:57 np0005544966.novalocal sshd-session[79756]: Connection reset by invalid user supervisor 45.135.232.92 port 42418 [preauth] Dec 03 22:16:59 np0005544966.novalocal sshd-session[79779]: Invalid user admin from 45.135.232.92 port 42432 Dec 03 22:16:59 np0005544966.novalocal sshd-session[79779]: Connection reset by invalid user admin 45.135.232.92 port 42432 [preauth] Dec 03 22:17:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:17:00 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:00 np0005544966.novalocal systemd-rc-local-generator[79808]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:00 np0005544966.novalocal systemd-sysv-generator[79814]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:17:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:17:01 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:17:01 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:17:01 np0005544966.novalocal sshd-session[79781]: Invalid user admin from 45.135.232.92 port 42448 Dec 03 22:17:01 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:01 np0005544966.novalocal systemd-sysv-generator[79917]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:01 np0005544966.novalocal systemd-rc-local-generator[79906]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:01 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:17:01 np0005544966.novalocal sshd-session[79781]: Connection reset by invalid user admin 45.135.232.92 port 42448 [preauth] Dec 03 22:17:02 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:17:02 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:17:02 np0005544966.novalocal systemd[1]: run-r226a894048274675a1ce27690de3e550.service: Deactivated successfully. Dec 03 22:17:04 np0005544966.novalocal sshd-session[80160]: Connection reset by authenticating user ftp 45.135.232.92 port 42452 [preauth] Dec 03 22:17:05 np0005544966.novalocal sshd-session[80166]: Invalid user user1 from 45.135.232.92 port 20854 Dec 03 22:17:06 np0005544966.novalocal sshd-session[80166]: Connection reset by invalid user user1 45.135.232.92 port 20854 [preauth] Dec 03 22:17:09 np0005544966.novalocal groupadd[80181]: group added to /etc/group: name=manila, GID=976 Dec 03 22:17:09 np0005544966.novalocal groupadd[80181]: group added to /etc/gshadow: name=manila Dec 03 22:17:09 np0005544966.novalocal groupadd[80181]: new group: name=manila, GID=976 Dec 03 22:17:09 np0005544966.novalocal useradd[80188]: new user: name=manila, UID=978, GID=976, home=/var/lib/manila, shell=/sbin/nologin, from=none Dec 03 22:17:09 np0005544966.novalocal useradd[80188]: add 'manila' to group 'nobody' Dec 03 22:17:09 np0005544966.novalocal useradd[80188]: add 'manila' to group 'manila' Dec 03 22:17:09 np0005544966.novalocal useradd[80188]: add 'manila' to shadow group 'nobody' Dec 03 22:17:09 np0005544966.novalocal useradd[80188]: add 'manila' to shadow group 'manila' Dec 03 22:17:10 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:17:10 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:17:10 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:10 np0005544966.novalocal systemd-rc-local-generator[80230]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:10 np0005544966.novalocal systemd-sysv-generator[80236]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:10 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:17:11 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:17:11 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:17:11 np0005544966.novalocal systemd[1]: run-r36244ce3aa12448598e4879b9a40ebed.service: Deactivated successfully. Dec 03 22:17:14 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:17:14 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:17:14 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:14 np0005544966.novalocal systemd-rc-local-generator[80441]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:14 np0005544966.novalocal systemd-sysv-generator[80444]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:14 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:17:15 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:17:15 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:17:15 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.202s CPU time. Dec 03 22:17:15 np0005544966.novalocal systemd[1]: run-r96f180c470ee447a9bb5f417ec69ea7f.service: Deactivated successfully. Dec 03 22:17:15 np0005544966.novalocal kernel: loop: module loaded Dec 03 22:17:15 np0005544966.novalocal kernel: loop3: detected capacity change from 0 to 31457280 Dec 03 22:17:16 np0005544966.novalocal lvm[80878]: PV /dev/loop3 not used. Dec 03 22:17:16 np0005544966.novalocal lvm[80881]: PV /dev/loop3 online, VG lvm-shares is complete. Dec 03 22:17:16 np0005544966.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event lvm-shares. Dec 03 22:17:16 np0005544966.novalocal lvm[80883]: 0 logical volume(s) in volume group "lvm-shares" now active Dec 03 22:17:16 np0005544966.novalocal systemd[1]: lvm-activate-lvm-shares.service: Deactivated successfully. Dec 03 22:17:31 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:17:31 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:17:32 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:17:32 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:17:32 np0005544966.novalocal systemd[1]: run-rf88fdf47f7224bddbd9756f38d4354d5.service: Deactivated successfully. Dec 03 22:17:33 np0005544966.novalocal sshd[44935]: drop connection #0 from [14.103.118.167]:53928 on [38.102.83.17]:22 penalty: exceeded LoginGraceTime Dec 03 22:17:40 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:40 np0005544966.novalocal systemd-rc-local-generator[81179]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:40 np0005544966.novalocal systemd-sysv-generator[81184]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:40 np0005544966.novalocal systemd[1]: Starting MariaDB 10.5 database server... Dec 03 22:17:40 np0005544966.novalocal mariadb-prepare-db-dir[81213]: Database MariaDB is probably initialized in /var/lib/mysql already, nothing is done. Dec 03 22:17:40 np0005544966.novalocal mariadb-prepare-db-dir[81213]: If this is not the case, make sure the /var/lib/mysql is empty before running mariadb-prepare-db-dir. Dec 03 22:17:41 np0005544966.novalocal systemd[1]: Started MariaDB 10.5 database server. Dec 03 22:17:41 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:41 np0005544966.novalocal systemd-rc-local-generator[81325]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:41 np0005544966.novalocal systemd-sysv-generator[81328]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:41 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:41 np0005544966.novalocal systemd-rc-local-generator[81354]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:41 np0005544966.novalocal systemd-sysv-generator[81359]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:42 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:42 np0005544966.novalocal systemd-rc-local-generator[81391]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:42 np0005544966.novalocal systemd-sysv-generator[81395]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:42 np0005544966.novalocal systemd[1]: Starting Redis persistent key-value database... Dec 03 22:17:42 np0005544966.novalocal systemd[1]: Started Redis persistent key-value database. Dec 03 22:17:42 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:42 np0005544966.novalocal systemd-rc-local-generator[81425]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:42 np0005544966.novalocal systemd-sysv-generator[81429]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:43 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:43 np0005544966.novalocal systemd-rc-local-generator[81455]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:43 np0005544966.novalocal systemd-sysv-generator[81458]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:43 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:43 np0005544966.novalocal systemd-rc-local-generator[81485]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:43 np0005544966.novalocal systemd-sysv-generator[81490]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:43 np0005544966.novalocal systemd[1]: Starting Redis Sentinel... Dec 03 22:17:43 np0005544966.novalocal systemd[1]: Started Redis Sentinel. Dec 03 22:17:43 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:44 np0005544966.novalocal systemd-rc-local-generator[81522]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:44 np0005544966.novalocal systemd-sysv-generator[81527]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:44 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:44 np0005544966.novalocal systemd-rc-local-generator[81551]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:44 np0005544966.novalocal systemd-sysv-generator[81555]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:45 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:45 np0005544966.novalocal systemd-rc-local-generator[81631]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:45 np0005544966.novalocal systemd-sysv-generator[81635]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:45 np0005544966.novalocal systemd[1]: Starting OVN northd management daemon... Dec 03 22:17:45 np0005544966.novalocal chown[81641]: /usr/bin/chown: cannot access '/var/lib/ovn': No such file or directory Dec 03 22:17:45 np0005544966.novalocal ovn-ctl[81642]: /var/lib/ovn/ovnnb_db.db does not exist ... (warning). Dec 03 22:17:45 np0005544966.novalocal ovn-ctl[81642]: Creating empty database /var/lib/ovn/ovnnb_db.db [ OK ] Dec 03 22:17:45 np0005544966.novalocal ovsdb-server[81744]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Dec 03 22:17:45 np0005544966.novalocal ovsdb-server[81746]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Dec 03 22:17:45 np0005544966.novalocal ovsdb-server[81745]: ovs|00002|vlog(monitor)|INFO|closing log file Dec 03 22:17:45 np0005544966.novalocal ovsdb-server[81745]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Dec 03 22:17:45 np0005544966.novalocal ovn-ctl[81642]: Starting ovsdb-nb [ OK ] Dec 03 22:17:46 np0005544966.novalocal ovn-nbctl[81750]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl --no-leader-only --db=unix:/run/ovn/ovnnb_db.sock init Dec 03 22:17:46 np0005544966.novalocal ovn-ctl[81642]: /var/lib/ovn/ovnsb_db.db does not exist ... (warning). Dec 03 22:17:46 np0005544966.novalocal ovn-ctl[81642]: Creating empty database /var/lib/ovn/ovnsb_db.db [ OK ] Dec 03 22:17:46 np0005544966.novalocal ovsdb-server[81770]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Dec 03 22:17:46 np0005544966.novalocal ovsdb-server[81772]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Dec 03 22:17:46 np0005544966.novalocal ovsdb-server[81771]: ovs|00002|vlog(monitor)|INFO|closing log file Dec 03 22:17:46 np0005544966.novalocal ovsdb-server[81771]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Dec 03 22:17:46 np0005544966.novalocal ovn-ctl[81642]: Starting ovsdb-sb [ OK ] Dec 03 22:17:46 np0005544966.novalocal ovn-sbctl[81776]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl --no-leader-only --db=unix:/run/ovn/ovnsb_db.sock init Dec 03 22:17:46 np0005544966.novalocal ovn-ctl[81642]: Starting ovn-northd [ OK ] Dec 03 22:17:46 np0005544966.novalocal systemd[1]: Finished OVN northd management daemon. Dec 03 22:17:46 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:46 np0005544966.novalocal systemd-sysv-generator[81813]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:46 np0005544966.novalocal systemd-rc-local-generator[81809]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:46 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:46 np0005544966.novalocal systemd-rc-local-generator[81843]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:46 np0005544966.novalocal systemd-sysv-generator[81846]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:46 np0005544966.novalocal ovn-nbctl[81854]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set-connection pssl:6641:[::1] Dec 03 22:17:47 np0005544966.novalocal ovn-sbctl[81858]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set-connection pssl:6642:[::1] Dec 03 22:17:47 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:17:47 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:17:47 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:17:47 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:47 np0005544966.novalocal systemd-sysv-generator[81910]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:47 np0005544966.novalocal systemd-rc-local-generator[81907]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:47 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:17:47 np0005544966.novalocal systemd[1]: Starting OVN controller daemon... Dec 03 22:17:47 np0005544966.novalocal ovn-ctl[81916]: Starting ovn-controller [ OK ] Dec 03 22:17:47 np0005544966.novalocal systemd[1]: Started OVN controller daemon. Dec 03 22:17:48 np0005544966.novalocal NetworkManager[846]: [1764818268.0058] manager: (br-int): 'openvswitch' plugin not available; creating generic device Dec 03 22:17:48 np0005544966.novalocal kernel: br-int: entered promiscuous mode Dec 03 22:17:48 np0005544966.novalocal NetworkManager[846]: [1764818268.0084] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Dec 03 22:17:48 np0005544966.novalocal systemd-udevd[81973]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:17:48 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:48 np0005544966.novalocal systemd-rc-local-generator[81991]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:48 np0005544966.novalocal systemd-sysv-generator[81997]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:48 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:17:48 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:17:48 np0005544966.novalocal systemd-rc-local-generator[82026]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:17:48 np0005544966.novalocal systemd-sysv-generator[82030]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:17:48 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:17:49 np0005544966.novalocal sshd-session[82004]: Invalid user linuxacademy from 103.19.254.14 port 37086 Dec 03 22:17:49 np0005544966.novalocal sshd-session[82004]: Received disconnect from 103.19.254.14 port 37086:11: Bye Bye [preauth] Dec 03 22:17:49 np0005544966.novalocal sshd-session[82004]: Disconnected from invalid user linuxacademy 103.19.254.14 port 37086 [preauth] Dec 03 22:17:50 np0005544966.novalocal kernel: loop2: detected capacity change from 0 to 31457280 Dec 03 22:17:51 np0005544966.novalocal lvm[82048]: PV /dev/loop2 not used. Dec 03 22:17:51 np0005544966.novalocal lvm[82051]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:17:51 np0005544966.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Dec 03 22:17:51 np0005544966.novalocal lvm[82053]: 0 logical volume(s) in volume group "cinder-volumes" now active Dec 03 22:17:51 np0005544966.novalocal systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Dec 03 22:17:55 np0005544966.novalocal ovsdb-server[81746]: ovs|00003|memory|INFO|10284 kB peak resident set size after 10.0 seconds Dec 03 22:17:55 np0005544966.novalocal ovsdb-server[81746]: ovs|00004|memory|INFO|atoms:43 cells:43 json-caches:1 monitors:2 n-weak-refs:0 sessions:1 Dec 03 22:17:56 np0005544966.novalocal ovsdb-server[81772]: ovs|00003|memory|INFO|11136 kB peak resident set size after 10.0 seconds Dec 03 22:17:56 np0005544966.novalocal ovsdb-server[81772]: ovs|00004|memory|INFO|atoms:447 cells:355 json-caches:1 monitors:3 n-weak-refs:11 sessions:2 Dec 03 22:17:59 np0005544966.novalocal systemd[1]: Starting Cleanup of Temporary Directories... Dec 03 22:17:59 np0005544966.novalocal systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Dec 03 22:17:59 np0005544966.novalocal systemd[1]: Finished Cleanup of Temporary Directories. Dec 03 22:17:59 np0005544966.novalocal systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Dec 03 22:18:01 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:18:01 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:18:01 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:18:02 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:18:02 np0005544966.novalocal systemd-rc-local-generator[82093]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:18:02 np0005544966.novalocal systemd-sysv-generator[82098]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:18:02 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:18:02 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:18:05 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:18:05 np0005544966.novalocal systemd-sysv-generator[82140]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:18:05 np0005544966.novalocal systemd-rc-local-generator[82136]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:18:05 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:18:05 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:18:10 np0005544966.novalocal groupadd[82203]: group added to /etc/group: name=clevis, GID=975 Dec 03 22:18:10 np0005544966.novalocal groupadd[82203]: group added to /etc/gshadow: name=clevis Dec 03 22:18:10 np0005544966.novalocal groupadd[82203]: new group: name=clevis, GID=975 Dec 03 22:18:10 np0005544966.novalocal useradd[82210]: new user: name=clevis, UID=977, GID=975, home=/var/cache/clevis, shell=/usr/sbin/nologin, from=none Dec 03 22:18:10 np0005544966.novalocal usermod[82220]: add 'clevis' to group 'tss' Dec 03 22:18:10 np0005544966.novalocal usermod[82220]: add 'clevis' to shadow group 'tss' Dec 03 22:18:11 np0005544966.novalocal usermod[82233]: add 'nova' to group 'qemu' Dec 03 22:18:11 np0005544966.novalocal usermod[82233]: add 'nova' to shadow group 'qemu' Dec 03 22:18:11 np0005544966.novalocal usermod[82240]: add 'nova' to group 'libvirt' Dec 03 22:18:11 np0005544966.novalocal usermod[82240]: add 'nova' to shadow group 'libvirt' Dec 03 22:18:12 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:18:12 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:18:12 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:18:13 np0005544966.novalocal systemd-rc-local-generator[82315]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:18:13 np0005544966.novalocal systemd-sysv-generator[82319]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:18:13 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:18:13 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:18:16 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:18:16 np0005544966.novalocal systemd-rc-local-generator[84343]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:18:16 np0005544966.novalocal systemd-sysv-generator[84347]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:18:16 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:18:16 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:18:19 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:18:19 np0005544966.novalocal systemd-rc-local-generator[86356]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:18:19 np0005544966.novalocal systemd-sysv-generator[86360]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:18:19 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:18:19 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:18:19 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:18:19 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:18:19 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Consumed 8.524s CPU time. Dec 03 22:18:20 np0005544966.novalocal systemd[1]: run-r2c87c87886284d4ca631ded1b982361a.service: Deactivated successfully. Dec 03 22:18:22 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:18:22 np0005544966.novalocal systemd-sysv-generator[86392]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:18:22 np0005544966.novalocal systemd-rc-local-generator[86386]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:18:22 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:18:46 np0005544966.novalocal crontab[86439]: (root) LIST (root) Dec 03 22:18:46 np0005544966.novalocal crontab[86440]: (root) LIST (keystone) Dec 03 22:18:47 np0005544966.novalocal crontab[86441]: (root) LIST (cinder) Dec 03 22:18:47 np0005544966.novalocal crontab[86442]: (root) LIST (glance) Dec 03 22:18:47 np0005544966.novalocal crontab[86443]: (root) LIST (nova) Dec 03 22:18:47 np0005544966.novalocal crontab[86444]: (root) LIST (manila) Dec 03 22:18:47 np0005544966.novalocal crontab[86445]: (root) REPLACE (cinder) Dec 03 22:18:47 np0005544966.novalocal crontab[86446]: (root) REPLACE (glance) Dec 03 22:18:47 np0005544966.novalocal crontab[86447]: (root) REPLACE (glance) Dec 03 22:18:53 np0005544966.novalocal crontab[86457]: (root) REPLACE (glance) Dec 03 22:19:04 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:19:04 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:19:04 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:19:10 np0005544966.novalocal sshd-session[86492]: Received disconnect from 103.19.254.14 port 40480:11: Bye Bye [preauth] Dec 03 22:19:10 np0005544966.novalocal sshd-session[86492]: Disconnected from authenticating user root 103.19.254.14 port 40480 [preauth] Dec 03 22:19:35 np0005544966.novalocal crontab[86508]: (root) REPLACE (nova) Dec 03 22:19:44 np0005544966.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 03 22:19:44 np0005544966.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 03 22:19:44 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:19:44 np0005544966.novalocal systemd-rc-local-generator[86554]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:19:44 np0005544966.novalocal systemd-sysv-generator[86558]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:19:44 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:19:44 np0005544966.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 03 22:19:45 np0005544966.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 03 22:19:45 np0005544966.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 03 22:19:45 np0005544966.novalocal systemd[1]: run-r22a00018687649bbab6bff7bfc96a5ab.service: Deactivated successfully. Dec 03 22:19:54 np0005544966.novalocal crontab[86654]: (root) REPLACE (manila) Dec 03 22:19:54 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:19:55 np0005544966.novalocal systemd-rc-local-generator[86675]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:19:55 np0005544966.novalocal systemd-sysv-generator[86679]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:19:55 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:19:55 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:19:55 np0005544966.novalocal systemd-rc-local-generator[86708]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:19:55 np0005544966.novalocal systemd-sysv-generator[86712]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:19:55 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:19:56 np0005544966.novalocal systemd[86717]: epmd.socket: Failed to create listening socket ([::]:4369): Address already in use Dec 03 22:19:56 np0005544966.novalocal systemd[1]: epmd.socket: Failed to receive listening socket ([::]:4369): Input/output error Dec 03 22:19:56 np0005544966.novalocal systemd[1]: epmd.socket: Failed to listen on sockets: Input/output error Dec 03 22:19:56 np0005544966.novalocal systemd[1]: epmd.socket: Failed with result 'resources'. Dec 03 22:19:56 np0005544966.novalocal systemd[1]: Failed to listen on Erlang Port Mapper Daemon Activation Socket. Dec 03 22:19:56 np0005544966.novalocal systemd[1]: Starting RabbitMQ broker... Dec 03 22:19:56 np0005544966.novalocal rabbitmq-server[86718]: 2025-12-03 22:19:56.804651-05:00 [warning] <0.129.0> Both old (.config) and new (.conf) format config files exist. Dec 03 22:19:56 np0005544966.novalocal rabbitmq-server[86718]: 2025-12-03 22:19:56.821541-05:00 [warning] <0.129.0> Using the old format config file: /etc/rabbitmq/rabbitmq.config Dec 03 22:19:56 np0005544966.novalocal rabbitmq-server[86718]: 2025-12-03 22:19:56.821597-05:00 [warning] <0.129.0> Please update your config files to the new format and remove the old file. Dec 03 22:19:58 np0005544966.novalocal rabbitmq-server[86718]: 2025-12-03 22:19:58.887102-05:00 [info] <0.229.0> Feature flags: list of feature flags found: Dec 03 22:19:58 np0005544966.novalocal rabbitmq-server[86718]: 2025-12-03 22:19:58.887282-05:00 [info] <0.229.0> Feature flags: [ ] implicit_default_bindings Dec 03 22:19:58 np0005544966.novalocal rabbitmq-server[86718]: 2025-12-03 22:19:58.887307-05:00 [info] <0.229.0> Feature flags: [ ] maintenance_mode_status Dec 03 22:19:58 np0005544966.novalocal rabbitmq-server[86718]: 2025-12-03 22:19:58.887336-05:00 [info] <0.229.0> Feature flags: [ ] quorum_queue Dec 03 22:19:58 np0005544966.novalocal rabbitmq-server[86718]: 2025-12-03 22:19:58.887417-05:00 [info] <0.229.0> Feature flags: [ ] stream_queue Dec 03 22:19:58 np0005544966.novalocal rabbitmq-server[86718]: 2025-12-03 22:19:58.887436-05:00 [info] <0.229.0> Feature flags: [ ] user_limits Dec 03 22:19:58 np0005544966.novalocal rabbitmq-server[86718]: 2025-12-03 22:19:58.887455-05:00 [info] <0.229.0> Feature flags: [ ] virtual_host_metadata Dec 03 22:19:58 np0005544966.novalocal rabbitmq-server[86718]: 2025-12-03 22:19:58.887536-05:00 [info] <0.229.0> Feature flags: feature flag states written to disk: yes Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: 2025-12-03 22:19:59.237078-05:00 [notice] <0.44.0> Application syslog exited with reason: stopped Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: 2025-12-03 22:19:59.237243-05:00 [notice] <0.229.0> Logging: switching to configured handler(s); following messages may not be visible in this log output Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: ## ## RabbitMQ 3.9.21 Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: ## ## Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: ########## Copyright (c) 2007-2022 VMware, Inc. or its affiliates. Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: ###### ## Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: ########## Licensed under the MPL 2.0. Website: https://rabbitmq.com Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: Erlang: 24.3.4.2 [jit] Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: TLS Library: OpenSSL - OpenSSL 3.5.1 1 Jul 2025 Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: Doc guides: https://rabbitmq.com/documentation.html Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: Support: https://rabbitmq.com/contact.html Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: Tutorials: https://rabbitmq.com/getstarted.html Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: Monitoring: https://rabbitmq.com/monitoring.html Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: Logs: /var/log/rabbitmq/rabbit@localhost6.log Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: /var/log/rabbitmq/rabbit@localhost6_upgrade.log Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: Dec 03 22:19:59 np0005544966.novalocal rabbitmq-server[86718]: Config file(s): /etc/rabbitmq/rabbitmq.config Dec 03 22:20:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:20:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:20:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:20:02 np0005544966.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 03 22:20:02 np0005544966.novalocal rabbitmq-server[86718]: Starting broker... completed with 3 plugins. Dec 03 22:20:02 np0005544966.novalocal systemd[1]: Started RabbitMQ broker. Dec 03 22:20:03 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:03 np0005544966.novalocal systemd-sysv-generator[86828]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:03 np0005544966.novalocal systemd-rc-local-generator[86823]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:03 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:03 np0005544966.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 03 22:20:03 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:03 np0005544966.novalocal setroubleshoot[86802]: failed to retrieve rpm info for path '/proc/net/if_inet6': Dec 03 22:20:03 np0005544966.novalocal systemd-rc-local-generator[86859]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:03 np0005544966.novalocal systemd-sysv-generator[86864]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:03 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:03 np0005544966.novalocal systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Dec 03 22:20:03 np0005544966.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Dec 03 22:20:03 np0005544966.novalocal runuser[86873]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:04 np0005544966.novalocal runuser[86873]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:04 np0005544966.novalocal runuser[86929]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:05 np0005544966.novalocal setroubleshoot[86802]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. For complete SELinux messages run: sealert -l 881c6fe3-f9fa-4c86-a609-6cabf68a878d Dec 03 22:20:05 np0005544966.novalocal setroubleshoot[86802]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that inet_gethost should be allowed read access on the if_inet6 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'inet_gethost' --raw | audit2allow -M my-inetgethost # semodule -X 300 -i my-inetgethost.pp Dec 03 22:20:05 np0005544966.novalocal runuser[86929]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:05 np0005544966.novalocal runuser[86982]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:06 np0005544966.novalocal runuser[86982]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:06 np0005544966.novalocal runuser[87036]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:07 np0005544966.novalocal runuser[87036]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:07 np0005544966.novalocal runuser[87090]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:08 np0005544966.novalocal runuser[87090]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:08 np0005544966.novalocal runuser[87142]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:09 np0005544966.novalocal runuser[87142]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:09 np0005544966.novalocal runuser[87194]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:10 np0005544966.novalocal runuser[87194]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:10 np0005544966.novalocal runuser[87246]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:10 np0005544966.novalocal runuser[87246]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:11 np0005544966.novalocal runuser[87298]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:11 np0005544966.novalocal runuser[87298]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:11 np0005544966.novalocal runuser[87352]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:12 np0005544966.novalocal runuser[87352]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:12 np0005544966.novalocal runuser[87406]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:13 np0005544966.novalocal runuser[87406]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:13 np0005544966.novalocal runuser[87458]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:14 np0005544966.novalocal runuser[87458]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:14 np0005544966.novalocal runuser[87510]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:14 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Dec 03 22:20:14 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.276s CPU time. Dec 03 22:20:14 np0005544966.novalocal runuser[87510]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:15 np0005544966.novalocal runuser[87563]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:15 np0005544966.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 03 22:20:15 np0005544966.novalocal systemd[1]: setroubleshootd.service: Consumed 1.013s CPU time. Dec 03 22:20:15 np0005544966.novalocal runuser[87563]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:15 np0005544966.novalocal runuser[87615]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:16 np0005544966.novalocal runuser[87615]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:17 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:17 np0005544966.novalocal systemd-sysv-generator[87696]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:17 np0005544966.novalocal systemd-rc-local-generator[87691]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:17 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:17 np0005544966.novalocal systemd[1]: Started OpenStack Cinder Scheduler Server. Dec 03 22:20:18 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:18 np0005544966.novalocal systemd-rc-local-generator[87726]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:18 np0005544966.novalocal systemd-sysv-generator[87729]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:18 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:18 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:18 np0005544966.novalocal systemd-sysv-generator[87757]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:18 np0005544966.novalocal systemd-rc-local-generator[87754]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:18 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:19 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:19 np0005544966.novalocal systemd-rc-local-generator[87787]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:19 np0005544966.novalocal systemd-sysv-generator[87791]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:19 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:19 np0005544966.novalocal systemd[1]: Started OpenStack Cinder Volume Server. Dec 03 22:20:19 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:19 np0005544966.novalocal systemd-sysv-generator[87822]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:19 np0005544966.novalocal systemd-rc-local-generator[87819]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:20 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:20 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:20 np0005544966.novalocal systemd-sysv-generator[87853]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:20 np0005544966.novalocal systemd-rc-local-generator[87850]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:20 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:21 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:21 np0005544966.novalocal systemd-sysv-generator[87885]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:21 np0005544966.novalocal systemd-rc-local-generator[87881]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:21 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:21 np0005544966.novalocal systemd[1]: Started OpenStack Cinder Backup Server. Dec 03 22:20:21 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:21 np0005544966.novalocal systemd-rc-local-generator[87918]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:21 np0005544966.novalocal systemd-sysv-generator[87921]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:21 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:22 np0005544966.novalocal sudo[87929]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings -o name cinder-volumes Dec 03 22:20:22 np0005544966.novalocal systemd[1]: Created slice User Slice of UID 0. Dec 03 22:20:22 np0005544966.novalocal systemd[1]: Starting User Runtime Directory /run/user/0... Dec 03 22:20:22 np0005544966.novalocal systemd[1]: Finished User Runtime Directory /run/user/0. Dec 03 22:20:22 np0005544966.novalocal systemd[1]: Starting User Manager for UID 0... Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: pam_unix(systemd-user:session): session opened for user root(uid=0) by root(uid=0) Dec 03 22:20:22 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:22 np0005544966.novalocal systemd-rc-local-generator[87962]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:22 np0005544966.novalocal systemd-sysv-generator[87967]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: Queued start job for default target Main User Target. Dec 03 22:20:22 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: Created slice User Application Slice. Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: Started Daily Cleanup of User's Temporary Directories. Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: Reached target Paths. Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: Reached target Timers. Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: Starting D-Bus User Message Bus Socket... Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: PipeWire PulseAudio was skipped because of an unmet condition check (ConditionUser=!root). Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: PipeWire Multimedia System Sockets was skipped because of an unmet condition check (ConditionUser=!root). Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: Starting Create User's Volatile Files and Directories... Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: Listening on D-Bus User Message Bus Socket. Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: Reached target Sockets. Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: Finished Create User's Volatile Files and Directories. Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: Reached target Basic System. Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: Reached target Main User Target. Dec 03 22:20:22 np0005544966.novalocal systemd[87933]: Startup finished in 199ms. Dec 03 22:20:22 np0005544966.novalocal systemd[1]: Started User Manager for UID 0. Dec 03 22:20:22 np0005544966.novalocal systemd[1]: Started Session c1 of User root. Dec 03 22:20:22 np0005544966.novalocal sudo[87929]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:22 np0005544966.novalocal sudo[87929]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:22 np0005544966.novalocal systemd[1]: session-c1.scope: Deactivated successfully. Dec 03 22:20:22 np0005544966.novalocal sudo[87980]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Dec 03 22:20:22 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:23 np0005544966.novalocal systemd-rc-local-generator[87996]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:23 np0005544966.novalocal systemd-sysv-generator[88001]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:23 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:23 np0005544966.novalocal systemd[1]: Started Session c2 of User root. Dec 03 22:20:23 np0005544966.novalocal systemd[1]: Starting dnf makecache... Dec 03 22:20:23 np0005544966.novalocal sudo[87980]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:23 np0005544966.novalocal systemd[1]: Starting Restore LIO kernel target configuration... Dec 03 22:20:23 np0005544966.novalocal kernel: Rounding down aligned max_sectors from 4294967295 to 4294967288 Dec 03 22:20:23 np0005544966.novalocal target[88013]: No saved config file at /etc/target/saveconfig.json, ok, exiting Dec 03 22:20:23 np0005544966.novalocal systemd[1]: Finished Restore LIO kernel target configuration. Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: Updating Subscription Management repositories. Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: Unable to read consumer identity Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: This system is not registered with an entitlement server. You can use subscription-manager to register. Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: Failed determining last makecache time. Dec 03 22:20:23 np0005544966.novalocal sudo[87980]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:23 np0005544966.novalocal systemd[1]: session-c2.scope: Deactivated successfully. Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-ansible-role-thales-hsm-0661a3a0a0e79e 149 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-openstack-ironic-e9ee094fc3d37cf273bd6 178 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal sudo[88024]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-openstack-cinder-a54ed55cfbf1b38b09985 199 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-python-openstackclient-f42ade4305d9745 241 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal systemd[1]: Started Session c3 of User root. Dec 03 22:20:23 np0005544966.novalocal sudo[88024]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-openstack-cloudkitty-b7a4be00afa6a6dc2 236 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-openstack-selinux-f19cf2529160f9bf6e83 265 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-openstack-nova-8d95d55f771f8d55fbfb1a6 209 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-openstack-designate-5bfc35864c28a97ded 236 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-openstack-glance-097f38158189efc5c7d52 205 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-openstack-keystone-f73299cd71633b6f462 194 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-openstack-manila-338bcb77f8d36c422e616 233 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-openstack-neutron-2ce5e3b27734931cc60c 232 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-openstack-octavia-577ff3d6712f0235b3fd 190 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-openstack-watcher-456f42e1b9d9abf0f620 211 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal systemd-rc-local-generator[88059]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-python-tcib-c2ae956ec1898faaed6197ef95 176 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal systemd-sysv-generator[88065]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-puppet-openstacklib-98e64c6dad3b665745 241 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-openstack-swift-9d495089a7aa6c5b222037 253 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-python-tempestconf-8515371b7cceebd4282 251 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: delorean-python-django-horizon-fdaaf6e1a1708dee 214 kB/s | 3.0 kB 00:00 Dec 03 22:20:23 np0005544966.novalocal dnf[88011]: CentOS Stream 9 - BaseOS 1.3 MB/s | 3.9 kB 00:00 Dec 03 22:20:24 np0005544966.novalocal dnf[88011]: CentOS Stream 9 - AppStream 1.0 MB/s | 4.4 kB 00:00 Dec 03 22:20:24 np0005544966.novalocal sudo[88024]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:24 np0005544966.novalocal systemd[1]: session-c3.scope: Deactivated successfully. Dec 03 22:20:24 np0005544966.novalocal sudo[88078]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -L 14.25g cinder-volumes/cinder-volumes-pool Dec 03 22:20:24 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:24 np0005544966.novalocal dnf[88011]: CentOS Stream 9 - CRB 1.0 MB/s | 4.3 kB 00:00 Dec 03 22:20:24 np0005544966.novalocal dnf[88011]: CentOS Stream 9 - Extras packages 745 kB/s | 3.0 kB 00:00 Dec 03 22:20:24 np0005544966.novalocal dnf[88011]: dlrn-dalmatian-testing 179 kB/s | 3.0 kB 00:00 Dec 03 22:20:24 np0005544966.novalocal dnf[88011]: dlrn-dalmatian-build-deps 190 kB/s | 3.0 kB 00:00 Dec 03 22:20:24 np0005544966.novalocal systemd-rc-local-generator[88104]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:24 np0005544966.novalocal dnf[88011]: centos9-rabbitmq 884 kB/s | 3.0 kB 00:00 Dec 03 22:20:24 np0005544966.novalocal dnf[88011]: centos9-storage 1.1 MB/s | 3.0 kB 00:00 Dec 03 22:20:24 np0005544966.novalocal systemd-sysv-generator[88108]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:24 np0005544966.novalocal dnf[88011]: centos9-opstools 911 kB/s | 3.0 kB 00:00 Dec 03 22:20:24 np0005544966.novalocal dnf[88011]: NFV SIG OpenvSwitch 1.0 MB/s | 3.0 kB 00:00 Dec 03 22:20:24 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:24 np0005544966.novalocal systemd[1]: Started Session c4 of User root. Dec 03 22:20:24 np0005544966.novalocal sudo[88078]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:24 np0005544966.novalocal runuser[88118]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:24 np0005544966.novalocal dnf[88011]: Extra Packages for Enterprise Linux 9 - x86_64 85 kB/s | 27 kB 00:00 Dec 03 22:20:25 np0005544966.novalocal systemd[1]: Started Device-mapper event daemon. Dec 03 22:20:25 np0005544966.novalocal dmeventd[88196]: dmeventd ready for processing. Dec 03 22:20:25 np0005544966.novalocal dmeventd[88196]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Dec 03 22:20:25 np0005544966.novalocal lvm[88201]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:20:25 np0005544966.novalocal lvm[88201]: VG cinder-volumes finished Dec 03 22:20:25 np0005544966.novalocal sudo[88078]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:25 np0005544966.novalocal systemd[1]: session-c4.scope: Deactivated successfully. Dec 03 22:20:25 np0005544966.novalocal dnf[88011]: Metadata cache created. Dec 03 22:20:25 np0005544966.novalocal sudo[88203]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/cinder-volumes-pool Dec 03 22:20:25 np0005544966.novalocal systemd[1]: Started Session c5 of User root. Dec 03 22:20:25 np0005544966.novalocal sudo[88203]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:25 np0005544966.novalocal systemd[1]: dnf-makecache.service: Deactivated successfully. Dec 03 22:20:25 np0005544966.novalocal systemd[1]: Finished dnf makecache. Dec 03 22:20:25 np0005544966.novalocal systemd[1]: dnf-makecache.service: Consumed 1.406s CPU time. Dec 03 22:20:25 np0005544966.novalocal runuser[88118]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:25 np0005544966.novalocal runuser[88213]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:25 np0005544966.novalocal sudo[88203]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:25 np0005544966.novalocal systemd[1]: session-c5.scope: Deactivated successfully. Dec 03 22:20:25 np0005544966.novalocal sudo[88260]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C pvs --noheadings --unit=g -o vg_name,name,size,free --separator | --nosuffix --ignoreskippedcluster Dec 03 22:20:25 np0005544966.novalocal systemd[1]: Started Session c6 of User root. Dec 03 22:20:25 np0005544966.novalocal sudo[88260]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:26 np0005544966.novalocal sudo[88260]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:26 np0005544966.novalocal systemd[1]: session-c6.scope: Deactivated successfully. Dec 03 22:20:26 np0005544966.novalocal runuser[88213]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:26 np0005544966.novalocal sudo[88271]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:20:26 np0005544966.novalocal systemd[1]: Started Session c7 of User root. Dec 03 22:20:26 np0005544966.novalocal sudo[88271]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:26 np0005544966.novalocal runuser[88274]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:26 np0005544966.novalocal sudo[88271]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:26 np0005544966.novalocal systemd[1]: session-c7.scope: Deactivated successfully. Dec 03 22:20:26 np0005544966.novalocal sudo[88321]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:20:26 np0005544966.novalocal systemd[1]: Started Session c8 of User root. Dec 03 22:20:26 np0005544966.novalocal sudo[88321]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:27 np0005544966.novalocal runuser[88274]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:27 np0005544966.novalocal sudo[88321]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:27 np0005544966.novalocal systemd[1]: session-c8.scope: Deactivated successfully. Dec 03 22:20:27 np0005544966.novalocal runuser[88332]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:27 np0005544966.novalocal sudo[88340]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:20:27 np0005544966.novalocal systemd[1]: Started Session c9 of User root. Dec 03 22:20:27 np0005544966.novalocal sudo[88340]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:27 np0005544966.novalocal sudo[88340]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:27 np0005544966.novalocal systemd[1]: session-c9.scope: Deactivated successfully. Dec 03 22:20:27 np0005544966.novalocal sudo[88381]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:20:27 np0005544966.novalocal systemd[1]: Started Session c10 of User root. Dec 03 22:20:27 np0005544966.novalocal sudo[88381]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:27 np0005544966.novalocal runuser[88332]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:28 np0005544966.novalocal sudo[88381]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:28 np0005544966.novalocal systemd[1]: session-c10.scope: Deactivated successfully. Dec 03 22:20:28 np0005544966.novalocal sudo[88395]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Dec 03 22:20:28 np0005544966.novalocal systemd[1]: Started Session c11 of User root. Dec 03 22:20:28 np0005544966.novalocal sudo[88395]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:28 np0005544966.novalocal runuser[88399]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:28 np0005544966.novalocal sudo[88395]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:28 np0005544966.novalocal systemd[1]: session-c11.scope: Deactivated successfully. Dec 03 22:20:28 np0005544966.novalocal sudo[88446]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Dec 03 22:20:28 np0005544966.novalocal systemd[1]: Started Session c12 of User root. Dec 03 22:20:28 np0005544966.novalocal sudo[88446]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:28 np0005544966.novalocal runuser[88399]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:28 np0005544966.novalocal sudo[88446]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:28 np0005544966.novalocal systemd[1]: session-c12.scope: Deactivated successfully. Dec 03 22:20:29 np0005544966.novalocal sudo[88458]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:20:29 np0005544966.novalocal systemd[1]: Started Session c13 of User root. Dec 03 22:20:29 np0005544966.novalocal sudo[88458]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:29 np0005544966.novalocal runuser[88457]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:29 np0005544966.novalocal sudo[88458]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:29 np0005544966.novalocal systemd[1]: session-c13.scope: Deactivated successfully. Dec 03 22:20:29 np0005544966.novalocal sudo[88506]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:20:29 np0005544966.novalocal systemd[1]: Started Session c14 of User root. Dec 03 22:20:29 np0005544966.novalocal sudo[88506]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:29 np0005544966.novalocal runuser[88457]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:30 np0005544966.novalocal sudo[88506]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:30 np0005544966.novalocal systemd[1]: session-c14.scope: Deactivated successfully. Dec 03 22:20:30 np0005544966.novalocal sudo[88518]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:20:30 np0005544966.novalocal systemd[1]: Started Session c15 of User root. Dec 03 22:20:30 np0005544966.novalocal sudo[88518]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:30 np0005544966.novalocal runuser[88517]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:30 np0005544966.novalocal sudo[88518]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:30 np0005544966.novalocal systemd[1]: session-c15.scope: Deactivated successfully. Dec 03 22:20:30 np0005544966.novalocal sudo[88566]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:20:30 np0005544966.novalocal systemd[1]: Started Session c16 of User root. Dec 03 22:20:30 np0005544966.novalocal sudo[88566]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:30 np0005544966.novalocal runuser[88517]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:30 np0005544966.novalocal sudo[88566]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:30 np0005544966.novalocal systemd[1]: session-c16.scope: Deactivated successfully. Dec 03 22:20:30 np0005544966.novalocal runuser[88577]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:31 np0005544966.novalocal sudo[88595]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:20:31 np0005544966.novalocal systemd[1]: Started Session c17 of User root. Dec 03 22:20:31 np0005544966.novalocal sudo[88595]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:31 np0005544966.novalocal sudo[88595]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:31 np0005544966.novalocal systemd[1]: session-c17.scope: Deactivated successfully. Dec 03 22:20:31 np0005544966.novalocal sudo[88629]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:20:31 np0005544966.novalocal systemd[1]: Started Session c18 of User root. Dec 03 22:20:31 np0005544966.novalocal sudo[88629]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:31 np0005544966.novalocal runuser[88577]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:31 np0005544966.novalocal sudo[88629]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:31 np0005544966.novalocal systemd[1]: session-c18.scope: Deactivated successfully. Dec 03 22:20:31 np0005544966.novalocal sudo[88642]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:20:31 np0005544966.novalocal systemd[1]: Started Session c19 of User root. Dec 03 22:20:31 np0005544966.novalocal sudo[88642]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:32 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:32 np0005544966.novalocal systemd-rc-local-generator[88669]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:32 np0005544966.novalocal systemd-sysv-generator[88673]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:32 np0005544966.novalocal sudo[88642]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:32 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:32 np0005544966.novalocal systemd[1]: session-c19.scope: Deactivated successfully. Dec 03 22:20:32 np0005544966.novalocal sudo[88678]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:20:32 np0005544966.novalocal systemd[1]: Started Session c20 of User root. Dec 03 22:20:32 np0005544966.novalocal sshd-session[88627]: Invalid user apacher from 103.19.254.14 port 43680 Dec 03 22:20:32 np0005544966.novalocal sudo[88678]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:32 np0005544966.novalocal systemd[1]: Starting OpenStack Neutron Server... Dec 03 22:20:32 np0005544966.novalocal sshd-session[88627]: Received disconnect from 103.19.254.14 port 43680:11: Bye Bye [preauth] Dec 03 22:20:32 np0005544966.novalocal sshd-session[88627]: Disconnected from invalid user apacher 103.19.254.14 port 43680 [preauth] Dec 03 22:20:32 np0005544966.novalocal sudo[88678]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:32 np0005544966.novalocal systemd[1]: session-c20.scope: Deactivated successfully. Dec 03 22:20:33 np0005544966.novalocal sudo[88687]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:20:33 np0005544966.novalocal systemd[1]: Started Session c21 of User root. Dec 03 22:20:33 np0005544966.novalocal sudo[88687]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:33 np0005544966.novalocal sudo[88687]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:33 np0005544966.novalocal systemd[1]: session-c21.scope: Deactivated successfully. Dec 03 22:20:33 np0005544966.novalocal sudo[88691]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:20:33 np0005544966.novalocal systemd[1]: Started Session c22 of User root. Dec 03 22:20:33 np0005544966.novalocal sudo[88691]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:33 np0005544966.novalocal sudo[88691]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:33 np0005544966.novalocal systemd[1]: session-c22.scope: Deactivated successfully. Dec 03 22:20:34 np0005544966.novalocal sudo[88695]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:20:34 np0005544966.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 03 22:20:34 np0005544966.novalocal systemd[1]: Started Session c23 of User root. Dec 03 22:20:34 np0005544966.novalocal sudo[88695]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:34 np0005544966.novalocal sudo[88695]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:34 np0005544966.novalocal systemd[1]: session-c23.scope: Deactivated successfully. Dec 03 22:20:34 np0005544966.novalocal sudo[88700]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:20:34 np0005544966.novalocal systemd[1]: Started Session c24 of User root. Dec 03 22:20:34 np0005544966.novalocal sudo[88700]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:20:34 np0005544966.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 03 22:20:34 np0005544966.novalocal sudo[88700]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:34 np0005544966.novalocal systemd[1]: session-c24.scope: Deactivated successfully. Dec 03 22:20:34 np0005544966.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service. Dec 03 22:20:36 np0005544966.novalocal setroubleshoot[88697]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 8a4b65bb-4b57-4eb2-9f93-0993b93dbb82 Dec 03 22:20:36 np0005544966.novalocal setroubleshoot[88697]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Dec 03 22:20:36 np0005544966.novalocal setroubleshoot[88697]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 8a4b65bb-4b57-4eb2-9f93-0993b93dbb82 Dec 03 22:20:36 np0005544966.novalocal setroubleshoot[88697]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Dec 03 22:20:36 np0005544966.novalocal systemd[1]: Started OpenStack Neutron Server. Dec 03 22:20:36 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:36 np0005544966.novalocal systemd-rc-local-generator[88750]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:36 np0005544966.novalocal systemd-sysv-generator[88753]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:36 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:37 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:37 np0005544966.novalocal systemd-sysv-generator[88781]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:37 np0005544966.novalocal systemd-rc-local-generator[88778]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:37 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:37 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:37 np0005544966.novalocal systemd-rc-local-generator[88811]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:37 np0005544966.novalocal systemd-sysv-generator[88814]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:37 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:38 np0005544966.novalocal systemd[1]: Started OpenStack Neutron OVN Agent. Dec 03 22:20:38 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:38 np0005544966.novalocal systemd-rc-local-generator[88845]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:38 np0005544966.novalocal systemd-sysv-generator[88848]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:38 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:38 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:39 np0005544966.novalocal systemd-sysv-generator[88877]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:39 np0005544966.novalocal systemd-rc-local-generator[88873]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:39 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:39 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:39 np0005544966.novalocal systemd-sysv-generator[88906]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:39 np0005544966.novalocal systemd-rc-local-generator[88902]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:39 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:40 np0005544966.novalocal systemd[1]: Started OpenStack Neutron VPNaaS support for OVN. Dec 03 22:20:40 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:40 np0005544966.novalocal systemd-rc-local-generator[88937]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:40 np0005544966.novalocal systemd-sysv-generator[88940]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:40 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:40 np0005544966.novalocal sudo[88948]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpi3x06w48/privsep.sock Dec 03 22:20:40 np0005544966.novalocal systemd[1]: Started Session c25 of User root. Dec 03 22:20:40 np0005544966.novalocal sudo[88948]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:20:40 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:40 np0005544966.novalocal systemd-rc-local-generator[88971]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:41 np0005544966.novalocal systemd-sysv-generator[88977]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:41 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:41 np0005544966.novalocal runuser[88981]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:41 np0005544966.novalocal kernel: capability: warning: `privsep-helper' uses deprecated v2 capabilities in a way that may be insecure Dec 03 22:20:41 np0005544966.novalocal sudo[88948]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:41 np0005544966.novalocal runuser[88981]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:42 np0005544966.novalocal runuser[89037]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:42 np0005544966.novalocal runuser[89037]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:43 np0005544966.novalocal runuser[89093]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:43 np0005544966.novalocal sudo[89110]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpomauqnrs/privsep.sock Dec 03 22:20:43 np0005544966.novalocal systemd[1]: Started Session c26 of User root. Dec 03 22:20:43 np0005544966.novalocal sudo[89110]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:20:43 np0005544966.novalocal runuser[89093]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:43 np0005544966.novalocal runuser[89149]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:20:43 np0005544966.novalocal sudo[89110]: pam_unix(sudo:session): session closed for user root Dec 03 22:20:44 np0005544966.novalocal runuser[89149]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:20:45 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:45 np0005544966.novalocal systemd-sysv-generator[89235]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:45 np0005544966.novalocal systemd-rc-local-generator[89231]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:45 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:45 np0005544966.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Dec 03 22:20:45 np0005544966.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Dec 03 22:20:45 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:46 np0005544966.novalocal systemd-rc-local-generator[89263]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:46 np0005544966.novalocal systemd-sysv-generator[89266]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:46 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:46 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Dec 03 22:20:46 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Consumed 1.277s CPU time. Dec 03 22:20:46 np0005544966.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 03 22:20:46 np0005544966.novalocal systemd[1]: setroubleshootd.service: Consumed 1.112s CPU time. Dec 03 22:20:46 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:46 np0005544966.novalocal systemd-sysv-generator[89296]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:46 np0005544966.novalocal systemd-rc-local-generator[89292]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:46 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:47 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:47 np0005544966.novalocal systemd-rc-local-generator[89328]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:47 np0005544966.novalocal systemd-sysv-generator[89332]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:47 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:47 np0005544966.novalocal systemd[1]: Listening on libvirt locking daemon socket. Dec 03 22:20:47 np0005544966.novalocal systemd[1]: Listening on libvirt locking daemon admin socket. Dec 03 22:20:47 np0005544966.novalocal systemd[1]: Starting libvirt locking daemon... Dec 03 22:20:47 np0005544966.novalocal systemd[1]: Started libvirt locking daemon. Dec 03 22:20:48 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:48 np0005544966.novalocal systemd-rc-local-generator[89361]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:48 np0005544966.novalocal systemd-sysv-generator[89365]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:48 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:48 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:48 np0005544966.novalocal systemd-rc-local-generator[89390]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:48 np0005544966.novalocal systemd-sysv-generator[89395]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:48 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:49 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:49 np0005544966.novalocal systemd-sysv-generator[89424]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:49 np0005544966.novalocal systemd-rc-local-generator[89421]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:49 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:49 np0005544966.novalocal systemd[1]: Listening on libvirt logging daemon socket. Dec 03 22:20:49 np0005544966.novalocal systemd[1]: Listening on libvirt logging daemon admin socket. Dec 03 22:20:49 np0005544966.novalocal systemd[1]: Starting libvirt logging daemon... Dec 03 22:20:49 np0005544966.novalocal systemd[1]: Started libvirt logging daemon. Dec 03 22:20:49 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:49 np0005544966.novalocal systemd-sysv-generator[89453]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:49 np0005544966.novalocal systemd-rc-local-generator[89450]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:49 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:50 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:50 np0005544966.novalocal systemd-rc-local-generator[89483]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:50 np0005544966.novalocal systemd-sysv-generator[89486]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:50 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:50 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:51 np0005544966.novalocal systemd-rc-local-generator[89517]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:51 np0005544966.novalocal systemd-sysv-generator[89521]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:51 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:51 np0005544966.novalocal systemd[1]: Listening on libvirt secret daemon socket. Dec 03 22:20:52 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:52 np0005544966.novalocal systemd-rc-local-generator[89552]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:52 np0005544966.novalocal systemd-sysv-generator[89555]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:52 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:52 np0005544966.novalocal systemd[1]: Listening on libvirt nodedev daemon socket. Dec 03 22:20:53 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:53 np0005544966.novalocal systemd-rc-local-generator[89589]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:53 np0005544966.novalocal systemd-sysv-generator[89592]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:53 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:53 np0005544966.novalocal systemd[1]: Listening on libvirt QEMU daemon socket. Dec 03 22:20:54 np0005544966.novalocal systemd[1]: virtproxyd-tcp.socket: Deactivated successfully. Dec 03 22:20:54 np0005544966.novalocal systemd[1]: Closed libvirt proxy daemon non-TLS IP socket. Dec 03 22:20:54 np0005544966.novalocal systemd[1]: Stopping libvirt proxy daemon non-TLS IP socket... Dec 03 22:20:54 np0005544966.novalocal systemd[1]: virtproxyd.socket: Deactivated successfully. Dec 03 22:20:54 np0005544966.novalocal systemd[1]: Closed libvirt proxy daemon socket. Dec 03 22:20:54 np0005544966.novalocal systemd[1]: Stopping libvirt proxy daemon socket... Dec 03 22:20:54 np0005544966.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Dec 03 22:20:54 np0005544966.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Dec 03 22:20:54 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:55 np0005544966.novalocal systemd-rc-local-generator[89631]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:55 np0005544966.novalocal systemd-sysv-generator[89634]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:55 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:55 np0005544966.novalocal systemd[1]: Listening on libvirt storage daemon socket. Dec 03 22:20:55 np0005544966.novalocal systemd[1]: Created slice Virtual Machine and Container Slice. Dec 03 22:20:55 np0005544966.novalocal systemd[1]: Listening on libvirt QEMU daemon admin socket. Dec 03 22:20:55 np0005544966.novalocal systemd[1]: Listening on libvirt QEMU daemon read-only socket. Dec 03 22:20:55 np0005544966.novalocal systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 03 22:20:55 np0005544966.novalocal systemd[1]: Starting Virtual Machine and Container Registration Service... Dec 03 22:20:55 np0005544966.novalocal systemd[1]: Started Virtual Machine and Container Registration Service. Dec 03 22:20:55 np0005544966.novalocal systemd[1]: Starting libvirt QEMU daemon... Dec 03 22:20:55 np0005544966.novalocal systemd[1]: Started libvirt QEMU daemon. Dec 03 22:20:55 np0005544966.novalocal virtqemud[89645]: libvirt version: 11.9.0, package: 1.el9 (builder@centos.org, 2025-11-04-09:54:50, ) Dec 03 22:20:55 np0005544966.novalocal virtqemud[89645]: hostname: np0005544966.novalocal Dec 03 22:20:55 np0005544966.novalocal virtqemud[89645]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Dec 03 22:20:55 np0005544966.novalocal virtqemud[89645]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Dec 03 22:20:56 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:56 np0005544966.novalocal systemd-rc-local-generator[89689]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:56 np0005544966.novalocal systemd-sysv-generator[89695]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:56 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:56 np0005544966.novalocal systemd[1]: Reached target libvirt guests shutdown target. Dec 03 22:20:56 np0005544966.novalocal systemd[1]: Starting libvirt guests suspend/resume service... Dec 03 22:20:56 np0005544966.novalocal systemd[1]: Finished libvirt guests suspend/resume service. Dec 03 22:20:57 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:57 np0005544966.novalocal systemd-rc-local-generator[89727]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:57 np0005544966.novalocal systemd-sysv-generator[89733]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:57 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:57 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:57 np0005544966.novalocal systemd-sysv-generator[89759]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:57 np0005544966.novalocal systemd-rc-local-generator[89756]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:57 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:58 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:58 np0005544966.novalocal systemd-sysv-generator[89798]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:58 np0005544966.novalocal systemd-rc-local-generator[89795]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:58 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:58 np0005544966.novalocal systemd[1]: Started OpenStack Nova NoVNC Proxy Server. Dec 03 22:20:59 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:59 np0005544966.novalocal systemd-rc-local-generator[89827]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:59 np0005544966.novalocal systemd-sysv-generator[89831]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:59 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:59 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:20:59 np0005544966.novalocal systemd-sysv-generator[89857]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:20:59 np0005544966.novalocal systemd-rc-local-generator[89854]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:20:59 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:20:59 np0005544966.novalocal runuser[89864]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:21:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:21:00 np0005544966.novalocal runuser[89864]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:21:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:21:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:21:00 np0005544966.novalocal runuser[89917]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:21:01 np0005544966.novalocal runuser[89917]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:21:01 np0005544966.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 03 22:21:01 np0005544966.novalocal runuser[89972]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:21:01 np0005544966.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 03 22:21:02 np0005544966.novalocal runuser[89972]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:21:02 np0005544966.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service. Dec 03 22:21:02 np0005544966.novalocal runuser[90030]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:21:03 np0005544966.novalocal runuser[90030]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 8be89f30-e063-4a95-8cc6-55462da63eb6 Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 2d13e5c4-b944-4718-a692-fd7b4eb8ff8d Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 72c9e7e5-7686-4aa1-97c9-d239cc89900b Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 13bd19ed-7b0b-4ca7-874b-e4ea565f41a2 Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 4f67029a-4be1-4726-b3ee-b06032f75599 Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l c1f289d5-82ba-422e-831b-9038a9070be9 Dec 03 22:21:03 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 23567652-1def-41c7-aaa9-614529649497 Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l bca524ab-d086-4eab-adce-14f05410ea67 Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 4518333a-a129-4997-819a-cfb36ea29d1e Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 03 22:21:03 np0005544966.novalocal systemd-rc-local-generator[90160]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:03 np0005544966.novalocal systemd-sysv-generator[90164]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 07107bc8-3dac-4200-b4bb-b4a78bbd97c7 Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 03 22:21:03 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l f1dea5fd-250b-49f4-a040-8e693087cf80 Dec 03 22:21:04 np0005544966.novalocal setroubleshoot[89971]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 03 22:21:04 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:04 np0005544966.novalocal systemd[1]: Started OpenStack Octavia Health-Manager service. Dec 03 22:21:04 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:04 np0005544966.novalocal systemd-rc-local-generator[90195]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:04 np0005544966.novalocal systemd-sysv-generator[90199]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:04 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:04 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:05 np0005544966.novalocal systemd-sysv-generator[90226]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:05 np0005544966.novalocal systemd-rc-local-generator[90223]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:05 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:05 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:05 np0005544966.novalocal systemd-sysv-generator[90261]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:05 np0005544966.novalocal systemd-rc-local-generator[90256]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:05 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:06 np0005544966.novalocal systemd[1]: Started OpenStack Octavia Housekeeping service. Dec 03 22:21:06 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:06 np0005544966.novalocal systemd-sysv-generator[90290]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:06 np0005544966.novalocal systemd-rc-local-generator[90287]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:06 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:06 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:06 np0005544966.novalocal systemd-rc-local-generator[90313]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:06 np0005544966.novalocal systemd-sysv-generator[90319]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:06 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:07 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:07 np0005544966.novalocal systemd-rc-local-generator[90346]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:07 np0005544966.novalocal systemd-sysv-generator[90350]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:07 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:08 np0005544966.novalocal systemd[1]: Started OpenStack Octavia Driver Agent service. Dec 03 22:21:08 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:08 np0005544966.novalocal systemd-sysv-generator[90383]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:08 np0005544966.novalocal systemd-rc-local-generator[90380]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:08 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:08 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:08 np0005544966.novalocal systemd-rc-local-generator[90410]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:08 np0005544966.novalocal systemd-sysv-generator[90413]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:08 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:09 np0005544966.novalocal runuser[90420]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:21:09 np0005544966.novalocal runuser[90420]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:21:09 np0005544966.novalocal runuser[90475]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:21:10 np0005544966.novalocal runuser[90475]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:21:10 np0005544966.novalocal runuser[90529]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:21:11 np0005544966.novalocal runuser[90529]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:21:11 np0005544966.novalocal runuser[90587]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:21:12 np0005544966.novalocal runuser[90587]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:21:13 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:13 np0005544966.novalocal systemd-sysv-generator[90679]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:13 np0005544966.novalocal systemd-rc-local-generator[90675]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:13 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:13 np0005544966.novalocal systemd[1]: Started OpenStack Manila Scheduler. Dec 03 22:21:13 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:13 np0005544966.novalocal systemd-rc-local-generator[90709]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:13 np0005544966.novalocal systemd-sysv-generator[90712]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:13 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:14 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Deactivated successfully. Dec 03 22:21:14 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Consumed 1.181s CPU time. Dec 03 22:21:14 np0005544966.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 03 22:21:14 np0005544966.novalocal systemd[1]: setroubleshootd.service: Consumed 1.635s CPU time. Dec 03 22:21:14 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:14 np0005544966.novalocal systemd-rc-local-generator[90741]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:14 np0005544966.novalocal systemd-sysv-generator[90745]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:14 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:14 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:15 np0005544966.novalocal systemd-rc-local-generator[90775]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:15 np0005544966.novalocal systemd-sysv-generator[90778]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:15 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:15 np0005544966.novalocal systemd[1]: Started OpenStack Manila Share Service. Dec 03 22:21:15 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:15 np0005544966.novalocal systemd-sysv-generator[90812]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:15 np0005544966.novalocal systemd-rc-local-generator[90807]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:15 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:16 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:16 np0005544966.novalocal systemd-rc-local-generator[90836]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:16 np0005544966.novalocal systemd-sysv-generator[90839]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:16 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:16 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:16 np0005544966.novalocal systemd-rc-local-generator[90869]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:16 np0005544966.novalocal systemd-sysv-generator[90873]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:17 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:17 np0005544966.novalocal sudo[90878]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/privsep-helper --config-file /usr/share/manila/manila-dist.conf --config-file /etc/manila/manila.conf --privsep_context manila.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpi6dyap4i/privsep.sock Dec 03 22:21:17 np0005544966.novalocal systemd[1]: Started Session c27 of User root. Dec 03 22:21:17 np0005544966.novalocal sudo[90878]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=978) Dec 03 22:21:17 np0005544966.novalocal systemd[1]: Started OpenStack Manila Data Server. Dec 03 22:21:17 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:17 np0005544966.novalocal sudo[90878]: pam_unix(sudo:session): session closed for user root Dec 03 22:21:17 np0005544966.novalocal systemd-rc-local-generator[90907]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:17 np0005544966.novalocal systemd-sysv-generator[90910]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:17 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:18 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:18 np0005544966.novalocal systemd-rc-local-generator[90938]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:18 np0005544966.novalocal systemd-sysv-generator[90942]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:18 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:19 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:19 np0005544966.novalocal systemd-sysv-generator[90974]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:19 np0005544966.novalocal systemd-rc-local-generator[90969]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:19 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:19 np0005544966.novalocal systemd[1]: Starting One-time temporary TLS key generation for httpd.service... Dec 03 22:21:19 np0005544966.novalocal systemd[1]: httpd-init.service: Deactivated successfully. Dec 03 22:21:19 np0005544966.novalocal systemd[1]: Finished One-time temporary TLS key generation for httpd.service. Dec 03 22:21:19 np0005544966.novalocal systemd[1]: Starting The Apache HTTP Server... Dec 03 22:21:20 np0005544966.novalocal python3[90985]: /usr/lib/python3.9/site-packages/django/conf/__init__.py:267: RemovedInDjango50Warning: The USE_L10N setting is deprecated. Starting with Django 5.0, localized formatting of data will always be enabled. For example Django will display numbers and dates using the format of the current locale. Dec 03 22:21:20 np0005544966.novalocal python3[90985]: warnings.warn(USE_L10N_DEPRECATED_MSG, RemovedInDjango50Warning) Dec 03 22:21:20 np0005544966.novalocal python3[90985]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Dec 03 22:21:20 np0005544966.novalocal python3[90985]: version_info = version.StrictVersion(__version__).version Dec 03 22:21:22 np0005544966.novalocal python3[90986]: /usr/lib/python3.9/site-packages/django/conf/__init__.py:267: RemovedInDjango50Warning: The USE_L10N setting is deprecated. Starting with Django 5.0, localized formatting of data will always be enabled. For example Django will display numbers and dates using the format of the current locale. Dec 03 22:21:22 np0005544966.novalocal python3[90986]: warnings.warn(USE_L10N_DEPRECATED_MSG, RemovedInDjango50Warning) Dec 03 22:21:22 np0005544966.novalocal python3[90986]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Dec 03 22:21:22 np0005544966.novalocal python3[90986]: version_info = version.StrictVersion(__version__).version Dec 03 22:21:31 np0005544966.novalocal httpd[90996]: Server configured, listening on: ::1 port 9876, ... Dec 03 22:21:31 np0005544966.novalocal systemd[1]: Started The Apache HTTP Server. Dec 03 22:21:31 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:31 np0005544966.novalocal systemd-rc-local-generator[91107]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:31 np0005544966.novalocal systemd-sysv-generator[91110]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:31 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:32 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:21:32 np0005544966.novalocal systemd-rc-local-generator[91137]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:21:32 np0005544966.novalocal systemd-sysv-generator[91140]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:21:32 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:21:32 np0005544966.novalocal crontab[91146]: (root) REPLACE (keystone) Dec 03 22:21:35 np0005544966.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 03 22:21:36 np0005544966.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 03 22:21:36 np0005544966.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service. Dec 03 22:21:37 np0005544966.novalocal setroubleshoot[91149]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l f8ab6db9-03f1-4f7c-90b1-89400d6846fa Dec 03 22:21:37 np0005544966.novalocal setroubleshoot[91149]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:21:37 np0005544966.novalocal setroubleshoot[91149]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 4c0af183-328b-4a36-904c-a5d86bcaacf1 Dec 03 22:21:37 np0005544966.novalocal setroubleshoot[91149]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:21:37 np0005544966.novalocal setroubleshoot[91149]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). For complete SELinux messages run: sealert -l ff0a80d7-bbf4-4b01-9403-29015a4e5d7c Dec 03 22:21:37 np0005544966.novalocal setroubleshoot[91149]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:21:37 np0005544966.novalocal setroubleshoot[91149]: failed to retrieve rpm info for path '/var/lib/keystone/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4': Dec 03 22:21:37 np0005544966.novalocal setroubleshoot[91149]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. For complete SELinux messages run: sealert -l 37ea72c0-7153-400c-9065-b6ee0eb75d86 Dec 03 22:21:38 np0005544966.novalocal setroubleshoot[91149]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:21:48 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Deactivated successfully. Dec 03 22:21:48 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Consumed 1.245s CPU time. Dec 03 22:21:48 np0005544966.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 03 22:21:48 np0005544966.novalocal systemd[1]: setroubleshootd.service: Consumed 1.221s CPU time. Dec 03 22:22:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:22:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:22:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:22:01 np0005544966.novalocal sudo[91184]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:22:01 np0005544966.novalocal systemd[1]: Started Session c28 of User root. Dec 03 22:22:01 np0005544966.novalocal sudo[91184]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:22:02 np0005544966.novalocal sudo[91184]: pam_unix(sudo:session): session closed for user root Dec 03 22:22:02 np0005544966.novalocal systemd[1]: session-c28.scope: Deactivated successfully. Dec 03 22:22:02 np0005544966.novalocal sudo[91192]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:22:02 np0005544966.novalocal systemd[1]: Started Session c29 of User root. Dec 03 22:22:02 np0005544966.novalocal sudo[91192]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:22:02 np0005544966.novalocal sudo[91192]: pam_unix(sudo:session): session closed for user root Dec 03 22:22:02 np0005544966.novalocal systemd[1]: session-c29.scope: Deactivated successfully. Dec 03 22:22:02 np0005544966.novalocal sudo[91197]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:22:02 np0005544966.novalocal systemd[1]: Started Session c30 of User root. Dec 03 22:22:02 np0005544966.novalocal sudo[91197]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:22:03 np0005544966.novalocal sudo[91197]: pam_unix(sudo:session): session closed for user root Dec 03 22:22:03 np0005544966.novalocal systemd[1]: session-c30.scope: Deactivated successfully. Dec 03 22:22:03 np0005544966.novalocal sudo[91237]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:22:03 np0005544966.novalocal systemd[1]: Started Session c31 of User root. Dec 03 22:22:03 np0005544966.novalocal sudo[91237]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:22:03 np0005544966.novalocal sshd-session[91190]: Invalid user demo from 103.19.254.14 port 48734 Dec 03 22:22:03 np0005544966.novalocal sudo[91237]: pam_unix(sudo:session): session closed for user root Dec 03 22:22:03 np0005544966.novalocal sshd-session[91190]: Received disconnect from 103.19.254.14 port 48734:11: Bye Bye [preauth] Dec 03 22:22:03 np0005544966.novalocal sshd-session[91190]: Disconnected from invalid user demo 103.19.254.14 port 48734 [preauth] Dec 03 22:22:03 np0005544966.novalocal systemd[1]: session-c31.scope: Deactivated successfully. Dec 03 22:22:08 np0005544966.novalocal octavia-health-manager[90358]: /usr/lib/python3.9/site-packages/octavia/db/repositories.py:1594: SAWarning: Coercing Subquery object into a select() for use in IN(); please pass a select() construct explicitly Dec 03 22:22:08 np0005544966.novalocal octavia-health-manager[90358]: self.model_class.amphora_id.in_(expired_ids_query) Dec 03 22:22:48 np0005544966.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 03 22:22:49 np0005544966.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 03 22:22:49 np0005544966.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service. Dec 03 22:22:50 np0005544966.novalocal setroubleshoot[91272]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 5cab2738-7219-4bbd-a475-91468b9121dd Dec 03 22:22:50 np0005544966.novalocal setroubleshoot[91272]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 03 22:22:51 np0005544966.novalocal setroubleshoot[91272]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e3afe02e-987c-4c4c-8b3b-bb019ad3478a Dec 03 22:22:51 np0005544966.novalocal setroubleshoot[91272]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 03 22:22:51 np0005544966.novalocal setroubleshoot[91272]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 0f66c7d2-f97c-44cd-8f27-0a2322b375c4 Dec 03 22:22:51 np0005544966.novalocal setroubleshoot[91272]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 03 22:22:53 np0005544966.novalocal setroubleshoot[91272]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 5cab2738-7219-4bbd-a475-91468b9121dd Dec 03 22:22:53 np0005544966.novalocal setroubleshoot[91272]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 03 22:22:53 np0005544966.novalocal setroubleshoot[91272]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e3afe02e-987c-4c4c-8b3b-bb019ad3478a Dec 03 22:22:53 np0005544966.novalocal setroubleshoot[91272]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 03 22:22:54 np0005544966.novalocal setroubleshoot[91272]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 0f66c7d2-f97c-44cd-8f27-0a2322b375c4 Dec 03 22:22:54 np0005544966.novalocal setroubleshoot[91272]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 03 22:22:55 np0005544966.novalocal systemd[1]: virtqemud.service: Deactivated successfully. Dec 03 22:23:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:23:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:23:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:23:01 np0005544966.novalocal sudo[91304]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:23:01 np0005544966.novalocal systemd[1]: Started Session c32 of User root. Dec 03 22:23:01 np0005544966.novalocal sudo[91304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:02 np0005544966.novalocal sshd[44935]: Timeout before authentication for connection from 14.103.118.167 to 38.102.83.17, pid = 89962 Dec 03 22:23:02 np0005544966.novalocal sudo[91304]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:02 np0005544966.novalocal systemd[1]: session-c32.scope: Deactivated successfully. Dec 03 22:23:02 np0005544966.novalocal sudo[91308]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:23:02 np0005544966.novalocal systemd[1]: Started Session c33 of User root. Dec 03 22:23:02 np0005544966.novalocal sudo[91308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:02 np0005544966.novalocal sudo[91308]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:02 np0005544966.novalocal systemd[1]: session-c33.scope: Deactivated successfully. Dec 03 22:23:02 np0005544966.novalocal sudo[91315]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:23:02 np0005544966.novalocal systemd[1]: Started Session c34 of User root. Dec 03 22:23:02 np0005544966.novalocal sudo[91315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:03 np0005544966.novalocal sudo[91315]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:03 np0005544966.novalocal systemd[1]: session-c34.scope: Deactivated successfully. Dec 03 22:23:03 np0005544966.novalocal sudo[91327]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:23:03 np0005544966.novalocal systemd[1]: Started Session c35 of User root. Dec 03 22:23:03 np0005544966.novalocal sudo[91327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:03 np0005544966.novalocal sudo[91327]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:03 np0005544966.novalocal systemd[1]: session-c35.scope: Deactivated successfully. Dec 03 22:23:04 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully. Dec 03 22:23:04 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Consumed 1.253s CPU time. Dec 03 22:23:04 np0005544966.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 03 22:23:04 np0005544966.novalocal systemd[1]: setroubleshootd.service: Consumed 1.291s CPU time. Dec 03 22:23:20 np0005544966.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 03 22:23:20 np0005544966.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 03 22:23:21 np0005544966.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service. Dec 03 22:23:22 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 5cab2738-7219-4bbd-a475-91468b9121dd Dec 03 22:23:22 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 03 22:23:22 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e3afe02e-987c-4c4c-8b3b-bb019ad3478a Dec 03 22:23:22 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 03 22:23:22 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 0f66c7d2-f97c-44cd-8f27-0a2322b375c4 Dec 03 22:23:22 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 03 22:23:22 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 5cab2738-7219-4bbd-a475-91468b9121dd Dec 03 22:23:22 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 03 22:23:22 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e3afe02e-987c-4c4c-8b3b-bb019ad3478a Dec 03 22:23:22 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 03 22:23:23 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 0f66c7d2-f97c-44cd-8f27-0a2322b375c4 Dec 03 22:23:23 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 03 22:23:26 np0005544966.novalocal sudo[91399]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-80775758-f3c0-4652-9e37-3c4d4e035cda cinder-volumes/cinder-volumes-pool Dec 03 22:23:26 np0005544966.novalocal systemd[1]: Started Session c36 of User root. Dec 03 22:23:26 np0005544966.novalocal sudo[91399]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:26 np0005544966.novalocal dmeventd[88196]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool. Dec 03 22:23:27 np0005544966.novalocal sshd-session[91400]: Invalid user gitlab from 103.19.254.14 port 51066 Dec 03 22:23:27 np0005544966.novalocal sshd-session[91400]: Received disconnect from 103.19.254.14 port 51066:11: Bye Bye [preauth] Dec 03 22:23:27 np0005544966.novalocal sshd-session[91400]: Disconnected from invalid user gitlab 103.19.254.14 port 51066 [preauth] Dec 03 22:23:28 np0005544966.novalocal dmeventd[88196]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Dec 03 22:23:28 np0005544966.novalocal lvm[91458]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:23:28 np0005544966.novalocal lvm[91458]: VG cinder-volumes finished Dec 03 22:23:28 np0005544966.novalocal sudo[91399]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:28 np0005544966.novalocal systemd[1]: session-c36.scope: Deactivated successfully. Dec 03 22:23:30 np0005544966.novalocal sudo[91460]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpbt7w95hf/privsep.sock Dec 03 22:23:30 np0005544966.novalocal systemd[1]: Started Session c37 of User root. Dec 03 22:23:30 np0005544966.novalocal sudo[91460]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l fca8329b-9530-4e2d-b72e-94d4eb0cacca Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 43844c38-7adb-499a-9e25-e016434af85a Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 20a46fd5-7a77-44e8-a79f-fb7670ebeec9 Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l ec5899b6-912b-4a94-8f62-6bc62f740038 Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 0a4573b9-7a5c-4d9a-922a-c7713cea14c9 Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 4bb7bf86-0fd5-4061-8015-0db8febe8ca1 Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:23:30 np0005544966.novalocal sudo[91460]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 0a4573b9-7a5c-4d9a-922a-c7713cea14c9 Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 4bb7bf86-0fd5-4061-8015-0db8febe8ca1 Dec 03 22:23:30 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l a9944e06-6207-43c6-981e-e83e3e15a5c9 Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 7e4d5430-c0a5-46f7-9b8b-7b7980a155c1 Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: failed to retrieve rpm info for path '/dev/vda1': Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2587fec0-e08e-43c4-a02c-3b5f6f5ef2de Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 6843a742-1de6-43af-90db-e83e7a9c8a06 Dec 03 22:23:31 np0005544966.novalocal sudo[91491]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-80775758-f3c0-4652-9e37-3c4d4e035cda Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal systemd[1]: Started Session c38 of User root. Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 26670ce4-25d7-41b6-8333-b50e0666ef3e Dec 03 22:23:31 np0005544966.novalocal sudo[91491]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 05736fc0-a88a-4b76-b700-c36c4a378c7a Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 4ae52dd7-20bd-4f50-8b70-2cfc8c1abc57 Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l a69fe814-d541-478d-a2da-ec2cad278192 Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l f16a2be4-ad1b-4cc0-8058-8598bdbffa2c Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 93e4d8ce-4c10-48e2-9fdd-d80dec167666 Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-OYIYQm. For complete SELinux messages run: sealert -l 61276f37-27ce-49f5-9d03-625e6d1ceb6f Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-OYIYQm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-OYIYQm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-OYIYQm. For complete SELinux messages run: sealert -l 903e8707-5c57-4e80-b7ad-5562fd599575 Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-OYIYQm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-OYIYQm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l ed2a0b03-e080-49ee-8caa-01bea4925c3c Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 381ff37e-a798-402f-8e74-2456f4f27ef2 Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 3dec3897-eec5-402f-be7e-b93802eecf64 Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l fdbdfadf-1460-4ee4-b1ce-40b028a0da5c Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l c8f8922f-29ab-4480-bf0e-79f11c28816e Dec 03 22:23:31 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:31 np0005544966.novalocal sudo[91491]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:31 np0005544966.novalocal systemd[1]: session-c38.scope: Deactivated successfully. Dec 03 22:23:31 np0005544966.novalocal sudo[91495]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-80775758-f3c0-4652-9e37-3c4d4e035cda iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda 7VitP6M6LUmRSgJtEL5B GP64gpUeMS8zRXxA False -p3260 -a::1 Dec 03 22:23:31 np0005544966.novalocal systemd[1]: Started Session c39 of User root. Dec 03 22:23:31 np0005544966.novalocal sudo[91495]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:32 np0005544966.novalocal sudo[91495]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:32 np0005544966.novalocal systemd[1]: session-c39.scope: Deactivated successfully. Dec 03 22:23:32 np0005544966.novalocal sudo[91512]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 03 22:23:32 np0005544966.novalocal systemd[1]: Started Session c40 of User root. Dec 03 22:23:32 np0005544966.novalocal sudo[91512]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:33 np0005544966.novalocal sudo[91512]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:33 np0005544966.novalocal systemd[1]: session-c40.scope: Deactivated successfully. Dec 03 22:23:33 np0005544966.novalocal sudo[91517]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:23:33 np0005544966.novalocal systemd[1]: Started Session c41 of User root. Dec 03 22:23:33 np0005544966.novalocal sudo[91517]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:33 np0005544966.novalocal sudo[91517]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:33 np0005544966.novalocal systemd[1]: session-c41.scope: Deactivated successfully. Dec 03 22:23:33 np0005544966.novalocal sudo[91522]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda 7VitP6M6LUmRSgJtEL5B GP64gpUeMS8zRXxA iqn.1994-05.com.redhat:f83f525515f0 Dec 03 22:23:33 np0005544966.novalocal systemd[1]: Started Session c42 of User root. Dec 03 22:23:33 np0005544966.novalocal sudo[91522]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:34 np0005544966.novalocal sudo[91522]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:34 np0005544966.novalocal systemd[1]: session-c42.scope: Deactivated successfully. Dec 03 22:23:34 np0005544966.novalocal sudo[91527]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:23:34 np0005544966.novalocal systemd[1]: Started Session c43 of User root. Dec 03 22:23:34 np0005544966.novalocal sudo[91527]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:34 np0005544966.novalocal sudo[91527]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:34 np0005544966.novalocal systemd[1]: session-c43.scope: Deactivated successfully. Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 153ca3c4-0890-4296-bad3-25730454a1fa Dec 03 22:23:35 np0005544966.novalocal kernel: iscsi: registered transport (tcp) Dec 03 22:23:35 np0005544966.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal iscsid[73267]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda, portal: ::1,3260] through [iface: default] is operational now Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 7ec2e3c3-6022-43ed-806c-4b14c8c4fa3d Dec 03 22:23:35 np0005544966.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Dec 03 22:23:35 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Dec 03 22:23:35 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014054e0efe61fc5f4393a87e91355 port group 0 rel port 1 Dec 03 22:23:35 np0005544966.novalocal kernel: scsi 2:0:0:0: Attached scsi generic sg1 type 0 Dec 03 22:23:35 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: transition timeout set to 60 seconds Dec 03 22:23:35 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Dec 03 22:23:35 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Dec 03 22:23:35 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Dec 03 22:23:35 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Dec 03 22:23:35 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Dec 03 22:23:35 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:23:35 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Dec 03 22:23:35 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Dec 03 22:23:35 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:23:35 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l e7e5dad9-7875-4617-863f-e4254ed55259 Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 710e17f3-48e9-4a80-b0da-0427e0496273 Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l f012745c-62fe-4408-8eea-46783af563fa Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 6a490f9a-b3ad-412a-9fab-6b3b779733c2 Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 33f1af2d-b238-49dc-9839-8914d03529c4 Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 9acb8a7c-4df4-4e60-8805-05789943f0c0 Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 762643b1-ee51-43d2-8af9-341031b1480c Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l bbeb825b-8725-46db-90e8-642caacc86f1 Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 678aa428-330a-4077-8d33-2829c09eb3e6 Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 6baf4929-fad2-481f-bb07-6aa5560db58c Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 248e313f-319d-406e-b4ef-29b728ca04ad Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. For complete SELinux messages run: sealert -l 07743de4-080a-41a4-ad6c-9d46ac6fb703 Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. For complete SELinux messages run: sealert -l ba8faddf-3676-4482-b7a6-c4b75b0f26aa Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e23c8d58-3845-4c6d-8ec2-fe0c91fd627a Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 710e17f3-48e9-4a80-b0da-0427e0496273 Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l f012745c-62fe-4408-8eea-46783af563fa Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. For complete SELinux messages run: sealert -l ba8faddf-3676-4482-b7a6-c4b75b0f26aa Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e23c8d58-3845-4c6d-8ec2-fe0c91fd627a Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. For complete SELinux messages run: sealert -l 4af158d4-4245-449b-b187-500d18486f97 Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 6279eb1f-1d33-4bf4-9e61-7dde8e880c87 Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 9acb8a7c-4df4-4e60-8805-05789943f0c0 Dec 03 22:23:35 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:36 np0005544966.novalocal sudo[91582]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Dec 03 22:23:36 np0005544966.novalocal systemd[1]: Started Session c44 of User root. Dec 03 22:23:36 np0005544966.novalocal sudo[91582]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 03 22:23:36 np0005544966.novalocal setroubleshoot[91369]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Dec 03 22:23:36 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l c2234de2-7f86-4b1d-9b0d-5705aed11d8c Dec 03 22:23:36 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:23:36 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 49a1db85-aa8f-4217-9bb7-ac8f854aa519 Dec 03 22:23:36 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:23:36 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l d6428724-4d63-4664-923d-20e8c6e9546b Dec 03 22:23:36 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:23:36 np0005544966.novalocal setroubleshoot[91369]: failed to retrieve rpm info for path '/dev/sda': Dec 03 22:23:36 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2587fec0-e08e-43c4-a02c-3b5f6f5ef2de Dec 03 22:23:36 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:36 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l fca8329b-9530-4e2d-b72e-94d4eb0cacca Dec 03 22:23:36 np0005544966.novalocal sudo[91582]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:37 np0005544966.novalocal systemd[1]: session-c44.scope: Deactivated successfully. Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 43844c38-7adb-499a-9e25-e016434af85a Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 20a46fd5-7a77-44e8-a79f-fb7670ebeec9 Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l ec5899b6-912b-4a94-8f62-6bc62f740038 Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 0a4573b9-7a5c-4d9a-922a-c7713cea14c9 Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 4bb7bf86-0fd5-4061-8015-0db8febe8ca1 Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2587fec0-e08e-43c4-a02c-3b5f6f5ef2de Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 7dcbd8ef-0826-45ac-812a-0bf7e72248a9 Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l ce3ef4c5-fef1-45cd-a5ad-b2f9c44848b6 Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 26670ce4-25d7-41b6-8333-b50e0666ef3e Dec 03 22:23:37 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:38 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 05736fc0-a88a-4b76-b700-c36c4a378c7a Dec 03 22:23:38 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:38 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:23:38 np0005544966.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 03 22:23:38 np0005544966.novalocal kernel: GPT:229375 != 2097151 Dec 03 22:23:38 np0005544966.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Dec 03 22:23:38 np0005544966.novalocal kernel: GPT:229375 != 2097151 Dec 03 22:23:38 np0005544966.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Dec 03 22:23:38 np0005544966.novalocal kernel: sda: sda1 sda15 Dec 03 22:23:38 np0005544966.novalocal sudo[91595]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Dec 03 22:23:38 np0005544966.novalocal systemd[1]: Started Session c45 of User root. Dec 03 22:23:38 np0005544966.novalocal sudo[91595]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 03 22:23:39 np0005544966.novalocal sudo[91595]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:39 np0005544966.novalocal systemd[1]: session-c45.scope: Deactivated successfully. Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 153ca3c4-0890-4296-bad3-25730454a1fa Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 33f1af2d-b238-49dc-9839-8914d03529c4 Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:39 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 7ec2e3c3-6022-43ed-806c-4b14c8c4fa3d Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l e7e5dad9-7875-4617-863f-e4254ed55259 Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 6a490f9a-b3ad-412a-9fab-6b3b779733c2 Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 762643b1-ee51-43d2-8af9-341031b1480c Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l fff927b8-9704-47a1-9d62-a73d701b25fb Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l a7bb5fbe-9186-479c-b1aa-589c2297650e Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 9354de05-d7d0-412b-a850-4bdf163cedda Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 03 22:23:39 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: Detached Dec 03 22:23:39 np0005544966.novalocal iscsid[73267]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda, portal: ::1,3260] through [iface: default] is shutdown. Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 6843a742-1de6-43af-90db-e83e7a9c8a06 Dec 03 22:23:39 np0005544966.novalocal sudo[91638]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda iqn.1994-05.com.redhat:f83f525515f0 Dec 03 22:23:39 np0005544966.novalocal systemd[1]: Started Session c46 of User root. Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:39 np0005544966.novalocal sudo[91638]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda. For complete SELinux messages run: sealert -l bbeb825b-8725-46db-90e8-642caacc86f1 Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l 98bd8536-7f5b-44bb-8a82-a4ff1fa22fb7 Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 23c4ef03-5381-4931-8c40-d2df3e9fd530 Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda. For complete SELinux messages run: sealert -l 5fe6726b-1757-4c88-93df-726a5f6b5198 Dec 03 22:23:39 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:40 np0005544966.novalocal sudo[91638]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:40 np0005544966.novalocal systemd[1]: session-c46.scope: Deactivated successfully. Dec 03 22:23:40 np0005544966.novalocal sudo[91645]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:23:40 np0005544966.novalocal systemd[1]: Started Session c47 of User root. Dec 03 22:23:40 np0005544966.novalocal sudo[91645]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:40 np0005544966.novalocal sudo[91645]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:40 np0005544966.novalocal systemd[1]: session-c47.scope: Deactivated successfully. Dec 03 22:23:40 np0005544966.novalocal sudo[91650]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 03 22:23:40 np0005544966.novalocal systemd[1]: Started Session c48 of User root. Dec 03 22:23:40 np0005544966.novalocal sudo[91650]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:41 np0005544966.novalocal sudo[91650]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:41 np0005544966.novalocal systemd[1]: session-c48.scope: Deactivated successfully. Dec 03 22:23:41 np0005544966.novalocal sudo[91656]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda Dec 03 22:23:41 np0005544966.novalocal systemd[1]: Started Session c49 of User root. Dec 03 22:23:41 np0005544966.novalocal sudo[91656]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:42 np0005544966.novalocal sudo[91656]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:42 np0005544966.novalocal systemd[1]: session-c49.scope: Deactivated successfully. Dec 03 22:23:42 np0005544966.novalocal sudo[91661]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:23:42 np0005544966.novalocal systemd[1]: Started Session c50 of User root. Dec 03 22:23:42 np0005544966.novalocal sudo[91661]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:42 np0005544966.novalocal sudo[91661]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:42 np0005544966.novalocal systemd[1]: session-c50.scope: Deactivated successfully. Dec 03 22:23:47 np0005544966.novalocal sudo[91670]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-a41f35e7-1772-40e0-8afd-45f328711853 cinder-volumes/cinder-volumes-pool Dec 03 22:23:47 np0005544966.novalocal systemd[1]: Started Session c51 of User root. Dec 03 22:23:47 np0005544966.novalocal sudo[91670]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:48 np0005544966.novalocal lvm[91681]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:23:48 np0005544966.novalocal lvm[91681]: VG cinder-volumes finished Dec 03 22:23:48 np0005544966.novalocal sudo[91670]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:48 np0005544966.novalocal systemd[1]: session-c51.scope: Deactivated successfully. Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l bb96cb05-6104-4683-ad81-8c310377ace6 Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 515c83f5-700f-49b0-b06c-8c1850a6e996 Dec 03 22:23:49 np0005544966.novalocal sudo[91695]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-a41f35e7-1772-40e0-8afd-45f328711853 Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal systemd[1]: Started Session c52 of User root. Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2587fec0-e08e-43c4-a02c-3b5f6f5ef2de Dec 03 22:23:49 np0005544966.novalocal sudo[91695]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 6843a742-1de6-43af-90db-e83e7a9c8a06 Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 26670ce4-25d7-41b6-8333-b50e0666ef3e Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 05736fc0-a88a-4b76-b700-c36c4a378c7a Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 6d2dd558-fcfe-49ce-969d-86892192769b Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l a69fe814-d541-478d-a2da-ec2cad278192 Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l f16a2be4-ad1b-4cc0-8058-8598bdbffa2c Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 93e4d8ce-4c10-48e2-9fdd-d80dec167666 Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-iPtbvz. For complete SELinux messages run: sealert -l 903e8707-5c57-4e80-b7ad-5562fd599575 Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-iPtbvz. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-iPtbvz file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l ed2a0b03-e080-49ee-8caa-01bea4925c3c Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l c8f8922f-29ab-4480-bf0e-79f11c28816e Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l a14d8478-325b-4876-a9da-1bf59004ab38 Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l fdbdfadf-1460-4ee4-b1ce-40b028a0da5c Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 381ff37e-a798-402f-8e74-2456f4f27ef2 Dec 03 22:23:49 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:49 np0005544966.novalocal sudo[91695]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:49 np0005544966.novalocal systemd[1]: session-c52.scope: Deactivated successfully. Dec 03 22:23:49 np0005544966.novalocal sudo[91700]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-a41f35e7-1772-40e0-8afd-45f328711853 iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853 HF94ew5VPyjPzgeF8bvL 96yP3hN6aSSwDwxx False -p3260 -a::1 Dec 03 22:23:49 np0005544966.novalocal systemd[1]: Started Session c53 of User root. Dec 03 22:23:49 np0005544966.novalocal sudo[91700]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:50 np0005544966.novalocal sudo[91700]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:50 np0005544966.novalocal systemd[1]: session-c53.scope: Deactivated successfully. Dec 03 22:23:50 np0005544966.novalocal sudo[91706]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 03 22:23:50 np0005544966.novalocal systemd[1]: Started Session c54 of User root. Dec 03 22:23:50 np0005544966.novalocal sudo[91706]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:50 np0005544966.novalocal sudo[91706]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:50 np0005544966.novalocal systemd[1]: session-c54.scope: Deactivated successfully. Dec 03 22:23:51 np0005544966.novalocal sudo[91711]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:23:51 np0005544966.novalocal systemd[1]: Started Session c55 of User root. Dec 03 22:23:51 np0005544966.novalocal sudo[91711]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:51 np0005544966.novalocal sudo[91711]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:51 np0005544966.novalocal systemd[1]: session-c55.scope: Deactivated successfully. Dec 03 22:23:51 np0005544966.novalocal sudo[91716]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853 HF94ew5VPyjPzgeF8bvL 96yP3hN6aSSwDwxx iqn.1994-05.com.redhat:f83f525515f0 Dec 03 22:23:51 np0005544966.novalocal systemd[1]: Started Session c56 of User root. Dec 03 22:23:51 np0005544966.novalocal sudo[91716]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:52 np0005544966.novalocal sudo[91716]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:52 np0005544966.novalocal systemd[1]: session-c56.scope: Deactivated successfully. Dec 03 22:23:52 np0005544966.novalocal sudo[91721]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:23:52 np0005544966.novalocal systemd[1]: Started Session c57 of User root. Dec 03 22:23:52 np0005544966.novalocal sudo[91721]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:52 np0005544966.novalocal sudo[91721]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:52 np0005544966.novalocal systemd[1]: session-c57.scope: Deactivated successfully. Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 153ca3c4-0890-4296-bad3-25730454a1fa Dec 03 22:23:53 np0005544966.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Dec 03 22:23:53 np0005544966.novalocal iscsid[73267]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853, portal: ::1,3260] through [iface: default] is operational now Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 7ec2e3c3-6022-43ed-806c-4b14c8c4fa3d Dec 03 22:23:53 np0005544966.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Dec 03 22:23:53 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Dec 03 22:23:53 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405aefdb6465f514214b49d29ee0 port group 0 rel port 1 Dec 03 22:23:53 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Dec 03 22:23:53 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Dec 03 22:23:53 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Dec 03 22:23:53 np0005544966.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Dec 03 22:23:53 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Dec 03 22:23:53 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:23:53 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Dec 03 22:23:53 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Dec 03 22:23:53 np0005544966.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Dec 03 22:23:53 np0005544966.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Dec 03 22:23:53 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:23:53 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l e7e5dad9-7875-4617-863f-e4254ed55259 Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 710e17f3-48e9-4a80-b0da-0427e0496273 Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l f012745c-62fe-4408-8eea-46783af563fa Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 6a490f9a-b3ad-412a-9fab-6b3b779733c2 Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 33f1af2d-b238-49dc-9839-8914d03529c4 Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 9acb8a7c-4df4-4e60-8805-05789943f0c0 Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 762643b1-ee51-43d2-8af9-341031b1480c Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 33f1af2d-b238-49dc-9839-8914d03529c4 Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l bbeb825b-8725-46db-90e8-642caacc86f1 Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 678aa428-330a-4077-8d33-2829c09eb3e6 Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 6baf4929-fad2-481f-bb07-6aa5560db58c Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 248e313f-319d-406e-b4ef-29b728ca04ad Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853/::1,3260. For complete SELinux messages run: sealert -l 07743de4-080a-41a4-ad6c-9d46ac6fb703 Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853/::1,3260. For complete SELinux messages run: sealert -l ba8faddf-3676-4482-b7a6-c4b75b0f26aa Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e23c8d58-3845-4c6d-8ec2-fe0c91fd627a Dec 03 22:23:53 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:54 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l c2234de2-7f86-4b1d-9b0d-5705aed11d8c Dec 03 22:23:54 np0005544966.novalocal sudo[91775]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Dec 03 22:23:54 np0005544966.novalocal systemd[1]: Started Session c58 of User root. Dec 03 22:23:54 np0005544966.novalocal sudo[91775]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 03 22:23:54 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:23:54 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 49a1db85-aa8f-4217-9bb7-ac8f854aa519 Dec 03 22:23:54 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:23:54 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l d6428724-4d63-4664-923d-20e8c6e9546b Dec 03 22:23:54 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:23:54 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2587fec0-e08e-43c4-a02c-3b5f6f5ef2de Dec 03 22:23:54 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:54 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l fca8329b-9530-4e2d-b72e-94d4eb0cacca Dec 03 22:23:54 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:23:54 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 43844c38-7adb-499a-9e25-e016434af85a Dec 03 22:23:54 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:23:54 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 20a46fd5-7a77-44e8-a79f-fb7670ebeec9 Dec 03 22:23:54 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:23:54 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l ec5899b6-912b-4a94-8f62-6bc62f740038 Dec 03 22:23:55 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:23:55 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 0a4573b9-7a5c-4d9a-922a-c7713cea14c9 Dec 03 22:23:55 np0005544966.novalocal sudo[91775]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:55 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:23:55 np0005544966.novalocal systemd[1]: session-c58.scope: Deactivated successfully. Dec 03 22:23:55 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 4bb7bf86-0fd5-4061-8015-0db8febe8ca1 Dec 03 22:23:55 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:23:55 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l fca8329b-9530-4e2d-b72e-94d4eb0cacca Dec 03 22:23:55 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:23:55 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 7dcbd8ef-0826-45ac-812a-0bf7e72248a9 Dec 03 22:23:55 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Dec 03 22:23:55 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l ce3ef4c5-fef1-45cd-a5ad-b2f9c44848b6 Dec 03 22:23:55 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:23:55 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 26670ce4-25d7-41b6-8333-b50e0666ef3e Dec 03 22:23:55 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:55 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 05736fc0-a88a-4b76-b700-c36c4a378c7a Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:56 np0005544966.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 03 22:23:56 np0005544966.novalocal kernel: GPT:229375 != 2097151 Dec 03 22:23:56 np0005544966.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Dec 03 22:23:56 np0005544966.novalocal kernel: GPT:229375 != 2097151 Dec 03 22:23:56 np0005544966.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Dec 03 22:23:56 np0005544966.novalocal kernel: sda: sda1 sda15 Dec 03 22:23:56 np0005544966.novalocal sudo[91784]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Dec 03 22:23:56 np0005544966.novalocal systemd[1]: Started Session c59 of User root. Dec 03 22:23:56 np0005544966.novalocal sudo[91784]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 03 22:23:56 np0005544966.novalocal sudo[91784]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:56 np0005544966.novalocal systemd[1]: session-c59.scope: Deactivated successfully. Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 153ca3c4-0890-4296-bad3-25730454a1fa Dec 03 22:23:56 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853/::1,3260. For complete SELinux messages run: sealert -l ba8faddf-3676-4482-b7a6-c4b75b0f26aa Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 710e17f3-48e9-4a80-b0da-0427e0496273 Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l f012745c-62fe-4408-8eea-46783af563fa Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e23c8d58-3845-4c6d-8ec2-fe0c91fd627a Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853/::1,3260. For complete SELinux messages run: sealert -l a87463d1-7222-40e0-87a4-f3935a4c4705 Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 9acb8a7c-4df4-4e60-8805-05789943f0c0 Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l fff927b8-9704-47a1-9d62-a73d701b25fb Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l a7bb5fbe-9186-479c-b1aa-589c2297650e Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 9354de05-d7d0-412b-a850-4bdf163cedda Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 6843a742-1de6-43af-90db-e83e7a9c8a06 Dec 03 22:23:56 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:23:56 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: Detached Dec 03 22:23:56 np0005544966.novalocal iscsid[73267]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853, portal: ::1,3260] through [iface: default] is shutdown. Dec 03 22:23:57 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l d6428724-4d63-4664-923d-20e8c6e9546b Dec 03 22:23:57 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:23:57 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 6279eb1f-1d33-4bf4-9e61-7dde8e880c87 Dec 03 22:23:57 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:57 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l 98bd8536-7f5b-44bb-8a82-a4ff1fa22fb7 Dec 03 22:23:57 np0005544966.novalocal sudo[91824]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853 iqn.1994-05.com.redhat:f83f525515f0 Dec 03 22:23:57 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:57 np0005544966.novalocal systemd[1]: Started Session c60 of User root. Dec 03 22:23:57 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 23c4ef03-5381-4931-8c40-d2df3e9fd530 Dec 03 22:23:57 np0005544966.novalocal sudo[91824]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:57 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:57 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853. For complete SELinux messages run: sealert -l 5fe6726b-1757-4c88-93df-726a5f6b5198 Dec 03 22:23:57 np0005544966.novalocal setroubleshoot[91369]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:23:57 np0005544966.novalocal sudo[91824]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:57 np0005544966.novalocal systemd[1]: session-c60.scope: Deactivated successfully. Dec 03 22:23:57 np0005544966.novalocal sudo[91830]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:23:57 np0005544966.novalocal systemd[1]: Started Session c61 of User root. Dec 03 22:23:57 np0005544966.novalocal sudo[91830]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:58 np0005544966.novalocal sudo[91830]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:58 np0005544966.novalocal systemd[1]: session-c61.scope: Deactivated successfully. Dec 03 22:23:58 np0005544966.novalocal sudo[91835]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 03 22:23:58 np0005544966.novalocal systemd[1]: Started Session c62 of User root. Dec 03 22:23:58 np0005544966.novalocal sudo[91835]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:58 np0005544966.novalocal sudo[91835]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:58 np0005544966.novalocal systemd[1]: session-c62.scope: Deactivated successfully. Dec 03 22:23:58 np0005544966.novalocal sudo[91840]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-a41f35e7-1772-40e0-8afd-45f328711853 Dec 03 22:23:58 np0005544966.novalocal systemd[1]: Started Session c63 of User root. Dec 03 22:23:58 np0005544966.novalocal sudo[91840]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:59 np0005544966.novalocal sudo[91840]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:59 np0005544966.novalocal systemd[1]: session-c63.scope: Deactivated successfully. Dec 03 22:23:59 np0005544966.novalocal sudo[91845]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:23:59 np0005544966.novalocal systemd[1]: Started Session c64 of User root. Dec 03 22:23:59 np0005544966.novalocal sudo[91845]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:23:59 np0005544966.novalocal sudo[91845]: pam_unix(sudo:session): session closed for user root Dec 03 22:23:59 np0005544966.novalocal systemd[1]: session-c64.scope: Deactivated successfully. Dec 03 22:24:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:24:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:24:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:24:01 np0005544966.novalocal sudo[91853]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:24:01 np0005544966.novalocal systemd[1]: Started Session c65 of User root. Dec 03 22:24:01 np0005544966.novalocal sudo[91853]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:24:02 np0005544966.novalocal sudo[91853]: pam_unix(sudo:session): session closed for user root Dec 03 22:24:02 np0005544966.novalocal systemd[1]: session-c65.scope: Deactivated successfully. Dec 03 22:24:02 np0005544966.novalocal sudo[91858]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:24:02 np0005544966.novalocal systemd[1]: Started Session c66 of User root. Dec 03 22:24:02 np0005544966.novalocal sudo[91858]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:24:02 np0005544966.novalocal sudo[91858]: pam_unix(sudo:session): session closed for user root Dec 03 22:24:02 np0005544966.novalocal systemd[1]: session-c66.scope: Deactivated successfully. Dec 03 22:24:02 np0005544966.novalocal sudo[91864]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:24:02 np0005544966.novalocal systemd[1]: Started Session c67 of User root. Dec 03 22:24:02 np0005544966.novalocal sudo[91864]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:24:03 np0005544966.novalocal sudo[91864]: pam_unix(sudo:session): session closed for user root Dec 03 22:24:03 np0005544966.novalocal systemd[1]: session-c67.scope: Deactivated successfully. Dec 03 22:24:03 np0005544966.novalocal sudo[91868]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:24:03 np0005544966.novalocal systemd[1]: Started Session c68 of User root. Dec 03 22:24:03 np0005544966.novalocal sudo[91868]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:24:03 np0005544966.novalocal sudo[91868]: pam_unix(sudo:session): session closed for user root Dec 03 22:24:03 np0005544966.novalocal systemd[1]: session-c68.scope: Deactivated successfully. Dec 03 22:24:07 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Deactivated successfully. Dec 03 22:24:07 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Consumed 1.326s CPU time. Dec 03 22:24:07 np0005544966.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 03 22:24:07 np0005544966.novalocal systemd[1]: setroubleshootd.service: Consumed 6.977s CPU time. Dec 03 22:24:25 np0005544966.novalocal sshd[44935]: drop connection #0 from [14.103.118.167]:40802 on [38.102.83.17]:22 penalty: exceeded LoginGraceTime Dec 03 22:24:50 np0005544966.novalocal sshd-session[91944]: Invalid user admin from 103.19.254.14 port 53626 Dec 03 22:24:51 np0005544966.novalocal sshd-session[91944]: Received disconnect from 103.19.254.14 port 53626:11: Bye Bye [preauth] Dec 03 22:24:51 np0005544966.novalocal sshd-session[91944]: Disconnected from invalid user admin 103.19.254.14 port 53626 [preauth] Dec 03 22:25:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:25:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:25:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:25:01 np0005544966.novalocal sudo[91955]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:25:01 np0005544966.novalocal systemd[1]: Started Session c69 of User root. Dec 03 22:25:01 np0005544966.novalocal sudo[91955]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:25:02 np0005544966.novalocal sudo[91955]: pam_unix(sudo:session): session closed for user root Dec 03 22:25:02 np0005544966.novalocal systemd[1]: session-c69.scope: Deactivated successfully. Dec 03 22:25:02 np0005544966.novalocal sudo[91959]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:25:02 np0005544966.novalocal systemd[1]: Started Session c70 of User root. Dec 03 22:25:02 np0005544966.novalocal sudo[91959]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:25:02 np0005544966.novalocal sudo[91959]: pam_unix(sudo:session): session closed for user root Dec 03 22:25:02 np0005544966.novalocal systemd[1]: session-c70.scope: Deactivated successfully. Dec 03 22:25:02 np0005544966.novalocal sudo[91965]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:25:02 np0005544966.novalocal systemd[1]: Started Session c71 of User root. Dec 03 22:25:02 np0005544966.novalocal sudo[91965]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:25:03 np0005544966.novalocal sudo[91965]: pam_unix(sudo:session): session closed for user root Dec 03 22:25:03 np0005544966.novalocal systemd[1]: session-c71.scope: Deactivated successfully. Dec 03 22:25:03 np0005544966.novalocal sudo[91969]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:25:03 np0005544966.novalocal systemd[1]: Started Session c72 of User root. Dec 03 22:25:03 np0005544966.novalocal sudo[91969]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:25:03 np0005544966.novalocal sudo[91969]: pam_unix(sudo:session): session closed for user root Dec 03 22:25:03 np0005544966.novalocal systemd[1]: session-c72.scope: Deactivated successfully. Dec 03 22:26:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:26:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:26:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:26:01 np0005544966.novalocal sudo[92052]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:26:02 np0005544966.novalocal systemd[1]: Started Session c73 of User root. Dec 03 22:26:02 np0005544966.novalocal sudo[92052]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:26:02 np0005544966.novalocal sudo[92052]: pam_unix(sudo:session): session closed for user root Dec 03 22:26:02 np0005544966.novalocal systemd[1]: session-c73.scope: Deactivated successfully. Dec 03 22:26:02 np0005544966.novalocal sudo[92057]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:26:02 np0005544966.novalocal systemd[1]: Started Session c74 of User root. Dec 03 22:26:02 np0005544966.novalocal sudo[92057]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:26:02 np0005544966.novalocal sudo[92057]: pam_unix(sudo:session): session closed for user root Dec 03 22:26:02 np0005544966.novalocal systemd[1]: session-c74.scope: Deactivated successfully. Dec 03 22:26:02 np0005544966.novalocal sudo[92063]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:26:02 np0005544966.novalocal systemd[1]: Started Session c75 of User root. Dec 03 22:26:02 np0005544966.novalocal sudo[92063]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:26:03 np0005544966.novalocal sudo[92063]: pam_unix(sudo:session): session closed for user root Dec 03 22:26:03 np0005544966.novalocal systemd[1]: session-c75.scope: Deactivated successfully. Dec 03 22:26:03 np0005544966.novalocal sudo[92067]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:26:03 np0005544966.novalocal systemd[1]: Started Session c76 of User root. Dec 03 22:26:03 np0005544966.novalocal sudo[92067]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:26:03 np0005544966.novalocal sudo[92067]: pam_unix(sudo:session): session closed for user root Dec 03 22:26:03 np0005544966.novalocal systemd[1]: session-c76.scope: Deactivated successfully. Dec 03 22:26:08 np0005544966.novalocal systemd[87933]: Created slice User Background Tasks Slice. Dec 03 22:26:08 np0005544966.novalocal systemd[87933]: Starting Cleanup of User's Temporary Files and Directories... Dec 03 22:26:08 np0005544966.novalocal systemd[87933]: Finished Cleanup of User's Temporary Files and Directories. Dec 03 22:26:11 np0005544966.novalocal sshd-session[92112]: Connection closed by 14.103.118.167 port 47392 [preauth] Dec 03 22:26:13 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:26:13 np0005544966.novalocal systemd-rc-local-generator[92145]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:26:13 np0005544966.novalocal systemd-sysv-generator[92150]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:26:13 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:26:13 np0005544966.novalocal sshd-session[92116]: Received disconnect from 103.19.254.14 port 55668:11: Bye Bye [preauth] Dec 03 22:26:13 np0005544966.novalocal sshd-session[92116]: Disconnected from authenticating user root 103.19.254.14 port 55668 [preauth] Dec 03 22:26:13 np0005544966.novalocal systemd[1]: Starting OpenStack Nova Conductor Server... Dec 03 22:26:15 np0005544966.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 03 22:26:16 np0005544966.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 03 22:26:16 np0005544966.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service. Dec 03 22:26:17 np0005544966.novalocal systemd[1]: Started OpenStack Nova Conductor Server. Dec 03 22:26:17 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:26:17 np0005544966.novalocal systemd-sysv-generator[92201]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:26:17 np0005544966.novalocal systemd-rc-local-generator[92198]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:26:17 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:26:17 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:26:17 np0005544966.novalocal systemd-sysv-generator[92232]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:26:17 np0005544966.novalocal systemd-rc-local-generator[92229]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:26:17 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 55154f57-b462-4915-9415-95e6003ed772 Dec 03 22:26:17 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:17 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:26:17 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 7a921015-8320-42e8-bc6f-d7c35f49a88d Dec 03 22:26:17 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:17 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l c7b31bd0-352c-4cd9-b0a9-183a8b7620b1 Dec 03 22:26:17 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l e6afcf61-bbc1-4676-9a92-6ca1907e7700 Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l b92e4ba3-660a-4447-aaaf-2f0b4a3051a9 Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 6c683255-8999-46bf-8937-059058d7a5f2 Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 5d5b3a73-490a-4a5b-8d90-bd2d9c56fa56 Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 6fcb953e-ae66-46d4-923f-6dfceddf1ec6 Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 59f56018-d3f1-41a9-87e3-fb916eb65a6f Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l dba2562e-603e-4a88-82ca-da30c241a3e2 Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 843a1203-9429-4ed0-a0c6-71fbf482651e Dec 03 22:26:18 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:18 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:26:18 np0005544966.novalocal systemd-rc-local-generator[92270]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:26:18 np0005544966.novalocal systemd-sysv-generator[92274]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:26:18 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:26:18 np0005544966.novalocal systemd[1]: Starting OpenStack Nova Compute Server... Dec 03 22:26:23 np0005544966.novalocal systemd[1]: Started OpenStack Nova Compute Server. Dec 03 22:26:24 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:26:24 np0005544966.novalocal systemd-sysv-generator[92316]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:26:24 np0005544966.novalocal systemd-rc-local-generator[92313]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:26:24 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:26:24 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:26:24 np0005544966.novalocal systemd-rc-local-generator[92361]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:26:24 np0005544966.novalocal systemd-sysv-generator[92366]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:26:24 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:26:24 np0005544966.novalocal systemd[1]: Starting libvirt QEMU daemon... Dec 03 22:26:24 np0005544966.novalocal systemd[1]: Started libvirt QEMU daemon. Dec 03 22:26:25 np0005544966.novalocal nova-compute[92280]: libvirt: error : internal error: could not initialize domain event timer Dec 03 22:26:25 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:26:25 np0005544966.novalocal systemd-sysv-generator[92435]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:26:25 np0005544966.novalocal systemd-rc-local-generator[92431]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:26:25 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:26:25 np0005544966.novalocal systemd[1]: Starting OpenStack Nova Scheduler Server... Dec 03 22:26:26 np0005544966.novalocal systemd[1]: Listening on libvirt nodedev daemon admin socket. Dec 03 22:26:26 np0005544966.novalocal systemd[1]: Listening on libvirt nodedev daemon read-only socket. Dec 03 22:26:26 np0005544966.novalocal systemd[1]: Starting libvirt nodedev daemon... Dec 03 22:26:26 np0005544966.novalocal systemd[1]: Started libvirt nodedev daemon. Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 55154f57-b462-4915-9415-95e6003ed772 Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 7a921015-8320-42e8-bc6f-d7c35f49a88d Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l c7b31bd0-352c-4cd9-b0a9-183a8b7620b1 Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l e6afcf61-bbc1-4676-9a92-6ca1907e7700 Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l b92e4ba3-660a-4447-aaaf-2f0b4a3051a9 Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 6c683255-8999-46bf-8937-059058d7a5f2 Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 5d5b3a73-490a-4a5b-8d90-bd2d9c56fa56 Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 6fcb953e-ae66-46d4-923f-6dfceddf1ec6 Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 59f56018-d3f1-41a9-87e3-fb916eb65a6f Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l dba2562e-603e-4a88-82ca-da30c241a3e2 Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 843a1203-9429-4ed0-a0c6-71fbf482651e Dec 03 22:26:27 np0005544966.novalocal setroubleshoot[92156]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 03 22:26:27 np0005544966.novalocal systemd[1]: Started OpenStack Nova Scheduler Server. Dec 03 22:26:28 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:26:28 np0005544966.novalocal systemd-rc-local-generator[92502]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:26:28 np0005544966.novalocal systemd-sysv-generator[92506]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:26:28 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:26:28 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:26:28 np0005544966.novalocal systemd-rc-local-generator[92532]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:26:28 np0005544966.novalocal systemd-sysv-generator[92538]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:26:28 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:26:37 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Deactivated successfully. Dec 03 22:26:37 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Consumed 1.320s CPU time. Dec 03 22:26:38 np0005544966.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 03 22:26:38 np0005544966.novalocal systemd[1]: setroubleshootd.service: Consumed 2.153s CPU time. Dec 03 22:26:42 np0005544966.novalocal sshd-session[92549]: Received disconnect from 80.94.93.119 port 43960:11: [preauth] Dec 03 22:26:42 np0005544966.novalocal sshd-session[92549]: Disconnected from authenticating user root 80.94.93.119 port 43960 [preauth] Dec 03 22:27:01 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:27:01 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:27:01 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:27:01 np0005544966.novalocal sudo[92562]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:27:02 np0005544966.novalocal systemd[1]: Started Session c77 of User root. Dec 03 22:27:02 np0005544966.novalocal sudo[92562]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:27:02 np0005544966.novalocal sudo[92562]: pam_unix(sudo:session): session closed for user root Dec 03 22:27:02 np0005544966.novalocal systemd[1]: session-c77.scope: Deactivated successfully. Dec 03 22:27:02 np0005544966.novalocal sudo[92566]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:27:02 np0005544966.novalocal systemd[1]: Started Session c78 of User root. Dec 03 22:27:02 np0005544966.novalocal sudo[92566]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:27:02 np0005544966.novalocal sudo[92566]: pam_unix(sudo:session): session closed for user root Dec 03 22:27:02 np0005544966.novalocal systemd[1]: session-c78.scope: Deactivated successfully. Dec 03 22:27:02 np0005544966.novalocal sudo[92572]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:27:02 np0005544966.novalocal systemd[1]: Started Session c79 of User root. Dec 03 22:27:02 np0005544966.novalocal sudo[92572]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:27:03 np0005544966.novalocal sudo[92572]: pam_unix(sudo:session): session closed for user root Dec 03 22:27:03 np0005544966.novalocal systemd[1]: session-c79.scope: Deactivated successfully. Dec 03 22:27:03 np0005544966.novalocal sudo[92576]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:27:03 np0005544966.novalocal systemd[1]: Started Session c80 of User root. Dec 03 22:27:03 np0005544966.novalocal sudo[92576]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:27:03 np0005544966.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 03 22:27:03 np0005544966.novalocal sudo[92576]: pam_unix(sudo:session): session closed for user root Dec 03 22:27:03 np0005544966.novalocal systemd[1]: session-c80.scope: Deactivated successfully. Dec 03 22:27:04 np0005544966.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 03 22:27:04 np0005544966.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service. Dec 03 22:27:05 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l b50345c5-fd99-4be5-8f05-b94c325dd1e6 Dec 03 22:27:05 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:27:05 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l c9c08300-ba1a-4761-bf12-e5f08bff6abd Dec 03 22:27:05 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:27:05 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). For complete SELinux messages run: sealert -l b5594b5e-db11-472b-a528-ee44c20f2810 Dec 03 22:27:05 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:27:05 np0005544966.novalocal setroubleshoot[92580]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4': Dec 03 22:27:05 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. For complete SELinux messages run: sealert -l b618631f-b3b5-43af-83d2-32dd1c16e969 Dec 03 22:27:05 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:27:05 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. For complete SELinux messages run: sealert -l 77b926e3-6f91-43d5-9e3e-4587b575deae Dec 03 22:27:05 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:27:05 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. For complete SELinux messages run: sealert -l dca7cbaf-3f6e-45bf-8a87-86243f1290a1 Dec 03 22:27:06 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:27:06 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l fa51af41-26c6-40be-84dd-2ad634464d31 Dec 03 22:27:06 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 03 22:27:06 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l c195900c-b53c-4744-8fad-ac9940b6c934 Dec 03 22:27:06 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 03 22:27:06 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 187c5925-66a1-4795-857e-89824c71b800 Dec 03 22:27:06 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 03 22:27:06 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from read access on the file 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. For complete SELinux messages run: sealert -l c704cafb-9b7d-4424-889f-886d0fe281df Dec 03 22:27:06 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from read access on the file 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:27:06 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. For complete SELinux messages run: sealert -l 9b8bb51a-626a-4400-937e-72f175bcc8b2 Dec 03 22:27:06 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:27:06 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. For complete SELinux messages run: sealert -l 77b926e3-6f91-43d5-9e3e-4587b575deae Dec 03 22:27:06 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:27:07 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. For complete SELinux messages run: sealert -l dca7cbaf-3f6e-45bf-8a87-86243f1290a1 Dec 03 22:27:07 np0005544966.novalocal setroubleshoot[92580]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:27:15 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:27:15 np0005544966.novalocal systemd-rc-local-generator[92670]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:27:15 np0005544966.novalocal systemd-sysv-generator[92673]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:27:15 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:27:15 np0005544966.novalocal systemd[1]: Started OpenStack Octavia Worker service. Dec 03 22:27:15 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:27:16 np0005544966.novalocal systemd-rc-local-generator[92701]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:27:16 np0005544966.novalocal systemd-sysv-generator[92706]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:27:16 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:27:16 np0005544966.novalocal systemd[1]: Reloading. Dec 03 22:27:16 np0005544966.novalocal systemd-rc-local-generator[92732]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 03 22:27:16 np0005544966.novalocal systemd-sysv-generator[92736]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 03 22:27:16 np0005544966.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 03 22:27:17 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Deactivated successfully. Dec 03 22:27:17 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Consumed 1.229s CPU time. Dec 03 22:27:17 np0005544966.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 03 22:27:17 np0005544966.novalocal systemd[1]: setroubleshootd.service: Consumed 1.778s CPU time. Dec 03 22:27:31 np0005544966.novalocal runuser[92909]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:27:32 np0005544966.novalocal runuser[92909]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:27:32 np0005544966.novalocal runuser[92962]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:27:33 np0005544966.novalocal runuser[92962]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:27:33 np0005544966.novalocal runuser[93018]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:27:33 np0005544966.novalocal runuser[93018]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:27:39 np0005544966.novalocal sshd-session[93079]: Received disconnect from 103.19.254.14 port 59486:11: Bye Bye [preauth] Dec 03 22:27:39 np0005544966.novalocal sshd-session[93079]: Disconnected from authenticating user root 103.19.254.14 port 59486 [preauth] Dec 03 22:28:01 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:28:01 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:28:01 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:28:01 np0005544966.novalocal sudo[93404]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:28:01 np0005544966.novalocal systemd[1]: Started Session c81 of User root. Dec 03 22:28:02 np0005544966.novalocal sudo[93404]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:28:02 np0005544966.novalocal sudo[93404]: pam_unix(sudo:session): session closed for user root Dec 03 22:28:02 np0005544966.novalocal systemd[1]: session-c81.scope: Deactivated successfully. Dec 03 22:28:02 np0005544966.novalocal sudo[93408]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:28:02 np0005544966.novalocal systemd[1]: Started Session c82 of User root. Dec 03 22:28:02 np0005544966.novalocal sudo[93408]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:28:02 np0005544966.novalocal sudo[93408]: pam_unix(sudo:session): session closed for user root Dec 03 22:28:02 np0005544966.novalocal systemd[1]: session-c82.scope: Deactivated successfully. Dec 03 22:28:02 np0005544966.novalocal sudo[93414]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:28:02 np0005544966.novalocal systemd[1]: Started Session c83 of User root. Dec 03 22:28:02 np0005544966.novalocal sudo[93414]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:28:03 np0005544966.novalocal sudo[93414]: pam_unix(sudo:session): session closed for user root Dec 03 22:28:03 np0005544966.novalocal systemd[1]: session-c83.scope: Deactivated successfully. Dec 03 22:28:03 np0005544966.novalocal sudo[93418]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:28:03 np0005544966.novalocal systemd[1]: Started Session c84 of User root. Dec 03 22:28:03 np0005544966.novalocal sudo[93418]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:28:03 np0005544966.novalocal sudo[93418]: pam_unix(sudo:session): session closed for user root Dec 03 22:28:03 np0005544966.novalocal systemd[1]: session-c84.scope: Deactivated successfully. Dec 03 22:28:17 np0005544966.novalocal crontab[93508]: (root) LIST (root) Dec 03 22:28:17 np0005544966.novalocal crontab[93509]: (root) LIST (keystone) Dec 03 22:28:17 np0005544966.novalocal crontab[93510]: (root) LIST (cinder) Dec 03 22:28:17 np0005544966.novalocal crontab[93511]: (root) LIST (glance) Dec 03 22:28:17 np0005544966.novalocal crontab[93512]: (root) LIST (nova) Dec 03 22:28:17 np0005544966.novalocal crontab[93513]: (root) LIST (manila) Dec 03 22:28:20 np0005544966.novalocal runuser[93519]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:21 np0005544966.novalocal runuser[93519]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:21 np0005544966.novalocal runuser[93573]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:22 np0005544966.novalocal runuser[93573]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:22 np0005544966.novalocal runuser[93625]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:23 np0005544966.novalocal runuser[93625]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:23 np0005544966.novalocal runuser[93681]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:23 np0005544966.novalocal runuser[93681]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:23 np0005544966.novalocal runuser[93734]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:24 np0005544966.novalocal runuser[93734]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:24 np0005544966.novalocal runuser[93786]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:25 np0005544966.novalocal runuser[93786]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:25 np0005544966.novalocal runuser[93838]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:26 np0005544966.novalocal runuser[93838]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:26 np0005544966.novalocal runuser[93894]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:27 np0005544966.novalocal runuser[93894]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:27 np0005544966.novalocal runuser[93947]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:27 np0005544966.novalocal runuser[93947]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:27 np0005544966.novalocal runuser[93999]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:28 np0005544966.novalocal sshd-session[93847]: Connection reset by authenticating user operator 91.202.233.33 port 65314 [preauth] Dec 03 22:28:28 np0005544966.novalocal runuser[93999]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:29 np0005544966.novalocal runuser[94065]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:30 np0005544966.novalocal runuser[94065]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:30 np0005544966.novalocal runuser[94118]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:30 np0005544966.novalocal sshd-session[94045]: Connection reset by authenticating user nobody 91.202.233.33 port 65328 [preauth] Dec 03 22:28:31 np0005544966.novalocal runuser[94118]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:31 np0005544966.novalocal runuser[94174]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:32 np0005544966.novalocal runuser[94174]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:32 np0005544966.novalocal runuser[94226]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:33 np0005544966.novalocal runuser[94226]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:33 np0005544966.novalocal sshd-session[94163]: Connection reset by authenticating user root 91.202.233.33 port 54892 [preauth] Dec 03 22:28:33 np0005544966.novalocal runuser[94287]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:34 np0005544966.novalocal runuser[94287]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:34 np0005544966.novalocal runuser[94340]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:35 np0005544966.novalocal runuser[94340]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:35 np0005544966.novalocal sshd-session[94286]: Connection reset by authenticating user root 91.202.233.33 port 54910 [preauth] Dec 03 22:28:37 np0005544966.novalocal virtqemud[92372]: libvirt version: 11.9.0, package: 1.el9 (builder@centos.org, 2025-11-04-09:54:50, ) Dec 03 22:28:37 np0005544966.novalocal virtqemud[92372]: hostname: np0005544966.novalocal Dec 03 22:28:37 np0005544966.novalocal virtqemud[92372]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Dec 03 22:28:37 np0005544966.novalocal virtqemud[92372]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Dec 03 22:28:37 np0005544966.novalocal sshd-session[94396]: Connection reset by authenticating user root 91.202.233.33 port 54912 [preauth] Dec 03 22:28:37 np0005544966.novalocal runuser[94425]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:38 np0005544966.novalocal runuser[94425]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:38 np0005544966.novalocal runuser[94477]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:39 np0005544966.novalocal runuser[94477]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:40 np0005544966.novalocal runuser[94537]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:40 np0005544966.novalocal runuser[94537]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:28:40 np0005544966.novalocal runuser[94589]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 03 22:28:41 np0005544966.novalocal runuser[94589]: pam_unix(runuser:session): session closed for user rabbitmq Dec 03 22:29:01 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:29:01 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:29:01 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:29:01 np0005544966.novalocal sudo[94672]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:29:02 np0005544966.novalocal systemd[1]: Started Session c85 of User root. Dec 03 22:29:02 np0005544966.novalocal sudo[94672]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:29:02 np0005544966.novalocal sshd-session[94668]: Invalid user user7 from 103.19.254.14 port 60786 Dec 03 22:29:02 np0005544966.novalocal sudo[94672]: pam_unix(sudo:session): session closed for user root Dec 03 22:29:02 np0005544966.novalocal systemd[1]: session-c85.scope: Deactivated successfully. Dec 03 22:29:02 np0005544966.novalocal sudo[94677]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:29:02 np0005544966.novalocal systemd[1]: Started Session c86 of User root. Dec 03 22:29:02 np0005544966.novalocal sudo[94677]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:29:02 np0005544966.novalocal sshd-session[94668]: Received disconnect from 103.19.254.14 port 60786:11: Bye Bye [preauth] Dec 03 22:29:02 np0005544966.novalocal sshd-session[94668]: Disconnected from invalid user user7 103.19.254.14 port 60786 [preauth] Dec 03 22:29:02 np0005544966.novalocal sudo[94677]: pam_unix(sudo:session): session closed for user root Dec 03 22:29:02 np0005544966.novalocal systemd[1]: session-c86.scope: Deactivated successfully. Dec 03 22:29:02 np0005544966.novalocal sudo[94681]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:29:02 np0005544966.novalocal systemd[1]: Started Session c87 of User root. Dec 03 22:29:02 np0005544966.novalocal sudo[94681]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:29:03 np0005544966.novalocal sudo[94681]: pam_unix(sudo:session): session closed for user root Dec 03 22:29:03 np0005544966.novalocal systemd[1]: session-c87.scope: Deactivated successfully. Dec 03 22:29:03 np0005544966.novalocal sudo[94687]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:29:03 np0005544966.novalocal systemd[1]: Started Session c88 of User root. Dec 03 22:29:03 np0005544966.novalocal sudo[94687]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:29:03 np0005544966.novalocal sudo[94687]: pam_unix(sudo:session): session closed for user root Dec 03 22:29:03 np0005544966.novalocal systemd[1]: session-c88.scope: Deactivated successfully. Dec 03 22:29:13 np0005544966.novalocal sshd-session[94731]: Connection reset by authenticating user root 45.140.17.124 port 42000 [preauth] Dec 03 22:29:16 np0005544966.novalocal sshd-session[94736]: Connection reset by authenticating user root 45.140.17.124 port 42022 [preauth] Dec 03 22:29:20 np0005544966.novalocal sshd-session[94741]: Connection reset by authenticating user root 45.140.17.124 port 42030 [preauth] Dec 03 22:29:22 np0005544966.novalocal sshd-session[94745]: Invalid user postgres from 45.140.17.124 port 28196 Dec 03 22:29:22 np0005544966.novalocal sshd-session[94745]: Connection reset by invalid user postgres 45.140.17.124 port 28196 [preauth] Dec 03 22:29:25 np0005544966.novalocal sshd-session[94748]: Connection reset by authenticating user root 45.140.17.124 port 28202 [preauth] Dec 03 22:29:31 np0005544966.novalocal sshd-session[94756]: Received disconnect from 14.103.118.167 port 52920:11: Bye Bye [preauth] Dec 03 22:29:31 np0005544966.novalocal sshd-session[94756]: Disconnected from authenticating user root 14.103.118.167 port 52920 [preauth] Dec 03 22:29:46 np0005544966.novalocal sshd[44935]: Timeout before authentication for connection from 14.103.118.167 to 38.102.83.17, pid = 93087 Dec 03 22:30:01 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:30:01 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:30:01 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:30:01 np0005544966.novalocal systemd[1]: Created slice User Slice of UID 161. Dec 03 22:30:01 np0005544966.novalocal systemd[1]: Starting User Runtime Directory /run/user/161... Dec 03 22:30:01 np0005544966.novalocal systemd[1]: Created slice User Slice of UID 163. Dec 03 22:30:01 np0005544966.novalocal systemd[1]: Starting User Runtime Directory /run/user/163... Dec 03 22:30:01 np0005544966.novalocal systemd[1]: Finished User Runtime Directory /run/user/161. Dec 03 22:30:01 np0005544966.novalocal systemd[1]: Starting User Manager for UID 161... Dec 03 22:30:01 np0005544966.novalocal systemd[1]: Finished User Runtime Directory /run/user/163. Dec 03 22:30:01 np0005544966.novalocal systemd[1]: Starting User Manager for UID 163... Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: pam_unix(systemd-user:session): session opened for user glance(uid=161) by glance(uid=0) Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: pam_unix(systemd-user:session): session opened for user keystone(uid=163) by keystone(uid=0) Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Queued start job for default target Main User Target. Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Queued start job for default target Main User Target. Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Created slice User Application Slice. Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Created slice User Application Slice. Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Started Daily Cleanup of User's Temporary Directories. Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Reached target Paths. Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Reached target Timers. Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Started Daily Cleanup of User's Temporary Directories. Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Reached target Paths. Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Reached target Timers. Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Starting D-Bus User Message Bus Socket... Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Starting D-Bus User Message Bus Socket... Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Listening on PipeWire PulseAudio. Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Listening on PipeWire PulseAudio. Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Listening on PipeWire Multimedia System Sockets. Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Listening on PipeWire Multimedia System Sockets. Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Starting Create User's Volatile Files and Directories... Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Starting Create User's Volatile Files and Directories... Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Finished Create User's Volatile Files and Directories. Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Listening on D-Bus User Message Bus Socket. Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Listening on D-Bus User Message Bus Socket. Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Reached target Sockets. Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Reached target Basic System. Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Finished Create User's Volatile Files and Directories. Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Reached target Main User Target. Dec 03 22:30:01 np0005544966.novalocal systemd[94793]: Startup finished in 203ms. Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Reached target Sockets. Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Reached target Basic System. Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Reached target Main User Target. Dec 03 22:30:01 np0005544966.novalocal systemd[94791]: Startup finished in 214ms. Dec 03 22:30:01 np0005544966.novalocal systemd[1]: Started User Manager for UID 163. Dec 03 22:30:01 np0005544966.novalocal systemd[1]: Started User Manager for UID 161. Dec 03 22:30:01 np0005544966.novalocal systemd[1]: Started Session 5 of User glance. Dec 03 22:30:01 np0005544966.novalocal systemd[1]: Started Session 6 of User keystone. Dec 03 22:30:01 np0005544966.novalocal CROND[94811]: (glance) CMD (glance-cache-pruner) Dec 03 22:30:01 np0005544966.novalocal CROND[94812]: (keystone) CMD (keystone-manage fernet_rotate) Dec 03 22:30:01 np0005544966.novalocal sudo[94813]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:30:01 np0005544966.novalocal systemd[1]: Started Session c89 of User root. Dec 03 22:30:01 np0005544966.novalocal sudo[94813]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:30:02 np0005544966.novalocal sudo[94813]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:02 np0005544966.novalocal systemd[1]: session-c89.scope: Deactivated successfully. Dec 03 22:30:02 np0005544966.novalocal sudo[94818]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:30:02 np0005544966.novalocal systemd[1]: Started Session c90 of User root. Dec 03 22:30:02 np0005544966.novalocal sudo[94818]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:30:02 np0005544966.novalocal sudo[94818]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:02 np0005544966.novalocal systemd[1]: session-c90.scope: Deactivated successfully. Dec 03 22:30:02 np0005544966.novalocal sudo[94822]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:30:02 np0005544966.novalocal systemd[1]: Started Session c91 of User root. Dec 03 22:30:02 np0005544966.novalocal sudo[94822]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:30:02 np0005544966.novalocal CROND[94785]: (glance) CMDOUT (2025-12-03 22:30:02.885 94811 INFO glance.image_cache [-] Image cache loaded driver 'centralized_db'.) Dec 03 22:30:03 np0005544966.novalocal CROND[94785]: (glance) CMDOUT (2025-12-03 22:30:03.178 94811 DEBUG glance.image_cache [None req-8e007b86-2b53-41c3-920d-6acc15c91633 - - - - - -] Image cache has free space, skipping prune... prune /usr/lib/python3.9/site-packages/glance/image_cache/__init__.py:291) Dec 03 22:30:03 np0005544966.novalocal sudo[94822]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:03 np0005544966.novalocal systemd[1]: session-c91.scope: Deactivated successfully. Dec 03 22:30:03 np0005544966.novalocal sudo[94828]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:30:03 np0005544966.novalocal systemd[1]: Started Session c92 of User root. Dec 03 22:30:03 np0005544966.novalocal sudo[94828]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:30:03 np0005544966.novalocal CROND[94785]: (glance) CMDEND (glance-cache-pruner) Dec 03 22:30:03 np0005544966.novalocal systemd[1]: session-5.scope: Deactivated successfully. Dec 03 22:30:03 np0005544966.novalocal systemd[1]: session-5.scope: Consumed 1.386s CPU time. Dec 03 22:30:03 np0005544966.novalocal sudo[94828]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:03 np0005544966.novalocal systemd[1]: session-c92.scope: Deactivated successfully. Dec 03 22:30:03 np0005544966.novalocal CROND[94786]: (keystone) CMDEND (keystone-manage fernet_rotate) Dec 03 22:30:03 np0005544966.novalocal systemd[1]: session-6.scope: Deactivated successfully. Dec 03 22:30:03 np0005544966.novalocal systemd[1]: session-6.scope: Consumed 1.851s CPU time. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: Stopping User Manager for UID 161... Dec 03 22:30:13 np0005544966.novalocal systemd[94791]: Activating special unit Exit the Session... Dec 03 22:30:13 np0005544966.novalocal systemd[94791]: Stopped target Main User Target. Dec 03 22:30:13 np0005544966.novalocal systemd[94791]: Stopped target Basic System. Dec 03 22:30:13 np0005544966.novalocal systemd[94791]: Stopped target Paths. Dec 03 22:30:13 np0005544966.novalocal systemd[94791]: Stopped target Sockets. Dec 03 22:30:13 np0005544966.novalocal systemd[94791]: Stopped target Timers. Dec 03 22:30:13 np0005544966.novalocal systemd[94791]: Stopped Daily Cleanup of User's Temporary Directories. Dec 03 22:30:13 np0005544966.novalocal systemd[94791]: Closed D-Bus User Message Bus Socket. Dec 03 22:30:13 np0005544966.novalocal systemd[94791]: Closed PipeWire PulseAudio. Dec 03 22:30:13 np0005544966.novalocal systemd[94791]: Closed PipeWire Multimedia System Sockets. Dec 03 22:30:13 np0005544966.novalocal systemd[94791]: Stopped Create User's Volatile Files and Directories. Dec 03 22:30:13 np0005544966.novalocal systemd[94791]: Removed slice User Application Slice. Dec 03 22:30:13 np0005544966.novalocal systemd[94791]: Reached target Shutdown. Dec 03 22:30:13 np0005544966.novalocal systemd[94791]: Finished Exit the Session. Dec 03 22:30:13 np0005544966.novalocal systemd[94791]: Reached target Exit the Session. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: user@161.service: Deactivated successfully. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: Stopped User Manager for UID 161. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: Stopping User Runtime Directory /run/user/161... Dec 03 22:30:13 np0005544966.novalocal systemd[1]: run-user-161.mount: Deactivated successfully. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: user-runtime-dir@161.service: Deactivated successfully. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: Stopped User Runtime Directory /run/user/161. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: Removed slice User Slice of UID 161. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: user-161.slice: Consumed 1.704s CPU time. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: Stopping User Manager for UID 163... Dec 03 22:30:13 np0005544966.novalocal systemd[94793]: Activating special unit Exit the Session... Dec 03 22:30:13 np0005544966.novalocal systemd[94793]: Stopped target Main User Target. Dec 03 22:30:13 np0005544966.novalocal systemd[94793]: Stopped target Basic System. Dec 03 22:30:13 np0005544966.novalocal systemd[94793]: Stopped target Paths. Dec 03 22:30:13 np0005544966.novalocal systemd[94793]: Stopped target Sockets. Dec 03 22:30:13 np0005544966.novalocal systemd[94793]: Stopped target Timers. Dec 03 22:30:13 np0005544966.novalocal systemd[94793]: Stopped Daily Cleanup of User's Temporary Directories. Dec 03 22:30:13 np0005544966.novalocal systemd[94793]: Closed D-Bus User Message Bus Socket. Dec 03 22:30:13 np0005544966.novalocal systemd[94793]: Closed PipeWire PulseAudio. Dec 03 22:30:13 np0005544966.novalocal systemd[94793]: Closed PipeWire Multimedia System Sockets. Dec 03 22:30:13 np0005544966.novalocal systemd[94793]: Stopped Create User's Volatile Files and Directories. Dec 03 22:30:13 np0005544966.novalocal systemd[94793]: Removed slice User Application Slice. Dec 03 22:30:13 np0005544966.novalocal systemd[94793]: Reached target Shutdown. Dec 03 22:30:13 np0005544966.novalocal systemd[94793]: Finished Exit the Session. Dec 03 22:30:13 np0005544966.novalocal systemd[94793]: Reached target Exit the Session. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: user@163.service: Deactivated successfully. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: Stopped User Manager for UID 163. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: Stopping User Runtime Directory /run/user/163... Dec 03 22:30:13 np0005544966.novalocal systemd[1]: run-user-163.mount: Deactivated successfully. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: user-runtime-dir@163.service: Deactivated successfully. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: Stopped User Runtime Directory /run/user/163. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: Removed slice User Slice of UID 163. Dec 03 22:30:13 np0005544966.novalocal systemd[1]: user-163.slice: Consumed 2.156s CPU time. Dec 03 22:30:29 np0005544966.novalocal sshd-session[94911]: Invalid user terraria from 103.19.254.14 port 34796 Dec 03 22:30:29 np0005544966.novalocal sshd-session[94911]: Received disconnect from 103.19.254.14 port 34796:11: Bye Bye [preauth] Dec 03 22:30:29 np0005544966.novalocal sshd-session[94911]: Disconnected from invalid user terraria 103.19.254.14 port 34796 [preauth] Dec 03 22:30:34 np0005544966.novalocal sudo[94922]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpdcurj0ds/privsep.sock Dec 03 22:30:34 np0005544966.novalocal systemd[1]: Started Session c93 of User root. Dec 03 22:30:34 np0005544966.novalocal sudo[94922]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:30:35 np0005544966.novalocal sudo[94922]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:42 np0005544966.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 03 22:30:43 np0005544966.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 03 22:30:43 np0005544966.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service. Dec 03 22:30:44 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 3c5aa84b-7ea3-448e-9aa1-993ee5fd2941 Dec 03 22:30:44 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server:' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 3f042100-c350-465e-b4eb-2aa67eaa6f3f Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l d5d45804-989a-46d1-bf8b-9c10517ff23a Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal sudo[94983]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-80775758-f3c0-4652-9e37-3c4d4e035cda Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: failed to retrieve rpm info for path '/dev/vda1': Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2587fec0-e08e-43c4-a02c-3b5f6f5ef2de Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal systemd[1]: Started Session c94 of User root. Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 6843a742-1de6-43af-90db-e83e7a9c8a06 Dec 03 22:30:50 np0005544966.novalocal sudo[94983]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 26670ce4-25d7-41b6-8333-b50e0666ef3e Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 05736fc0-a88a-4b76-b700-c36c4a378c7a Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 595c47e2-dd3e-490e-87e6-a4d79c47b8aa Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l d5de0456-a206-4823-a713-21d88ef3e73a Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 924822d6-700f-4713-8af9-fae8f5a9479d Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l abd86745-fe29-4b3d-8d22-c7e54b862750 Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-6bGTLe. For complete SELinux messages run: sealert -l 5d004baa-81f4-4041-851d-7d89bd525711 Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-6bGTLe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-6bGTLe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-6bGTLe. For complete SELinux messages run: sealert -l 5e411a3a-3b63-4663-b34d-739f3728597c Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-6bGTLe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-6bGTLe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 2f148089-7e8d-4918-9585-50ec53a9224b Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 59f0df37-a76c-43a2-8ec3-c76f749a4e54 Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l d2dbb969-bfc4-4dfc-8e58-8fdf27d2c782 Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l bbf1329f-5c4f-422b-8cad-b9181061fcfe Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l bd1ab1bf-4317-443c-9afe-d4e77b372f44 Dec 03 22:30:50 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:51 np0005544966.novalocal sudo[94983]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:51 np0005544966.novalocal systemd[1]: session-c94.scope: Deactivated successfully. Dec 03 22:30:51 np0005544966.novalocal sudo[94988]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-80775758-f3c0-4652-9e37-3c4d4e035cda iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda 7VitP6M6LUmRSgJtEL5B GP64gpUeMS8zRXxA False -p3260 -a::1 Dec 03 22:30:51 np0005544966.novalocal systemd[1]: Started Session c95 of User root. Dec 03 22:30:51 np0005544966.novalocal sudo[94988]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:30:51 np0005544966.novalocal sudo[94988]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:51 np0005544966.novalocal systemd[1]: session-c95.scope: Deactivated successfully. Dec 03 22:30:51 np0005544966.novalocal sudo[94997]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 03 22:30:51 np0005544966.novalocal systemd[1]: Started Session c96 of User root. Dec 03 22:30:51 np0005544966.novalocal sudo[94997]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:30:52 np0005544966.novalocal sudo[94997]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:52 np0005544966.novalocal systemd[1]: session-c96.scope: Deactivated successfully. Dec 03 22:30:52 np0005544966.novalocal sudo[95002]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:30:52 np0005544966.novalocal systemd[1]: Started Session c97 of User root. Dec 03 22:30:52 np0005544966.novalocal sudo[95002]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:30:52 np0005544966.novalocal sudo[95002]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:52 np0005544966.novalocal systemd[1]: session-c97.scope: Deactivated successfully. Dec 03 22:30:52 np0005544966.novalocal sudo[95007]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda 7VitP6M6LUmRSgJtEL5B GP64gpUeMS8zRXxA iqn.1994-05.com.redhat:f83f525515f0 Dec 03 22:30:52 np0005544966.novalocal systemd[1]: Started Session c98 of User root. Dec 03 22:30:52 np0005544966.novalocal sudo[95007]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:30:53 np0005544966.novalocal sudo[95007]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:53 np0005544966.novalocal systemd[1]: session-c98.scope: Deactivated successfully. Dec 03 22:30:53 np0005544966.novalocal sudo[95015]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:30:53 np0005544966.novalocal systemd[1]: Started Session c99 of User root. Dec 03 22:30:53 np0005544966.novalocal sudo[95015]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:30:54 np0005544966.novalocal sudo[95015]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:54 np0005544966.novalocal systemd[1]: session-c99.scope: Deactivated successfully. Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 153ca3c4-0890-4296-bad3-25730454a1fa Dec 03 22:30:54 np0005544966.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Dec 03 22:30:54 np0005544966.novalocal iscsid[73267]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda, portal: ::1,3260] through [iface: default] is operational now Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:54 np0005544966.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Dec 03 22:30:54 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Dec 03 22:30:54 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405c59e620a2fa1409e8d84365ce port group 0 rel port 1 Dec 03 22:30:54 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Dec 03 22:30:54 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Dec 03 22:30:54 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Dec 03 22:30:54 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Dec 03 22:30:54 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:30:54 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Dec 03 22:30:54 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Dec 03 22:30:54 np0005544966.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l f74ee36d-f640-4b9a-9265-e61f37d8b578 Dec 03 22:30:54 np0005544966.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Dec 03 22:30:54 np0005544966.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Dec 03 22:30:54 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:30:54 np0005544966.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 03 22:30:54 np0005544966.novalocal kernel: GPT:229375 != 2097151 Dec 03 22:30:54 np0005544966.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Dec 03 22:30:54 np0005544966.novalocal kernel: GPT:229375 != 2097151 Dec 03 22:30:54 np0005544966.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Dec 03 22:30:54 np0005544966.novalocal kernel: sda: sda1 sda15 Dec 03 22:30:54 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l f2d559f7-8462-46bc-9005-452829031dc9 Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 710e17f3-48e9-4a80-b0da-0427e0496273 Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l f012745c-62fe-4408-8eea-46783af563fa Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 63a6eb1f-9253-4c26-885f-12cc639e97ac Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 956a0536-6f4d-4767-8898-231cbd57628d Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 9acb8a7c-4df4-4e60-8805-05789943f0c0 Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a75db48b-a78a-407e-a6fa-7d889bb59725 Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l b27544d9-b571-4e46-a31d-428747b6cfb2 Dec 03 22:30:54 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l ae0ee42e-e006-400b-8731-e0f869928e37 Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 350ddc32-1b73-41a7-807f-4f742a9a66ec Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 3c0fb558-3288-4497-88fc-533978ce0380 Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. For complete SELinux messages run: sealert -l 3994ec31-faf5-48d4-8a2a-4e30779996cf Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. For complete SELinux messages run: sealert -l ba8faddf-3676-4482-b7a6-c4b75b0f26aa Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e23c8d58-3845-4c6d-8ec2-fe0c91fd627a Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l f74ee36d-f640-4b9a-9265-e61f37d8b578 Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l f2d559f7-8462-46bc-9005-452829031dc9 Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 63a6eb1f-9253-4c26-885f-12cc639e97ac Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a75db48b-a78a-407e-a6fa-7d889bb59725 Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 956a0536-6f4d-4767-8898-231cbd57628d Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:55 np0005544966.novalocal sudo[95068]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Dec 03 22:30:55 np0005544966.novalocal systemd[1]: Started Session c100 of User root. Dec 03 22:30:55 np0005544966.novalocal setroubleshoot[94936]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Dec 03 22:30:56 np0005544966.novalocal sudo[95068]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a27e6028-8b24-437e-a552-06d2f706674b Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l c00b0ed1-fe6e-4bb2-b675-3f9f699adf5b Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 023701cf-8496-4c2b-a8fe-1a4f220d4eca Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: failed to retrieve rpm info for path '/dev/sda': Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2587fec0-e08e-43c4-a02c-3b5f6f5ef2de Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 295e1a46-5f43-4cea-b25e-c3f48e02a4f5 Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 9b9103a2-7393-4ba7-8fb0-e47861866237 Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:30:56 np0005544966.novalocal sudo[95068]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:56 np0005544966.novalocal systemd[1]: session-c100.scope: Deactivated successfully. Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 95a77501-3f25-40d5-a887-5873cfc746d5 Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l df9e5342-e2f6-48a1-a9b5-9ff4a05a27cc Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 1aa7ea0e-4a76-4d03-be48-4e7f9be631ac Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 6d25c4ae-c80f-4351-827f-f237e964c8bd Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 7bac84bc-dd71-4350-a1d3-60f6c97b5209 Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 6843a742-1de6-43af-90db-e83e7a9c8a06 Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 26670ce4-25d7-41b6-8333-b50e0666ef3e Dec 03 22:30:56 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:57 np0005544966.novalocal sudo[95083]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Dec 03 22:30:57 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 05736fc0-a88a-4b76-b700-c36c4a378c7a Dec 03 22:30:57 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:30:57 np0005544966.novalocal systemd[1]: Started Session c101 of User root. Dec 03 22:30:57 np0005544966.novalocal sudo[95083]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 03 22:30:57 np0005544966.novalocal sudo[95083]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:57 np0005544966.novalocal systemd[1]: session-c101.scope: Deactivated successfully. Dec 03 22:30:57 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 153ca3c4-0890-4296-bad3-25730454a1fa Dec 03 22:30:57 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Dec 03 22:30:57 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: Detached Dec 03 22:30:57 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:57 np0005544966.novalocal iscsid[73267]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda, portal: ::1,3260] through [iface: default] is shutdown. Dec 03 22:30:57 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. For complete SELinux messages run: sealert -l ba8faddf-3676-4482-b7a6-c4b75b0f26aa Dec 03 22:30:57 np0005544966.novalocal sudo[95128]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda iqn.1994-05.com.redhat:f83f525515f0 Dec 03 22:30:57 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:57 np0005544966.novalocal systemd[1]: Started Session c102 of User root. Dec 03 22:30:57 np0005544966.novalocal sudo[95128]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:30:57 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 710e17f3-48e9-4a80-b0da-0427e0496273 Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l f012745c-62fe-4408-8eea-46783af563fa Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e23c8d58-3845-4c6d-8ec2-fe0c91fd627a Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. For complete SELinux messages run: sealert -l 643c0117-196d-4e7e-9d00-302ed39891f8 Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 9acb8a7c-4df4-4e60-8805-05789943f0c0 Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 5c32a90b-2ed4-48bb-ab48-97144ff72df0 Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l dc5a9edf-5374-41a9-bf1b-e6be52652f4d Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l cc85f44c-3b9b-43bb-8907-a09178e7516d Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 023701cf-8496-4c2b-a8fe-1a4f220d4eca Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/python3.9 from remove_name access on the directory scsi-SLIO-ORG_IBLOCK_c59e620a-2fa1-409e-8d84-365cedbf3938. For complete SELinux messages run: sealert -l cae3e1d2-cea6-4ead-af85-ce965f4fdb5c Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/python3.9 from remove_name access on the directory scsi-SLIO-ORG_IBLOCK_c59e620a-2fa1-409e-8d84-365cedbf3938. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed remove_name access on the scsi-SLIO-ORG_IBLOCK_c59e620a-2fa1-409e-8d84-365cedbf3938 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'privsep-helper' --raw | audit2allow -M my-privsephelper # semodule -X 300 -i my-privsephelper.pp Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/python3.9 from unlink access on the lnk_file scsi-SLIO-ORG_IBLOCK_c59e620a-2fa1-409e-8d84-365cedbf3938. For complete SELinux messages run: sealert -l bf78eda8-d228-48a5-9c1b-444a8aff411d Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/bin/python3.9 from unlink access on the lnk_file scsi-SLIO-ORG_IBLOCK_c59e620a-2fa1-409e-8d84-365cedbf3938. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed unlink access on the scsi-SLIO-ORG_IBLOCK_c59e620a-2fa1-409e-8d84-365cedbf3938 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'privsep-helper' --raw | audit2allow -M my-privsephelper # semodule -X 300 -i my-privsephelper.pp Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 15a37fe6-0cfb-48ed-a45c-aee0508058b4 Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda. For complete SELinux messages run: sealert -l b27544d9-b571-4e46-a31d-428747b6cfb2 Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l c0f4f098-0b84-4582-b4f9-7d460a2b6dd9 Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 32eb7548-f1f6-4cfa-b2d1-ee2e20c8d8d2 Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda. For complete SELinux messages run: sealert -l aa61ca28-8dbc-4405-a3fc-a6f32652f268 Dec 03 22:30:58 np0005544966.novalocal setroubleshoot[94936]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:30:58 np0005544966.novalocal sudo[95128]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:58 np0005544966.novalocal systemd[1]: session-c102.scope: Deactivated successfully. Dec 03 22:30:58 np0005544966.novalocal sudo[95138]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:30:58 np0005544966.novalocal systemd[1]: Started Session c103 of User root. Dec 03 22:30:58 np0005544966.novalocal sudo[95138]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:30:59 np0005544966.novalocal sudo[95138]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:59 np0005544966.novalocal systemd[1]: session-c103.scope: Deactivated successfully. Dec 03 22:30:59 np0005544966.novalocal sudo[95143]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 03 22:30:59 np0005544966.novalocal systemd[1]: Started Session c104 of User root. Dec 03 22:30:59 np0005544966.novalocal sudo[95143]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:30:59 np0005544966.novalocal sudo[95143]: pam_unix(sudo:session): session closed for user root Dec 03 22:30:59 np0005544966.novalocal systemd[1]: session-c104.scope: Deactivated successfully. Dec 03 22:30:59 np0005544966.novalocal sudo[95149]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-80775758-f3c0-4652-9e37-3c4d4e035cda Dec 03 22:30:59 np0005544966.novalocal systemd[1]: Started Session c105 of User root. Dec 03 22:30:59 np0005544966.novalocal sudo[95149]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:31:00 np0005544966.novalocal sudo[95149]: pam_unix(sudo:session): session closed for user root Dec 03 22:31:00 np0005544966.novalocal systemd[1]: session-c105.scope: Deactivated successfully. Dec 03 22:31:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:31:00 np0005544966.novalocal sudo[95154]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:31:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:31:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:31:00 np0005544966.novalocal systemd[1]: Started Session c106 of User root. Dec 03 22:31:00 np0005544966.novalocal sudo[95154]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:31:00 np0005544966.novalocal sudo[95154]: pam_unix(sudo:session): session closed for user root Dec 03 22:31:00 np0005544966.novalocal systemd[1]: session-c106.scope: Deactivated successfully. Dec 03 22:31:01 np0005544966.novalocal sudo[95165]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context nova.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpn3ajds8h/privsep.sock Dec 03 22:31:01 np0005544966.novalocal systemd[1]: Started Session c107 of User root. Dec 03 22:31:01 np0005544966.novalocal sudo[95165]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Dec 03 22:31:01 np0005544966.novalocal sudo[95165]: pam_unix(sudo:session): session closed for user root Dec 03 22:31:01 np0005544966.novalocal sudo[95173]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:31:02 np0005544966.novalocal systemd[1]: Started Session c108 of User root. Dec 03 22:31:02 np0005544966.novalocal sudo[95173]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:31:02 np0005544966.novalocal sudo[95173]: pam_unix(sudo:session): session closed for user root Dec 03 22:31:02 np0005544966.novalocal systemd[1]: session-c108.scope: Deactivated successfully. Dec 03 22:31:02 np0005544966.novalocal sudo[95187]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:31:02 np0005544966.novalocal systemd[1]: Started Session c109 of User root. Dec 03 22:31:02 np0005544966.novalocal sudo[95187]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:31:02 np0005544966.novalocal sudo[95187]: pam_unix(sudo:session): session closed for user root Dec 03 22:31:02 np0005544966.novalocal systemd[1]: session-c109.scope: Deactivated successfully. Dec 03 22:31:02 np0005544966.novalocal sudo[95196]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:31:02 np0005544966.novalocal systemd[1]: Started Session c110 of User root. Dec 03 22:31:02 np0005544966.novalocal sudo[95196]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:31:03 np0005544966.novalocal sudo[95196]: pam_unix(sudo:session): session closed for user root Dec 03 22:31:03 np0005544966.novalocal systemd[1]: session-c110.scope: Deactivated successfully. Dec 03 22:31:03 np0005544966.novalocal sudo[95202]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context vif_plug_ovs.privsep.vif_plug --privsep_sock_path /tmp/tmp8sb2rfla/privsep.sock Dec 03 22:31:03 np0005544966.novalocal systemd[1]: Started Session c111 of User root. Dec 03 22:31:03 np0005544966.novalocal sudo[95204]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:31:03 np0005544966.novalocal sudo[95202]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Dec 03 22:31:03 np0005544966.novalocal systemd[1]: Started Session c112 of User root. Dec 03 22:31:03 np0005544966.novalocal sudo[95204]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:31:03 np0005544966.novalocal sudo[95204]: pam_unix(sudo:session): session closed for user root Dec 03 22:31:03 np0005544966.novalocal systemd[1]: session-c112.scope: Deactivated successfully. Dec 03 22:31:04 np0005544966.novalocal sudo[95202]: pam_unix(sudo:session): session closed for user root Dec 03 22:31:05 np0005544966.novalocal kernel: tun: Universal TUN/TAP device driver, 1.6 Dec 03 22:31:05 np0005544966.novalocal kernel: tap0892562a-5a: entered promiscuous mode Dec 03 22:31:05 np0005544966.novalocal NetworkManager[846]: [1764819065.4960] manager: (tap0892562a-5a): new Tun device (/org/freedesktop/NetworkManager/Devices/9) Dec 03 22:31:05 np0005544966.novalocal virtqemud[92372]: Domain id=1 name='instance-00000001' uuid=f2279fa3-cc4b-4158-abfd-ed4edeebe269 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 03 22:31:05 np0005544966.novalocal virtqemud[92372]: Domain id=1 name='instance-00000001' uuid=f2279fa3-cc4b-4158-abfd-ed4edeebe269 is tainted: deprecated-config (CPU model 'qemu64') Dec 03 22:31:05 np0005544966.novalocal systemd-udevd[95272]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:31:05 np0005544966.novalocal systemd-machined[89644]: New machine qemu-1-instance-00000001. Dec 03 22:31:05 np0005544966.novalocal NetworkManager[846]: [1764819065.5743] device (tap0892562a-5a): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 03 22:31:05 np0005544966.novalocal NetworkManager[846]: [1764819065.5767] device (tap0892562a-5a): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 03 22:31:05 np0005544966.novalocal systemd[1]: Started Virtual Machine qemu-1-instance-00000001. Dec 03 22:31:05 np0005544966.novalocal sudo[95285]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmpy3_w6ko5/privsep.sock Dec 03 22:31:05 np0005544966.novalocal systemd[1]: Started Session c113 of User root. Dec 03 22:31:05 np0005544966.novalocal sudo[95285]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:31:06 np0005544966.novalocal sudo[95285]: pam_unix(sudo:session): session closed for user root Dec 03 22:31:07 np0005544966.novalocal NetworkManager[846]: [1764819067.3423] manager: (tap2a939d13-10): new Veth device (/org/freedesktop/NetworkManager/Devices/10) Dec 03 22:31:07 np0005544966.novalocal systemd-udevd[95270]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:31:07 np0005544966.novalocal NetworkManager[846]: [1764819067.4246] device (tap2a939d13-10): carrier: link connected Dec 03 22:31:07 np0005544966.novalocal kernel: tap2a939d13-10: entered promiscuous mode Dec 03 22:31:07 np0005544966.novalocal sudo[95332]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-2a939d13-1960-4f52-b21a-30e1869ff704 env PROCESS_TAG=haproxy-2a939d13-1960-4f52-b21a-30e1869ff704 haproxy -f /var/lib/neutron/ovn-metadata-proxy/2a939d13-1960-4f52-b21a-30e1869ff704.conf Dec 03 22:31:07 np0005544966.novalocal systemd[1]: Started Session c114 of User root. Dec 03 22:31:07 np0005544966.novalocal sudo[95332]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:31:08 np0005544966.novalocal sudo[95332]: pam_unix(sudo:session): session closed for user root Dec 03 22:31:08 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Deactivated successfully. Dec 03 22:31:08 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Consumed 1.281s CPU time. Dec 03 22:31:08 np0005544966.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 03 22:31:08 np0005544966.novalocal systemd[1]: setroubleshootd.service: Consumed 4.220s CPU time. Dec 03 22:31:09 np0005544966.novalocal sshd[44935]: drop connection #0 from [14.103.118.167]:40284 on [38.102.83.17]:22 penalty: exceeded LoginGraceTime Dec 03 22:31:10 np0005544966.novalocal kernel: tap544fb92d-d0: entered promiscuous mode Dec 03 22:31:10 np0005544966.novalocal NetworkManager[846]: [1764819070.0528] manager: (tap544fb92d-d0): new Tun device (/org/freedesktop/NetworkManager/Devices/11) Dec 03 22:31:10 np0005544966.novalocal virtqemud[92372]: Domain id=2 name='instance-00000002' uuid=b23120a8-27e4-4e33-98a3-d7861b5705a5 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 03 22:31:10 np0005544966.novalocal virtqemud[92372]: Domain id=2 name='instance-00000002' uuid=b23120a8-27e4-4e33-98a3-d7861b5705a5 is tainted: deprecated-config (CPU model 'qemu64') Dec 03 22:31:10 np0005544966.novalocal systemd-udevd[95380]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:31:10 np0005544966.novalocal systemd-machined[89644]: New machine qemu-2-instance-00000002. Dec 03 22:31:10 np0005544966.novalocal NetworkManager[846]: [1764819070.1374] device (tap544fb92d-d0): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 03 22:31:10 np0005544966.novalocal NetworkManager[846]: [1764819070.1398] device (tap544fb92d-d0): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 03 22:31:10 np0005544966.novalocal systemd[1]: Started Virtual Machine qemu-2-instance-00000002. Dec 03 22:31:10 np0005544966.novalocal systemd-udevd[95383]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:31:10 np0005544966.novalocal NetworkManager[846]: [1764819070.2197] manager: (tap1e858257-c0): new Veth device (/org/freedesktop/NetworkManager/Devices/12) Dec 03 22:31:10 np0005544966.novalocal NetworkManager[846]: [1764819070.3059] device (tap1e858257-c0): carrier: link connected Dec 03 22:31:10 np0005544966.novalocal kernel: tap1e858257-c0: entered promiscuous mode Dec 03 22:31:10 np0005544966.novalocal sudo[95425]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-1e858257-cb00-4dd4-a3f0-b3f6fe20916c env PROCESS_TAG=haproxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c haproxy -f /var/lib/neutron/ovn-metadata-proxy/1e858257-cb00-4dd4-a3f0-b3f6fe20916c.conf Dec 03 22:31:10 np0005544966.novalocal systemd[1]: Started Session c115 of User root. Dec 03 22:31:10 np0005544966.novalocal sudo[95425]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:31:10 np0005544966.novalocal sudo[95425]: pam_unix(sudo:session): session closed for user root Dec 03 22:31:16 np0005544966.novalocal kernel: tap0892562a-5a (unregistering): left promiscuous mode Dec 03 22:31:16 np0005544966.novalocal NetworkManager[846]: [1764819076.2704] device (tap0892562a-5a): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 03 22:31:16 np0005544966.novalocal systemd[1]: session-c114.scope: Deactivated successfully. Dec 03 22:31:16 np0005544966.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Deactivated successfully. Dec 03 22:31:16 np0005544966.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Consumed 10.721s CPU time. Dec 03 22:31:16 np0005544966.novalocal systemd-machined[89644]: Machine qemu-1-instance-00000001 terminated. Dec 03 22:31:16 np0005544966.novalocal kernel: tap2a939d13-10: left promiscuous mode Dec 03 22:31:16 np0005544966.novalocal systemd[1]: run-netns-ovnmeta\x2d2a939d13\x2d1960\x2d4f52\x2db21a\x2d30e1869ff704.mount: Deactivated successfully. Dec 03 22:31:29 np0005544966.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 03 22:31:29 np0005544966.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 03 22:31:30 np0005544966.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service. Dec 03 22:31:31 np0005544966.novalocal setroubleshoot[95509]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l f4fb5028-a1c2-4f61-acec-5f5df89deed1 Dec 03 22:31:31 np0005544966.novalocal setroubleshoot[95509]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server:' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Dec 03 22:31:31 np0005544966.novalocal setroubleshoot[95509]: SELinux is preventing /usr/sbin/httpd from read access on the file 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. For complete SELinux messages run: sealert -l c3128726-dea7-4e31-ab85-a0747e978e5f Dec 03 22:31:31 np0005544966.novalocal setroubleshoot[95509]: SELinux is preventing /usr/sbin/httpd from read access on the file 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:31:32 np0005544966.novalocal setroubleshoot[95509]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4': Dec 03 22:31:32 np0005544966.novalocal setroubleshoot[95509]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. For complete SELinux messages run: sealert -l 677d2ecd-8a6a-4cdd-8a6d-bba1b1f52a26 Dec 03 22:31:32 np0005544966.novalocal setroubleshoot[95509]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:31:32 np0005544966.novalocal setroubleshoot[95509]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. For complete SELinux messages run: sealert -l 3ac1f0ae-384c-47fb-8d1b-d779a840c399 Dec 03 22:31:32 np0005544966.novalocal setroubleshoot[95509]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:31:32 np0005544966.novalocal setroubleshoot[95509]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. For complete SELinux messages run: sealert -l 0da0fffb-6d4f-4ed0-b17a-236b8e4f708d Dec 03 22:31:32 np0005544966.novalocal setroubleshoot[95509]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 6b7b33265c5c2d97fb7c8fdffa5c716adf6ad9a792c15b51c457b0f1d73d83b4 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:31:32 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:56314 [03/Dec/2025:22:31:29.112] listener listener/metadata 0/0/0/3101/3101 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 03 22:31:34 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:56324 [03/Dec/2025:22:31:32.272] listener listener/metadata 0/0/0/2155/2155 200 147 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Dec 03 22:31:34 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:56340 [03/Dec/2025:22:31:34.488] listener listener/metadata 0/0/0/14/14 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Dec 03 22:31:34 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:56354 [03/Dec/2025:22:31:34.556] listener listener/metadata 0/0/0/13/13 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 03 22:31:34 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:56366 [03/Dec/2025:22:31:34.614] listener listener/metadata 0/0/0/15/15 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Dec 03 22:31:34 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:56368 [03/Dec/2025:22:31:34.675] listener listener/metadata 0/0/0/18/18 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Dec 03 22:31:34 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:44186 [03/Dec/2025:22:31:34.736] listener listener/metadata 0/0/0/15/15 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Dec 03 22:31:34 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:44202 [03/Dec/2025:22:31:34.790] listener listener/metadata 0/0/0/17/17 200 132 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Dec 03 22:31:34 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:44208 [03/Dec/2025:22:31:34.865] listener listener/metadata 0/0/0/17/17 200 184 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Dec 03 22:31:34 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:44222 [03/Dec/2025:22:31:34.933] listener listener/metadata 0/0/0/12/12 200 184 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Dec 03 22:31:35 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:44238 [03/Dec/2025:22:31:34.987] listener listener/metadata 0/0/0/16/16 200 215 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Dec 03 22:31:35 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:44240 [03/Dec/2025:22:31:35.045] listener listener/metadata 0/0/0/18/18 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Dec 03 22:31:35 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:44254 [03/Dec/2025:22:31:35.092] listener listener/metadata 0/0/0/16/16 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Dec 03 22:31:35 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:44264 [03/Dec/2025:22:31:35.137] listener listener/metadata 0/0/0/14/14 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Dec 03 22:31:35 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:44268 [03/Dec/2025:22:31:35.191] listener listener/metadata 0/0/0/17/17 200 184 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Dec 03 22:31:35 np0005544966.novalocal haproxy-metadata-proxy-1e858257-cb00-4dd4-a3f0-b3f6fe20916c[95430]: 10.100.0.6:44278 [03/Dec/2025:22:31:35.248] listener listener/metadata 0/0/0/16/16 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Dec 03 22:31:42 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Deactivated successfully. Dec 03 22:31:42 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Consumed 1.365s CPU time. Dec 03 22:31:42 np0005544966.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 03 22:31:42 np0005544966.novalocal systemd[1]: setroubleshootd.service: Consumed 1.404s CPU time. Dec 03 22:31:46 np0005544966.novalocal kernel: tapb1ff921c-e4: entered promiscuous mode Dec 03 22:31:46 np0005544966.novalocal NetworkManager[846]: [1764819106.4251] manager: (tapb1ff921c-e4): new Tun device (/org/freedesktop/NetworkManager/Devices/13) Dec 03 22:31:46 np0005544966.novalocal virtqemud[92372]: Domain id=3 name='instance-00000003' uuid=18b8692b-e60e-4d4a-830b-9802fc70c0ce is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 03 22:31:46 np0005544966.novalocal virtqemud[92372]: Domain id=3 name='instance-00000003' uuid=18b8692b-e60e-4d4a-830b-9802fc70c0ce is tainted: deprecated-config (CPU model 'qemu64') Dec 03 22:31:46 np0005544966.novalocal systemd-machined[89644]: New machine qemu-3-instance-00000003. Dec 03 22:31:46 np0005544966.novalocal systemd-udevd[95591]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:31:46 np0005544966.novalocal systemd[1]: Started Virtual Machine qemu-3-instance-00000003. Dec 03 22:31:46 np0005544966.novalocal NetworkManager[846]: [1764819106.4995] device (tapb1ff921c-e4): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 03 22:31:46 np0005544966.novalocal NetworkManager[846]: [1764819106.5006] device (tapb1ff921c-e4): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 03 22:31:46 np0005544966.novalocal NetworkManager[846]: [1764819106.5688] manager: (tap0ee052cb-b0): new Veth device (/org/freedesktop/NetworkManager/Devices/14) Dec 03 22:31:46 np0005544966.novalocal NetworkManager[846]: [1764819106.6318] device (tap0ee052cb-b0): carrier: link connected Dec 03 22:31:46 np0005544966.novalocal kernel: tap0ee052cb-b0: entered promiscuous mode Dec 03 22:31:46 np0005544966.novalocal sudo[95636]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-0ee052cb-b503-434c-9593-74e23f52d949 env PROCESS_TAG=haproxy-0ee052cb-b503-434c-9593-74e23f52d949 haproxy -f /var/lib/neutron/ovn-metadata-proxy/0ee052cb-b503-434c-9593-74e23f52d949.conf Dec 03 22:31:46 np0005544966.novalocal systemd[1]: Started Session c116 of User root. Dec 03 22:31:46 np0005544966.novalocal sudo[95636]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:31:47 np0005544966.novalocal sudo[95636]: pam_unix(sudo:session): session closed for user root Dec 03 22:31:50 np0005544966.novalocal sshd-session[95649]: Received disconnect from 103.19.254.14 port 38036:11: Bye Bye [preauth] Dec 03 22:31:50 np0005544966.novalocal sshd-session[95649]: Disconnected from authenticating user root 103.19.254.14 port 38036 [preauth] Dec 03 22:31:59 np0005544966.novalocal kernel: tapb1ff921c-e4 (unregistering): left promiscuous mode Dec 03 22:31:59 np0005544966.novalocal NetworkManager[846]: [1764819119.0822] device (tapb1ff921c-e4): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 03 22:31:59 np0005544966.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Deactivated successfully. Dec 03 22:31:59 np0005544966.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Consumed 11.331s CPU time. Dec 03 22:31:59 np0005544966.novalocal systemd[1]: session-c116.scope: Deactivated successfully. Dec 03 22:31:59 np0005544966.novalocal systemd-machined[89644]: Machine qemu-3-instance-00000003 terminated. Dec 03 22:31:59 np0005544966.novalocal kernel: tap0ee052cb-b0: left promiscuous mode Dec 03 22:31:59 np0005544966.novalocal systemd[1]: run-netns-ovnmeta\x2d0ee052cb\x2db503\x2d434c\x2d9593\x2d74e23f52d949.mount: Deactivated successfully. Dec 03 22:32:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:32:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:32:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:32:01 np0005544966.novalocal sudo[95698]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:32:02 np0005544966.novalocal systemd[1]: Started Session c117 of User root. Dec 03 22:32:02 np0005544966.novalocal sudo[95698]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:02 np0005544966.novalocal sudo[95698]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:02 np0005544966.novalocal systemd[1]: session-c117.scope: Deactivated successfully. Dec 03 22:32:02 np0005544966.novalocal kernel: tap544fb92d-d0 (unregistering): left promiscuous mode Dec 03 22:32:02 np0005544966.novalocal NetworkManager[846]: [1764819122.3978] device (tap544fb92d-d0): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 03 22:32:02 np0005544966.novalocal sudo[95702]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:32:02 np0005544966.novalocal systemd[1]: Started Session c118 of User root. Dec 03 22:32:02 np0005544966.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Deactivated successfully. Dec 03 22:32:02 np0005544966.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Consumed 20.165s CPU time. Dec 03 22:32:02 np0005544966.novalocal systemd-machined[89644]: Machine qemu-2-instance-00000002 terminated. Dec 03 22:32:02 np0005544966.novalocal kernel: tap1e858257-c0: left promiscuous mode Dec 03 22:32:02 np0005544966.novalocal systemd[1]: run-netns-ovnmeta\x2d1e858257\x2dcb00\x2d4dd4\x2da3f0\x2db3f6fe20916c.mount: Deactivated successfully. Dec 03 22:32:02 np0005544966.novalocal systemd[1]: session-c115.scope: Deactivated successfully. Dec 03 22:32:02 np0005544966.novalocal sudo[95702]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:02 np0005544966.novalocal sudo[95702]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:02 np0005544966.novalocal systemd[1]: session-c118.scope: Deactivated successfully. Dec 03 22:32:02 np0005544966.novalocal sudo[95740]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:32:02 np0005544966.novalocal systemd[1]: Started Session c119 of User root. Dec 03 22:32:02 np0005544966.novalocal sudo[95740]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:03 np0005544966.novalocal sudo[95740]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:03 np0005544966.novalocal systemd[1]: session-c119.scope: Deactivated successfully. Dec 03 22:32:03 np0005544966.novalocal sudo[95746]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:32:03 np0005544966.novalocal systemd[1]: Started Session c120 of User root. Dec 03 22:32:03 np0005544966.novalocal sudo[95746]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:03 np0005544966.novalocal sudo[95746]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:03 np0005544966.novalocal systemd[1]: session-c120.scope: Deactivated successfully. Dec 03 22:32:24 np0005544966.novalocal sudo[95798]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-80775758-f3c0-4652-9e37-3c4d4e035cda Dec 03 22:32:24 np0005544966.novalocal systemd[1]: Started Session c121 of User root. Dec 03 22:32:24 np0005544966.novalocal sudo[95798]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:24 np0005544966.novalocal sudo[95798]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:24 np0005544966.novalocal systemd[1]: session-c121.scope: Deactivated successfully. Dec 03 22:32:24 np0005544966.novalocal sudo[95802]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate --name volume-87d02693-a449-439c-8638-8590d4c17e16 --snapshot cinder-volumes/volume-80775758-f3c0-4652-9e37-3c4d4e035cda Dec 03 22:32:24 np0005544966.novalocal systemd[1]: Started Session c122 of User root. Dec 03 22:32:24 np0005544966.novalocal sudo[95802]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:25 np0005544966.novalocal dmeventd[88196]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Dec 03 22:32:25 np0005544966.novalocal dmeventd[88196]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Dec 03 22:32:25 np0005544966.novalocal lvm[95815]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:32:25 np0005544966.novalocal lvm[95815]: VG cinder-volumes finished Dec 03 22:32:25 np0005544966.novalocal sudo[95802]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:25 np0005544966.novalocal systemd[1]: session-c122.scope: Deactivated successfully. Dec 03 22:32:25 np0005544966.novalocal sudo[95825]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -k n cinder-volumes/volume-87d02693-a449-439c-8638-8590d4c17e16 Dec 03 22:32:25 np0005544966.novalocal systemd[1]: Started Session c123 of User root. Dec 03 22:32:25 np0005544966.novalocal sudo[95825]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:25 np0005544966.novalocal lvm[95836]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:32:25 np0005544966.novalocal lvm[95836]: VG cinder-volumes finished Dec 03 22:32:25 np0005544966.novalocal sudo[95825]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:25 np0005544966.novalocal systemd[1]: session-c123.scope: Deactivated successfully. Dec 03 22:32:27 np0005544966.novalocal kernel: tap45b96b8f-27: entered promiscuous mode Dec 03 22:32:27 np0005544966.novalocal NetworkManager[846]: [1764819147.9692] manager: (tap45b96b8f-27): new Tun device (/org/freedesktop/NetworkManager/Devices/15) Dec 03 22:32:27 np0005544966.novalocal systemd-udevd[95837]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:32:27 np0005544966.novalocal virtqemud[92372]: Domain id=4 name='instance-00000004' uuid=d15eb5d4-533e-4996-8272-0e2cbad05ff7 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 03 22:32:27 np0005544966.novalocal virtqemud[92372]: Domain id=4 name='instance-00000004' uuid=d15eb5d4-533e-4996-8272-0e2cbad05ff7 is tainted: deprecated-config (CPU model 'qemu64') Dec 03 22:32:27 np0005544966.novalocal NetworkManager[846]: [1764819147.9926] device (tap45b96b8f-27): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 03 22:32:27 np0005544966.novalocal NetworkManager[846]: [1764819147.9942] device (tap45b96b8f-27): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 03 22:32:28 np0005544966.novalocal systemd-machined[89644]: New machine qemu-4-instance-00000004. Dec 03 22:32:28 np0005544966.novalocal systemd[1]: Started Virtual Machine qemu-4-instance-00000004. Dec 03 22:32:28 np0005544966.novalocal NetworkManager[846]: [1764819148.1241] manager: (tap58b6a7b8-20): new Veth device (/org/freedesktop/NetworkManager/Devices/16) Dec 03 22:32:28 np0005544966.novalocal NetworkManager[846]: [1764819148.2033] device (tap58b6a7b8-20): carrier: link connected Dec 03 22:32:28 np0005544966.novalocal kernel: tap58b6a7b8-20: entered promiscuous mode Dec 03 22:32:28 np0005544966.novalocal sudo[95903]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c env PROCESS_TAG=haproxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c haproxy -f /var/lib/neutron/ovn-metadata-proxy/58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c.conf Dec 03 22:32:28 np0005544966.novalocal systemd[1]: Started Session c124 of User root. Dec 03 22:32:28 np0005544966.novalocal sudo[95903]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:32:28 np0005544966.novalocal sudo[95903]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:33 np0005544966.novalocal sudo[95918]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpy8ru572h/privsep.sock Dec 03 22:32:33 np0005544966.novalocal systemd[1]: Started Session c125 of User root. Dec 03 22:32:33 np0005544966.novalocal sudo[95918]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Dec 03 22:32:34 np0005544966.novalocal sudo[95918]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:34 np0005544966.novalocal sudo[95931]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-87d02693-a449-439c-8638-8590d4c17e16 Dec 03 22:32:34 np0005544966.novalocal systemd[1]: Started Session c126 of User root. Dec 03 22:32:34 np0005544966.novalocal sudo[95931]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:35 np0005544966.novalocal sudo[95931]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:35 np0005544966.novalocal systemd[1]: session-c126.scope: Deactivated successfully. Dec 03 22:32:35 np0005544966.novalocal sudo[95935]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-87d02693-a449-439c-8638-8590d4c17e16 iqn.2010-10.org.openstack:volume-87d02693-a449-439c-8638-8590d4c17e16 z9adVKcUJwTsQfTdNgo4 8gTmNBsN2W9hnfUq False -p3260 -a::1 Dec 03 22:32:35 np0005544966.novalocal systemd[1]: Started Session c127 of User root. Dec 03 22:32:35 np0005544966.novalocal sudo[95935]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:35 np0005544966.novalocal sudo[95935]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:35 np0005544966.novalocal systemd[1]: session-c127.scope: Deactivated successfully. Dec 03 22:32:36 np0005544966.novalocal sudo[95941]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 03 22:32:36 np0005544966.novalocal systemd[1]: Started Session c128 of User root. Dec 03 22:32:36 np0005544966.novalocal sudo[95941]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:36 np0005544966.novalocal sudo[95941]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:36 np0005544966.novalocal systemd[1]: session-c128.scope: Deactivated successfully. Dec 03 22:32:36 np0005544966.novalocal sudo[95959]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:32:36 np0005544966.novalocal systemd[1]: Started Session c129 of User root. Dec 03 22:32:36 np0005544966.novalocal sudo[95959]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:37 np0005544966.novalocal sudo[95959]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:37 np0005544966.novalocal systemd[1]: session-c129.scope: Deactivated successfully. Dec 03 22:32:37 np0005544966.novalocal sudo[95964]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-87d02693-a449-439c-8638-8590d4c17e16 z9adVKcUJwTsQfTdNgo4 8gTmNBsN2W9hnfUq iqn.1994-05.com.redhat:f83f525515f0 Dec 03 22:32:37 np0005544966.novalocal systemd[1]: Started Session c130 of User root. Dec 03 22:32:37 np0005544966.novalocal sudo[95964]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:37 np0005544966.novalocal sudo[95964]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:37 np0005544966.novalocal systemd[1]: session-c130.scope: Deactivated successfully. Dec 03 22:32:37 np0005544966.novalocal sudo[95977]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:32:37 np0005544966.novalocal systemd[1]: Started Session c131 of User root. Dec 03 22:32:37 np0005544966.novalocal sudo[95977]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:38 np0005544966.novalocal sudo[95977]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:38 np0005544966.novalocal systemd[1]: session-c131.scope: Deactivated successfully. Dec 03 22:32:40 np0005544966.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Dec 03 22:32:40 np0005544966.novalocal iscsid[73267]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-87d02693-a449-439c-8638-8590d4c17e16, portal: ::1,3260] through [iface: default] is operational now Dec 03 22:32:40 np0005544966.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Dec 03 22:32:40 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Dec 03 22:32:40 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014051ad589d39bf446a18d0b63141 port group 0 rel port 1 Dec 03 22:32:40 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Dec 03 22:32:40 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Dec 03 22:32:40 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Dec 03 22:32:40 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Dec 03 22:32:40 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:32:40 np0005544966.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Dec 03 22:32:40 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Dec 03 22:32:40 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Dec 03 22:32:40 np0005544966.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Dec 03 22:32:40 np0005544966.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Dec 03 22:32:40 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:32:40 np0005544966.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 03 22:32:40 np0005544966.novalocal kernel: GPT:229375 != 2097151 Dec 03 22:32:40 np0005544966.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Dec 03 22:32:40 np0005544966.novalocal kernel: GPT:229375 != 2097151 Dec 03 22:32:40 np0005544966.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Dec 03 22:32:40 np0005544966.novalocal kernel: sda: sda1 sda15 Dec 03 22:32:40 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Dec 03 22:32:41 np0005544966.novalocal systemd[1]: Listening on libvirt secret daemon admin socket. Dec 03 22:32:41 np0005544966.novalocal systemd[1]: Listening on libvirt secret daemon read-only socket. Dec 03 22:32:41 np0005544966.novalocal systemd[1]: Starting libvirt secret daemon... Dec 03 22:32:41 np0005544966.novalocal systemd[1]: Started libvirt secret daemon. Dec 03 22:32:43 np0005544966.novalocal kernel: tapb0cc2578-1f: entered promiscuous mode Dec 03 22:32:43 np0005544966.novalocal NetworkManager[846]: [1764819163.5413] manager: (tapb0cc2578-1f): new Tun device (/org/freedesktop/NetworkManager/Devices/17) Dec 03 22:32:43 np0005544966.novalocal virtqemud[92372]: Domain id=5 name='instance-00000005' uuid=1044c702-2f13-47a7-8453-03be3aebf5a4 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 03 22:32:43 np0005544966.novalocal virtqemud[92372]: Domain id=5 name='instance-00000005' uuid=1044c702-2f13-47a7-8453-03be3aebf5a4 is tainted: deprecated-config (CPU model 'qemu64') Dec 03 22:32:43 np0005544966.novalocal systemd-machined[89644]: New machine qemu-5-instance-00000005. Dec 03 22:32:43 np0005544966.novalocal systemd[1]: Started Virtual Machine qemu-5-instance-00000005. Dec 03 22:32:43 np0005544966.novalocal systemd-udevd[96064]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:32:43 np0005544966.novalocal NetworkManager[846]: [1764819163.6548] device (tapb0cc2578-1f): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 03 22:32:43 np0005544966.novalocal NetworkManager[846]: [1764819163.6559] device (tapb0cc2578-1f): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 03 22:32:43 np0005544966.novalocal NetworkManager[846]: [1764819163.6706] manager: (tap074d2e49-90): new Veth device (/org/freedesktop/NetworkManager/Devices/18) Dec 03 22:32:43 np0005544966.novalocal NetworkManager[846]: [1764819163.7357] device (tap074d2e49-90): carrier: link connected Dec 03 22:32:43 np0005544966.novalocal kernel: tap074d2e49-90: entered promiscuous mode Dec 03 22:32:43 np0005544966.novalocal sudo[96107]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-074d2e49-976b-4a02-a80c-6147e32dc830 env PROCESS_TAG=haproxy-074d2e49-976b-4a02-a80c-6147e32dc830 haproxy -f /var/lib/neutron/ovn-metadata-proxy/074d2e49-976b-4a02-a80c-6147e32dc830.conf Dec 03 22:32:43 np0005544966.novalocal systemd[1]: Started Session c132 of User root. Dec 03 22:32:43 np0005544966.novalocal sudo[96107]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:32:44 np0005544966.novalocal sudo[96107]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:46 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40650 [03/Dec/2025:22:32:46.832] listener listener/metadata 0/0/0/144/144 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 03 22:32:47 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40660 [03/Dec/2025:22:32:47.066] listener listener/metadata 0/0/0/14/14 200 148 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Dec 03 22:32:47 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40676 [03/Dec/2025:22:32:47.107] listener listener/metadata 0/0/0/12/12 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Dec 03 22:32:47 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40688 [03/Dec/2025:22:32:47.161] listener listener/metadata 0/0/0/15/15 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 03 22:32:47 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40694 [03/Dec/2025:22:32:47.222] listener listener/metadata 0/0/0/14/14 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Dec 03 22:32:47 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40706 [03/Dec/2025:22:32:47.279] listener listener/metadata 0/0/0/12/12 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Dec 03 22:32:47 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40714 [03/Dec/2025:22:32:47.333] listener listener/metadata 0/0/0/13/13 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Dec 03 22:32:47 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40726 [03/Dec/2025:22:32:47.383] listener listener/metadata 0/0/0/15/15 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Dec 03 22:32:47 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40742 [03/Dec/2025:22:32:47.433] listener listener/metadata 0/0/0/11/11 200 177 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Dec 03 22:32:47 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40746 [03/Dec/2025:22:32:47.482] listener listener/metadata 0/0/0/19/19 200 177 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Dec 03 22:32:47 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40750 [03/Dec/2025:22:32:47.538] listener listener/metadata 0/0/0/13/13 200 215 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Dec 03 22:32:47 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40764 [03/Dec/2025:22:32:47.584] listener listener/metadata 0/0/0/18/18 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Dec 03 22:32:47 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40778 [03/Dec/2025:22:32:47.629] listener listener/metadata 0/0/0/21/21 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Dec 03 22:32:47 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40784 [03/Dec/2025:22:32:47.721] listener listener/metadata 0/0/0/14/14 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Dec 03 22:32:47 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40794 [03/Dec/2025:22:32:47.791] listener listener/metadata 0/0/0/13/13 200 177 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Dec 03 22:32:47 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[95908]: 10.100.0.12:40802 [03/Dec/2025:22:32:47.846] listener listener/metadata 0/0/0/12/12 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Dec 03 22:32:49 np0005544966.novalocal kernel: tapb0cc2578-1f (unregistering): left promiscuous mode Dec 03 22:32:49 np0005544966.novalocal NetworkManager[846]: [1764819169.3259] device (tapb0cc2578-1f): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 03 22:32:49 np0005544966.novalocal systemd[1]: session-c132.scope: Deactivated successfully. Dec 03 22:32:49 np0005544966.novalocal kernel: tap074d2e49-90: left promiscuous mode Dec 03 22:32:49 np0005544966.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Deactivated successfully. Dec 03 22:32:49 np0005544966.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Consumed 5.577s CPU time. Dec 03 22:32:49 np0005544966.novalocal systemd-machined[89644]: Machine qemu-5-instance-00000005 terminated. Dec 03 22:32:49 np0005544966.novalocal systemd[1]: run-netns-ovnmeta\x2d074d2e49\x2d976b\x2d4a02\x2da80c\x2d6147e32dc830.mount: Deactivated successfully. Dec 03 22:32:49 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:32:49 np0005544966.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 03 22:32:49 np0005544966.novalocal kernel: GPT:229375 != 2097151 Dec 03 22:32:49 np0005544966.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Dec 03 22:32:49 np0005544966.novalocal kernel: GPT:229375 != 2097151 Dec 03 22:32:49 np0005544966.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Dec 03 22:32:49 np0005544966.novalocal kernel: sda: sda1 sda15 Dec 03 22:32:49 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:32:49 np0005544966.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 03 22:32:49 np0005544966.novalocal kernel: GPT:229375 != 2097151 Dec 03 22:32:49 np0005544966.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Dec 03 22:32:49 np0005544966.novalocal kernel: GPT:229375 != 2097151 Dec 03 22:32:49 np0005544966.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Dec 03 22:32:49 np0005544966.novalocal kernel: sda: sda1 sda15 Dec 03 22:32:49 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:32:49 np0005544966.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 03 22:32:49 np0005544966.novalocal kernel: GPT:229375 != 2097151 Dec 03 22:32:49 np0005544966.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Dec 03 22:32:49 np0005544966.novalocal kernel: GPT:229375 != 2097151 Dec 03 22:32:49 np0005544966.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Dec 03 22:32:49 np0005544966.novalocal kernel: sda: sda1 sda15 Dec 03 22:32:50 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Dec 03 22:32:50 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: Detached Dec 03 22:32:50 np0005544966.novalocal iscsid[73267]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-87d02693-a449-439c-8638-8590d4c17e16, portal: ::1,3260] through [iface: default] is shutdown. Dec 03 22:32:52 np0005544966.novalocal sudo[96203]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-87d02693-a449-439c-8638-8590d4c17e16 iqn.1994-05.com.redhat:f83f525515f0 Dec 03 22:32:52 np0005544966.novalocal systemd[1]: Started Session c133 of User root. Dec 03 22:32:52 np0005544966.novalocal sudo[96203]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:52 np0005544966.novalocal sudo[96203]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:53 np0005544966.novalocal systemd[1]: session-c133.scope: Deactivated successfully. Dec 03 22:32:53 np0005544966.novalocal sudo[96208]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:32:53 np0005544966.novalocal systemd[1]: Started Session c134 of User root. Dec 03 22:32:53 np0005544966.novalocal sudo[96208]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:53 np0005544966.novalocal sudo[96208]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:53 np0005544966.novalocal systemd[1]: session-c134.scope: Deactivated successfully. Dec 03 22:32:53 np0005544966.novalocal sudo[96217]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 03 22:32:53 np0005544966.novalocal systemd[1]: Started Session c135 of User root. Dec 03 22:32:53 np0005544966.novalocal sudo[96217]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:54 np0005544966.novalocal sudo[96217]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:54 np0005544966.novalocal systemd[1]: session-c135.scope: Deactivated successfully. Dec 03 22:32:54 np0005544966.novalocal sudo[96222]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-87d02693-a449-439c-8638-8590d4c17e16 Dec 03 22:32:54 np0005544966.novalocal systemd[1]: Started Session c136 of User root. Dec 03 22:32:54 np0005544966.novalocal sudo[96222]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:54 np0005544966.novalocal sudo[96222]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:54 np0005544966.novalocal systemd[1]: session-c136.scope: Deactivated successfully. Dec 03 22:32:54 np0005544966.novalocal sudo[96231]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:32:54 np0005544966.novalocal systemd[1]: Started Session c137 of User root. Dec 03 22:32:54 np0005544966.novalocal sudo[96231]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:55 np0005544966.novalocal sudo[96231]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:55 np0005544966.novalocal systemd[1]: session-c137.scope: Deactivated successfully. Dec 03 22:32:56 np0005544966.novalocal sudo[96236]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 03 22:32:56 np0005544966.novalocal systemd[1]: Started Session c138 of User root. Dec 03 22:32:56 np0005544966.novalocal sudo[96236]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:56 np0005544966.novalocal sudo[96236]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:56 np0005544966.novalocal systemd[1]: session-c138.scope: Deactivated successfully. Dec 03 22:32:56 np0005544966.novalocal sudo[96241]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-87d02693-a449-439c-8638-8590d4c17e16 Dec 03 22:32:56 np0005544966.novalocal systemd[1]: Started Session c139 of User root. Dec 03 22:32:56 np0005544966.novalocal sudo[96241]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:56 np0005544966.novalocal sudo[96241]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:57 np0005544966.novalocal systemd[1]: session-c139.scope: Deactivated successfully. Dec 03 22:32:57 np0005544966.novalocal sudo[96245]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-87d02693-a449-439c-8638-8590d4c17e16 Dec 03 22:32:57 np0005544966.novalocal systemd[1]: Started Session c140 of User root. Dec 03 22:32:57 np0005544966.novalocal sudo[96245]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:57 np0005544966.novalocal sshd-session[96198]: Connection closed by 14.103.118.167 port 59994 [preauth] Dec 03 22:32:57 np0005544966.novalocal sudo[96245]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:57 np0005544966.novalocal systemd[1]: session-c140.scope: Deactivated successfully. Dec 03 22:32:57 np0005544966.novalocal sudo[96250]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-87d02693-a449-439c-8638-8590d4c17e16 Dec 03 22:32:57 np0005544966.novalocal systemd[1]: Started Session c141 of User root. Dec 03 22:32:57 np0005544966.novalocal sudo[96250]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:57 np0005544966.novalocal lvm[96257]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:32:57 np0005544966.novalocal lvm[96257]: VG cinder-volumes finished Dec 03 22:32:57 np0005544966.novalocal sudo[96250]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:57 np0005544966.novalocal systemd[1]: session-c141.scope: Deactivated successfully. Dec 03 22:32:58 np0005544966.novalocal sudo[96258]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:32:58 np0005544966.novalocal systemd[1]: Started Session c142 of User root. Dec 03 22:32:58 np0005544966.novalocal sudo[96258]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:58 np0005544966.novalocal sudo[96258]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:58 np0005544966.novalocal systemd[1]: session-c142.scope: Deactivated successfully. Dec 03 22:32:58 np0005544966.novalocal kernel: tap45b96b8f-27 (unregistering): left promiscuous mode Dec 03 22:32:58 np0005544966.novalocal NetworkManager[846]: [1764819178.4835] device (tap45b96b8f-27): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 03 22:32:58 np0005544966.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Deactivated successfully. Dec 03 22:32:58 np0005544966.novalocal sudo[96262]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:32:58 np0005544966.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Consumed 18.073s CPU time. Dec 03 22:32:58 np0005544966.novalocal systemd-machined[89644]: Machine qemu-4-instance-00000004 terminated. Dec 03 22:32:58 np0005544966.novalocal kernel: tap58b6a7b8-20: left promiscuous mode Dec 03 22:32:58 np0005544966.novalocal systemd[1]: session-c124.scope: Deactivated successfully. Dec 03 22:32:58 np0005544966.novalocal systemd[1]: Started Session c143 of User root. Dec 03 22:32:58 np0005544966.novalocal systemd[1]: run-netns-ovnmeta\x2d58b6a7b8\x2d2e9c\x2d4ebd\x2d8baa\x2d7334d8dc175c.mount: Deactivated successfully. Dec 03 22:32:58 np0005544966.novalocal sudo[96262]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:58 np0005544966.novalocal kernel: tap45b96b8f-27: entered promiscuous mode Dec 03 22:32:58 np0005544966.novalocal NetworkManager[846]: [1764819178.6944] manager: (tap45b96b8f-27): new Tun device (/org/freedesktop/NetworkManager/Devices/19) Dec 03 22:32:58 np0005544966.novalocal kernel: tap45b96b8f-27 (unregistering): left promiscuous mode Dec 03 22:32:58 np0005544966.novalocal NetworkManager[846]: [1764819178.8340] manager: (tap58b6a7b8-20): new Veth device (/org/freedesktop/NetworkManager/Devices/20) Dec 03 22:32:58 np0005544966.novalocal systemd-udevd[96254]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:32:58 np0005544966.novalocal NetworkManager[846]: [1764819178.8991] device (tap58b6a7b8-20): carrier: link connected Dec 03 22:32:59 np0005544966.novalocal sudo[96262]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:59 np0005544966.novalocal systemd[1]: session-c143.scope: Deactivated successfully. Dec 03 22:32:59 np0005544966.novalocal sudo[96319]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:32:59 np0005544966.novalocal systemd[1]: Started Session c144 of User root. Dec 03 22:32:59 np0005544966.novalocal sudo[96319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:59 np0005544966.novalocal kernel: tap58b6a7b8-20: entered promiscuous mode Dec 03 22:32:59 np0005544966.novalocal sudo[96329]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c env PROCESS_TAG=haproxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c haproxy -f /var/lib/neutron/ovn-metadata-proxy/58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c.conf Dec 03 22:32:59 np0005544966.novalocal systemd[1]: Started Session c145 of User root. Dec 03 22:32:59 np0005544966.novalocal sudo[96329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:32:59 np0005544966.novalocal sudo[96319]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:59 np0005544966.novalocal systemd[1]: session-c144.scope: Deactivated successfully. Dec 03 22:32:59 np0005544966.novalocal sudo[96333]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:32:59 np0005544966.novalocal systemd[1]: Started Session c146 of User root. Dec 03 22:32:59 np0005544966.novalocal sudo[96333]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:32:59 np0005544966.novalocal sudo[96329]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:59 np0005544966.novalocal systemd[1]: session-c145.scope: Deactivated successfully. Dec 03 22:32:59 np0005544966.novalocal kernel: tap58b6a7b8-20: left promiscuous mode Dec 03 22:32:59 np0005544966.novalocal systemd[1]: run-netns-ovnmeta\x2d58b6a7b8\x2d2e9c\x2d4ebd\x2d8baa\x2d7334d8dc175c.mount: Deactivated successfully. Dec 03 22:32:59 np0005544966.novalocal sudo[96333]: pam_unix(sudo:session): session closed for user root Dec 03 22:32:59 np0005544966.novalocal systemd[1]: session-c146.scope: Deactivated successfully. Dec 03 22:33:01 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:33:01 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:33:01 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:33:01 np0005544966.novalocal kernel: tap45b96b8f-27: entered promiscuous mode Dec 03 22:33:01 np0005544966.novalocal NetworkManager[846]: [1764819181.8638] manager: (tap45b96b8f-27): new Tun device (/org/freedesktop/NetworkManager/Devices/21) Dec 03 22:33:01 np0005544966.novalocal virtqemud[92372]: Domain id=6 name='instance-00000004' uuid=d15eb5d4-533e-4996-8272-0e2cbad05ff7 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 03 22:33:01 np0005544966.novalocal virtqemud[92372]: Domain id=6 name='instance-00000004' uuid=d15eb5d4-533e-4996-8272-0e2cbad05ff7 is tainted: deprecated-config (CPU model 'qemu64') Dec 03 22:33:01 np0005544966.novalocal systemd-machined[89644]: New machine qemu-6-instance-00000004. Dec 03 22:33:01 np0005544966.novalocal systemd[1]: Started Virtual Machine qemu-6-instance-00000004. Dec 03 22:33:01 np0005544966.novalocal systemd-udevd[96385]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:33:01 np0005544966.novalocal NetworkManager[846]: [1764819181.9546] device (tap45b96b8f-27): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 03 22:33:01 np0005544966.novalocal NetworkManager[846]: [1764819181.9558] device (tap45b96b8f-27): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 03 22:33:01 np0005544966.novalocal sudo[96384]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:33:01 np0005544966.novalocal NetworkManager[846]: [1764819181.9862] manager: (tap58b6a7b8-20): new Veth device (/org/freedesktop/NetworkManager/Devices/22) Dec 03 22:33:01 np0005544966.novalocal systemd[1]: Started Session c147 of User root. Dec 03 22:33:02 np0005544966.novalocal sudo[96384]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:02 np0005544966.novalocal NetworkManager[846]: [1764819182.0565] device (tap58b6a7b8-20): carrier: link connected Dec 03 22:33:02 np0005544966.novalocal kernel: tap58b6a7b8-20: entered promiscuous mode Dec 03 22:33:02 np0005544966.novalocal sudo[96430]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c env PROCESS_TAG=haproxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c haproxy -f /var/lib/neutron/ovn-metadata-proxy/58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c.conf Dec 03 22:33:02 np0005544966.novalocal systemd[1]: Started Session c148 of User root. Dec 03 22:33:02 np0005544966.novalocal sudo[96430]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:33:02 np0005544966.novalocal sudo[96384]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:02 np0005544966.novalocal systemd[1]: session-c147.scope: Deactivated successfully. Dec 03 22:33:02 np0005544966.novalocal sudo[96435]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:33:02 np0005544966.novalocal systemd[1]: Started Session c149 of User root. Dec 03 22:33:02 np0005544966.novalocal sudo[96435]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:02 np0005544966.novalocal sudo[96430]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:02 np0005544966.novalocal sudo[96435]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:02 np0005544966.novalocal systemd[1]: session-c149.scope: Deactivated successfully. Dec 03 22:33:02 np0005544966.novalocal sudo[96449]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:33:02 np0005544966.novalocal systemd[1]: Started Session c150 of User root. Dec 03 22:33:02 np0005544966.novalocal sudo[96449]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:03 np0005544966.novalocal sudo[96449]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:03 np0005544966.novalocal systemd[1]: session-c150.scope: Deactivated successfully. Dec 03 22:33:03 np0005544966.novalocal sudo[96456]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:33:03 np0005544966.novalocal systemd[1]: Started Session c151 of User root. Dec 03 22:33:03 np0005544966.novalocal sudo[96456]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:03 np0005544966.novalocal sudo[96456]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:03 np0005544966.novalocal systemd[1]: session-c151.scope: Deactivated successfully. Dec 03 22:33:14 np0005544966.novalocal sshd-session[96506]: Received disconnect from 103.19.254.14 port 41736:11: Bye Bye [preauth] Dec 03 22:33:14 np0005544966.novalocal sshd-session[96506]: Disconnected from authenticating user root 103.19.254.14 port 41736 [preauth] Dec 03 22:33:18 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58668 [03/Dec/2025:22:33:18.164] listener listener/metadata 0/0/0/154/154 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 03 22:33:18 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58672 [03/Dec/2025:22:33:18.397] listener listener/metadata 0/0/0/17/17 200 148 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Dec 03 22:33:18 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58678 [03/Dec/2025:22:33:18.459] listener listener/metadata 0/0/0/16/16 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Dec 03 22:33:18 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58686 [03/Dec/2025:22:33:18.524] listener listener/metadata 0/0/0/14/14 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 03 22:33:18 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58700 [03/Dec/2025:22:33:18.585] listener listener/metadata 0/0/0/16/16 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Dec 03 22:33:18 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58714 [03/Dec/2025:22:33:18.647] listener listener/metadata 0/0/0/14/14 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Dec 03 22:33:18 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58724 [03/Dec/2025:22:33:18.700] listener listener/metadata 0/0/0/13/13 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Dec 03 22:33:18 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58730 [03/Dec/2025:22:33:18.751] listener listener/metadata 0/0/0/15/15 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Dec 03 22:33:18 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58734 [03/Dec/2025:22:33:18.804] listener listener/metadata 0/0/0/14/14 200 177 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Dec 03 22:33:18 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58748 [03/Dec/2025:22:33:18.884] listener listener/metadata 0/0/0/16/16 200 177 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Dec 03 22:33:18 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58764 [03/Dec/2025:22:33:18.951] listener listener/metadata 0/0/0/14/14 200 215 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Dec 03 22:33:19 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58768 [03/Dec/2025:22:33:19.003] listener listener/metadata 0/0/0/17/17 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Dec 03 22:33:19 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58774 [03/Dec/2025:22:33:19.056] listener listener/metadata 0/0/0/21/21 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Dec 03 22:33:19 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58788 [03/Dec/2025:22:33:19.113] listener listener/metadata 0/0/0/16/16 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Dec 03 22:33:19 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58802 [03/Dec/2025:22:33:19.184] listener listener/metadata 0/0/0/17/17 200 177 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Dec 03 22:33:19 np0005544966.novalocal haproxy-metadata-proxy-58b6a7b8-2e9c-4ebd-8baa-7334d8dc175c[96440]: 10.100.0.12:58808 [03/Dec/2025:22:33:19.275] listener listener/metadata 0/0/0/12/12 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Dec 03 22:33:24 np0005544966.novalocal kernel: tap45b96b8f-27 (unregistering): left promiscuous mode Dec 03 22:33:24 np0005544966.novalocal NetworkManager[846]: [1764819204.6277] device (tap45b96b8f-27): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 03 22:33:24 np0005544966.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000004.scope: Deactivated successfully. Dec 03 22:33:24 np0005544966.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000004.scope: Consumed 15.120s CPU time. Dec 03 22:33:24 np0005544966.novalocal systemd[1]: session-c148.scope: Deactivated successfully. Dec 03 22:33:24 np0005544966.novalocal systemd-machined[89644]: Machine qemu-6-instance-00000004 terminated. Dec 03 22:33:24 np0005544966.novalocal kernel: tap58b6a7b8-20: left promiscuous mode Dec 03 22:33:24 np0005544966.novalocal systemd[1]: run-netns-ovnmeta\x2d58b6a7b8\x2d2e9c\x2d4ebd\x2d8baa\x2d7334d8dc175c.mount: Deactivated successfully. Dec 03 22:33:24 np0005544966.novalocal NetworkManager[846]: [1764819204.7900] manager: (tap45b96b8f-27): new Tun device (/org/freedesktop/NetworkManager/Devices/23) Dec 03 22:33:32 np0005544966.novalocal sudo[96549]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d cinder-volumes/cinder-volumes-pool Dec 03 22:33:32 np0005544966.novalocal systemd[1]: Started Session c152 of User root. Dec 03 22:33:32 np0005544966.novalocal sudo[96549]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:32 np0005544966.novalocal lvm[96560]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:33:32 np0005544966.novalocal lvm[96560]: VG cinder-volumes finished Dec 03 22:33:32 np0005544966.novalocal sudo[96549]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:32 np0005544966.novalocal systemd[1]: session-c152.scope: Deactivated successfully. Dec 03 22:33:33 np0005544966.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 03 22:33:33 np0005544966.novalocal sudo[96564]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmp_83zz_2u/privsep.sock Dec 03 22:33:33 np0005544966.novalocal systemd[1]: Started Session c153 of User root. Dec 03 22:33:33 np0005544966.novalocal sudo[96564]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 03 22:33:34 np0005544966.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 03 22:33:34 np0005544966.novalocal sudo[96564]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:34 np0005544966.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service. Dec 03 22:33:34 np0005544966.novalocal sudo[96595]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d Dec 03 22:33:34 np0005544966.novalocal systemd[1]: Started Session c154 of User root. Dec 03 22:33:34 np0005544966.novalocal sudo[96595]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:35 np0005544966.novalocal sudo[96595]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:35 np0005544966.novalocal systemd[1]: session-c154.scope: Deactivated successfully. Dec 03 22:33:35 np0005544966.novalocal sudo[96601]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d YvVTi4pLWVg9bNVAEB5t oaJtAcbc526Q3Buc False -p3260 -a::1 Dec 03 22:33:35 np0005544966.novalocal systemd[1]: Started Session c155 of User root. Dec 03 22:33:35 np0005544966.novalocal sudo[96601]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:35 np0005544966.novalocal sudo[96601]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:35 np0005544966.novalocal systemd[1]: session-c155.scope: Deactivated successfully. Dec 03 22:33:35 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 295e1a46-5f43-4cea-b25e-c3f48e02a4f5 Dec 03 22:33:35 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:33:35 np0005544966.novalocal sudo[96609]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 03 22:33:35 np0005544966.novalocal systemd[1]: Started Session c156 of User root. Dec 03 22:33:35 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 9b9103a2-7393-4ba7-8fb0-e47861866237 Dec 03 22:33:35 np0005544966.novalocal sudo[96609]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:35 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:33:35 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 95a77501-3f25-40d5-a887-5873cfc746d5 Dec 03 22:33:35 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:33:35 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l df9e5342-e2f6-48a1-a9b5-9ff4a05a27cc Dec 03 22:33:35 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:33:35 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 1aa7ea0e-4a76-4d03-be48-4e7f9be631ac Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 6d25c4ae-c80f-4351-827f-f237e964c8bd Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l af0a4203-6cd0-497c-bb43-ee236dee1e15 Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l ee352dec-f658-4086-968b-52c47f8263bd Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: failed to retrieve rpm info for path '/dev/vda1': Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2587fec0-e08e-43c4-a02c-3b5f6f5ef2de Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 6843a742-1de6-43af-90db-e83e7a9c8a06 Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 26670ce4-25d7-41b6-8333-b50e0666ef3e Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 05736fc0-a88a-4b76-b700-c36c4a378c7a Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l fdfb65b8-3bd2-4b83-b73d-57b27189254d Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 7c19a461-e559-4516-8ddb-5ecb7de1f50d Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 5258d397-d978-4641-8dd2-2c0a2bbdbcb0 Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:36 np0005544966.novalocal sudo[96609]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 5ec3db28-3d68-4979-83a2-b598f87b9764 Dec 03 22:33:36 np0005544966.novalocal systemd[1]: session-c156.scope: Deactivated successfully. Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-RpigTf. For complete SELinux messages run: sealert -l e9bca630-c388-4700-abef-e58ba82d133e Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-RpigTf. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-RpigTf file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 2f148089-7e8d-4918-9585-50ec53a9224b Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 59f0df37-a76c-43a2-8ec3-c76f749a4e54 Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 80ff3390-7658-4710-82b5-3466097e412e Dec 03 22:33:36 np0005544966.novalocal sudo[96621]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l bbf1329f-5c4f-422b-8cad-b9181061fcfe Dec 03 22:33:36 np0005544966.novalocal systemd[1]: Started Session c157 of User root. Dec 03 22:33:36 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:36 np0005544966.novalocal sudo[96621]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:36 np0005544966.novalocal sudo[96621]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:36 np0005544966.novalocal systemd[1]: session-c157.scope: Deactivated successfully. Dec 03 22:33:36 np0005544966.novalocal sudo[96626]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d YvVTi4pLWVg9bNVAEB5t oaJtAcbc526Q3Buc iqn.1994-05.com.redhat:f83f525515f0 Dec 03 22:33:36 np0005544966.novalocal systemd[1]: Started Session c158 of User root. Dec 03 22:33:36 np0005544966.novalocal sudo[96626]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:37 np0005544966.novalocal sudo[96626]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:37 np0005544966.novalocal systemd[1]: session-c158.scope: Deactivated successfully. Dec 03 22:33:37 np0005544966.novalocal sudo[96631]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:33:37 np0005544966.novalocal systemd[1]: Started Session c159 of User root. Dec 03 22:33:37 np0005544966.novalocal sudo[96631]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:37 np0005544966.novalocal sudo[96631]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:37 np0005544966.novalocal systemd[1]: session-c159.scope: Deactivated successfully. Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 153ca3c4-0890-4296-bad3-25730454a1fa Dec 03 22:33:38 np0005544966.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Dec 03 22:33:38 np0005544966.novalocal iscsid[73267]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d, portal: ::1,3260] through [iface: default] is operational now Dec 03 22:33:38 np0005544966.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Dec 03 22:33:38 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Dec 03 22:33:38 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405bc0eb92d451d4f6c9397ab467 port group 0 rel port 1 Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Dec 03 22:33:38 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Dec 03 22:33:38 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Dec 03 22:33:38 np0005544966.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Dec 03 22:33:38 np0005544966.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Dec 03 22:33:38 np0005544966.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Dec 03 22:33:38 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Dec 03 22:33:38 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:33:38 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Dec 03 22:33:38 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l f74ee36d-f640-4b9a-9265-e61f37d8b578 Dec 03 22:33:38 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l f2d559f7-8462-46bc-9005-452829031dc9 Dec 03 22:33:38 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 710e17f3-48e9-4a80-b0da-0427e0496273 Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l f012745c-62fe-4408-8eea-46783af563fa Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 63a6eb1f-9253-4c26-885f-12cc639e97ac Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 956a0536-6f4d-4767-8898-231cbd57628d Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 9acb8a7c-4df4-4e60-8805-05789943f0c0 Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a75db48b-a78a-407e-a6fa-7d889bb59725 Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l b27544d9-b571-4e46-a31d-428747b6cfb2 Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l ae0ee42e-e006-400b-8731-e0f869928e37 Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 350ddc32-1b73-41a7-807f-4f742a9a66ec Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 3c0fb558-3288-4497-88fc-533978ce0380 Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d/::1,3260. For complete SELinux messages run: sealert -l 3994ec31-faf5-48d4-8a2a-4e30779996cf Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d/::1,3260. For complete SELinux messages run: sealert -l ba8faddf-3676-4482-b7a6-c4b75b0f26aa Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e23c8d58-3845-4c6d-8ec2-fe0c91fd627a Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 153ca3c4-0890-4296-bad3-25730454a1fa Dec 03 22:33:38 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:39 np0005544966.novalocal sudo[96683]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Dec 03 22:33:39 np0005544966.novalocal systemd[1]: Started Session c160 of User root. Dec 03 22:33:39 np0005544966.novalocal sudo[96683]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a27e6028-8b24-437e-a552-06d2f706674b Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l c00b0ed1-fe6e-4bb2-b675-3f9f699adf5b Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 023701cf-8496-4c2b-a8fe-1a4f220d4eca Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: failed to retrieve rpm info for path '/dev/sda': Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2587fec0-e08e-43c4-a02c-3b5f6f5ef2de Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 295e1a46-5f43-4cea-b25e-c3f48e02a4f5 Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 9b9103a2-7393-4ba7-8fb0-e47861866237 Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 95a77501-3f25-40d5-a887-5873cfc746d5 Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l df9e5342-e2f6-48a1-a9b5-9ff4a05a27cc Dec 03 22:33:39 np0005544966.novalocal sudo[96683]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:33:39 np0005544966.novalocal systemd[1]: session-c160.scope: Deactivated successfully. Dec 03 22:33:39 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 1aa7ea0e-4a76-4d03-be48-4e7f9be631ac Dec 03 22:33:39 np0005544966.novalocal sudo[96694]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Dec 03 22:33:39 np0005544966.novalocal systemd[1]: Started Session c161 of User root. Dec 03 22:33:39 np0005544966.novalocal sudo[96694]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 6d25c4ae-c80f-4351-827f-f237e964c8bd Dec 03 22:33:39 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 7bac84bc-dd71-4350-a1d3-60f6c97b5209 Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 460b88f5-5a17-4b56-a526-6b0f0cd1e19f Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 26670ce4-25d7-41b6-8333-b50e0666ef3e Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 05736fc0-a88a-4b76-b700-c36c4a378c7a Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:40 np0005544966.novalocal sudo[96694]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:40 np0005544966.novalocal systemd[1]: session-c161.scope: Deactivated successfully. Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 956a0536-6f4d-4767-8898-231cbd57628d Dec 03 22:33:40 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Dec 03 22:33:40 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: Detached Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:40 np0005544966.novalocal iscsid[73267]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d, portal: ::1,3260] through [iface: default] is shutdown. Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l f74ee36d-f640-4b9a-9265-e61f37d8b578 Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l f2d559f7-8462-46bc-9005-452829031dc9 Dec 03 22:33:40 np0005544966.novalocal sudo[96739]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d iqn.1994-05.com.redhat:f83f525515f0 Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 63a6eb1f-9253-4c26-885f-12cc639e97ac Dec 03 22:33:40 np0005544966.novalocal systemd[1]: Started Session c162 of User root. Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a75db48b-a78a-407e-a6fa-7d889bb59725 Dec 03 22:33:40 np0005544966.novalocal sudo[96739]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 5c32a90b-2ed4-48bb-ab48-97144ff72df0 Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l dc5a9edf-5374-41a9-bf1b-e6be52652f4d Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l cc85f44c-3b9b-43bb-8907-a09178e7516d Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 6843a742-1de6-43af-90db-e83e7a9c8a06 Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 023701cf-8496-4c2b-a8fe-1a4f220d4eca Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d. For complete SELinux messages run: sealert -l b27544d9-b571-4e46-a31d-428747b6cfb2 Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l c0f4f098-0b84-4582-b4f9-7d460a2b6dd9 Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l f31a70c9-e6b4-4c67-9df6-544a8358eb51 Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d. For complete SELinux messages run: sealert -l bdc28f20-d619-4ac6-9bba-f9b627a1f092 Dec 03 22:33:40 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:41 np0005544966.novalocal sudo[96739]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:41 np0005544966.novalocal systemd[1]: session-c162.scope: Deactivated successfully. Dec 03 22:33:41 np0005544966.novalocal sudo[96751]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:33:41 np0005544966.novalocal systemd[1]: Started Session c163 of User root. Dec 03 22:33:41 np0005544966.novalocal sudo[96751]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:41 np0005544966.novalocal sudo[96751]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:41 np0005544966.novalocal systemd[1]: session-c163.scope: Deactivated successfully. Dec 03 22:33:41 np0005544966.novalocal sudo[96757]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 03 22:33:41 np0005544966.novalocal systemd[1]: Started Session c164 of User root. Dec 03 22:33:41 np0005544966.novalocal sudo[96757]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:42 np0005544966.novalocal sudo[96757]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:42 np0005544966.novalocal systemd[1]: session-c164.scope: Deactivated successfully. Dec 03 22:33:42 np0005544966.novalocal sudo[96762]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d Dec 03 22:33:42 np0005544966.novalocal systemd[1]: Started Session c165 of User root. Dec 03 22:33:42 np0005544966.novalocal sudo[96762]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:42 np0005544966.novalocal sudo[96762]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:42 np0005544966.novalocal systemd[1]: session-c165.scope: Deactivated successfully. Dec 03 22:33:42 np0005544966.novalocal sudo[96767]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:33:43 np0005544966.novalocal systemd[1]: Started Session c166 of User root. Dec 03 22:33:43 np0005544966.novalocal sudo[96767]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:43 np0005544966.novalocal sudo[96767]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:43 np0005544966.novalocal systemd[1]: session-c166.scope: Deactivated successfully. Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l af0a4203-6cd0-497c-bb43-ee236dee1e15 Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l ee352dec-f658-4086-968b-52c47f8263bd Dec 03 22:33:44 np0005544966.novalocal sudo[96788]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2587fec0-e08e-43c4-a02c-3b5f6f5ef2de Dec 03 22:33:44 np0005544966.novalocal systemd[1]: Started Session c167 of User root. Dec 03 22:33:44 np0005544966.novalocal sudo[96788]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 6843a742-1de6-43af-90db-e83e7a9c8a06 Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 26670ce4-25d7-41b6-8333-b50e0666ef3e Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 05736fc0-a88a-4b76-b700-c36c4a378c7a Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l fdfb65b8-3bd2-4b83-b73d-57b27189254d Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 7c19a461-e559-4516-8ddb-5ecb7de1f50d Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 5258d397-d978-4641-8dd2-2c0a2bbdbcb0 Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 5ec3db28-3d68-4979-83a2-b598f87b9764 Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-bSlWfP. For complete SELinux messages run: sealert -l e9bca630-c388-4700-abef-e58ba82d133e Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-bSlWfP. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-bSlWfP file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 2f148089-7e8d-4918-9585-50ec53a9224b Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 59f0df37-a76c-43a2-8ec3-c76f749a4e54 Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 80ff3390-7658-4710-82b5-3466097e412e Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l bbf1329f-5c4f-422b-8cad-b9181061fcfe Dec 03 22:33:44 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:44 np0005544966.novalocal sudo[96788]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:44 np0005544966.novalocal systemd[1]: session-c167.scope: Deactivated successfully. Dec 03 22:33:44 np0005544966.novalocal sudo[96792]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d YvVTi4pLWVg9bNVAEB5t oaJtAcbc526Q3Buc False -p3260 -a::1 Dec 03 22:33:44 np0005544966.novalocal systemd[1]: Started Session c168 of User root. Dec 03 22:33:44 np0005544966.novalocal sudo[96792]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:45 np0005544966.novalocal sudo[96792]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:45 np0005544966.novalocal systemd[1]: session-c168.scope: Deactivated successfully. Dec 03 22:33:45 np0005544966.novalocal sudo[96798]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 03 22:33:45 np0005544966.novalocal systemd[1]: Started Session c169 of User root. Dec 03 22:33:45 np0005544966.novalocal sudo[96798]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:45 np0005544966.novalocal sudo[96798]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:45 np0005544966.novalocal systemd[1]: session-c169.scope: Deactivated successfully. Dec 03 22:33:45 np0005544966.novalocal sudo[96803]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:33:45 np0005544966.novalocal systemd[1]: Started Session c170 of User root. Dec 03 22:33:45 np0005544966.novalocal sudo[96803]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:46 np0005544966.novalocal sudo[96803]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:46 np0005544966.novalocal systemd[1]: session-c170.scope: Deactivated successfully. Dec 03 22:33:46 np0005544966.novalocal sudo[96809]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d YvVTi4pLWVg9bNVAEB5t oaJtAcbc526Q3Buc iqn.1994-05.com.redhat:f83f525515f0 Dec 03 22:33:46 np0005544966.novalocal systemd[1]: Started Session c171 of User root. Dec 03 22:33:46 np0005544966.novalocal sudo[96809]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:47 np0005544966.novalocal sudo[96809]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:47 np0005544966.novalocal systemd[1]: session-c171.scope: Deactivated successfully. Dec 03 22:33:47 np0005544966.novalocal sudo[96814]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:33:47 np0005544966.novalocal systemd[1]: Started Session c172 of User root. Dec 03 22:33:47 np0005544966.novalocal sudo[96814]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:47 np0005544966.novalocal sudo[96814]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:47 np0005544966.novalocal systemd[1]: session-c172.scope: Deactivated successfully. Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 153ca3c4-0890-4296-bad3-25730454a1fa Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:48 np0005544966.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l f74ee36d-f640-4b9a-9265-e61f37d8b578 Dec 03 22:33:48 np0005544966.novalocal iscsid[73267]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d, portal: ::1,3260] through [iface: default] is operational now Dec 03 22:33:48 np0005544966.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Dec 03 22:33:48 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Dec 03 22:33:48 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405b42eb41b8962460dad48c0637 port group 0 rel port 1 Dec 03 22:33:48 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Dec 03 22:33:48 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Dec 03 22:33:48 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Dec 03 22:33:48 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Dec 03 22:33:48 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:33:48 np0005544966.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Dec 03 22:33:48 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Dec 03 22:33:48 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Dec 03 22:33:48 np0005544966.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Dec 03 22:33:48 np0005544966.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Dec 03 22:33:48 np0005544966.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l f2d559f7-8462-46bc-9005-452829031dc9 Dec 03 22:33:48 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 710e17f3-48e9-4a80-b0da-0427e0496273 Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l f012745c-62fe-4408-8eea-46783af563fa Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 63a6eb1f-9253-4c26-885f-12cc639e97ac Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 956a0536-6f4d-4767-8898-231cbd57628d Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 9acb8a7c-4df4-4e60-8805-05789943f0c0 Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a75db48b-a78a-407e-a6fa-7d889bb59725 Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l b27544d9-b571-4e46-a31d-428747b6cfb2 Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l ae0ee42e-e006-400b-8731-e0f869928e37 Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 350ddc32-1b73-41a7-807f-4f742a9a66ec Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 3c0fb558-3288-4497-88fc-533978ce0380 Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d/::1,3260. For complete SELinux messages run: sealert -l 3994ec31-faf5-48d4-8a2a-4e30779996cf Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d/::1,3260. For complete SELinux messages run: sealert -l ba8faddf-3676-4482-b7a6-c4b75b0f26aa Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e23c8d58-3845-4c6d-8ec2-fe0c91fd627a Dec 03 22:33:48 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a27e6028-8b24-437e-a552-06d2f706674b Dec 03 22:33:49 np0005544966.novalocal sudo[96864]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:33:49 np0005544966.novalocal systemd[1]: Started Session c173 of User root. Dec 03 22:33:49 np0005544966.novalocal sudo[96864]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l c00b0ed1-fe6e-4bb2-b675-3f9f699adf5b Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 023701cf-8496-4c2b-a8fe-1a4f220d4eca Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2587fec0-e08e-43c4-a02c-3b5f6f5ef2de Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 295e1a46-5f43-4cea-b25e-c3f48e02a4f5 Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 9b9103a2-7393-4ba7-8fb0-e47861866237 Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 95a77501-3f25-40d5-a887-5873cfc746d5 Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l df9e5342-e2f6-48a1-a9b5-9ff4a05a27cc Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 1aa7ea0e-4a76-4d03-be48-4e7f9be631ac Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 6d25c4ae-c80f-4351-827f-f237e964c8bd Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:33:49 np0005544966.novalocal sudo[96864]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:49 np0005544966.novalocal systemd[1]: session-c173.scope: Deactivated successfully. Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 1aa7ea0e-4a76-4d03-be48-4e7f9be631ac Dec 03 22:33:49 np0005544966.novalocal sudo[96870]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 6d25c4ae-c80f-4351-827f-f237e964c8bd Dec 03 22:33:49 np0005544966.novalocal systemd[1]: Started Session c174 of User root. Dec 03 22:33:49 np0005544966.novalocal sudo[96870]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 295e1a46-5f43-4cea-b25e-c3f48e02a4f5 Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 7bac84bc-dd71-4350-a1d3-60f6c97b5209 Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 6843a742-1de6-43af-90db-e83e7a9c8a06 Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 26670ce4-25d7-41b6-8333-b50e0666ef3e Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 05736fc0-a88a-4b76-b700-c36c4a378c7a Dec 03 22:33:49 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 03 22:33:49 np0005544966.novalocal sudo[96870]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:49 np0005544966.novalocal systemd[1]: session-c174.scope: Deactivated successfully. Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 153ca3c4-0890-4296-bad3-25730454a1fa Dec 03 22:33:50 np0005544966.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Dec 03 22:33:50 np0005544966.novalocal kernel: scsi 2:0:0:0: alua: Detached Dec 03 22:33:50 np0005544966.novalocal iscsid[73267]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d, portal: ::1,3260] through [iface: default] is shutdown. Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 956a0536-6f4d-4767-8898-231cbd57628d Dec 03 22:33:50 np0005544966.novalocal sudo[96919]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d iqn.1994-05.com.redhat:f83f525515f0 Dec 03 22:33:50 np0005544966.novalocal systemd[1]: Started Session c175 of User root. Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal sudo[96919]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d/::1,3260. For complete SELinux messages run: sealert -l ba8faddf-3676-4482-b7a6-c4b75b0f26aa Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l f74ee36d-f640-4b9a-9265-e61f37d8b578 Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l f2d559f7-8462-46bc-9005-452829031dc9 Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 710e17f3-48e9-4a80-b0da-0427e0496273 Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l f012745c-62fe-4408-8eea-46783af563fa Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 63a6eb1f-9253-4c26-885f-12cc639e97ac Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e23c8d58-3845-4c6d-8ec2-fe0c91fd627a Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d/::1,3260. For complete SELinux messages run: sealert -l 1d416cd5-8dc4-4d54-aea6-a0a7e407d591 Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 9acb8a7c-4df4-4e60-8805-05789943f0c0 Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a75db48b-a78a-407e-a6fa-7d889bb59725 Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 5c32a90b-2ed4-48bb-ab48-97144ff72df0 Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l dc5a9edf-5374-41a9-bf1b-e6be52652f4d Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l cc85f44c-3b9b-43bb-8907-a09178e7516d Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 023701cf-8496-4c2b-a8fe-1a4f220d4eca Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 25b2cfbf-1032-447e-8725-3dffdb3a4672 Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d. For complete SELinux messages run: sealert -l b27544d9-b571-4e46-a31d-428747b6cfb2 Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l c0f4f098-0b84-4582-b4f9-7d460a2b6dd9 Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l f31a70c9-e6b4-4c67-9df6-544a8358eb51 Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d. For complete SELinux messages run: sealert -l bdc28f20-d619-4ac6-9bba-f9b627a1f092 Dec 03 22:33:50 np0005544966.novalocal setroubleshoot[96566]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 03 22:33:50 np0005544966.novalocal sudo[96919]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:50 np0005544966.novalocal systemd[1]: session-c175.scope: Deactivated successfully. Dec 03 22:33:50 np0005544966.novalocal sudo[96935]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:33:50 np0005544966.novalocal systemd[1]: Started Session c176 of User root. Dec 03 22:33:50 np0005544966.novalocal sudo[96935]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:51 np0005544966.novalocal sudo[96935]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:51 np0005544966.novalocal systemd[1]: session-c176.scope: Deactivated successfully. Dec 03 22:33:51 np0005544966.novalocal sudo[96940]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 03 22:33:51 np0005544966.novalocal systemd[1]: Started Session c177 of User root. Dec 03 22:33:51 np0005544966.novalocal sudo[96940]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:51 np0005544966.novalocal sudo[96940]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:51 np0005544966.novalocal systemd[1]: session-c177.scope: Deactivated successfully. Dec 03 22:33:51 np0005544966.novalocal sudo[96947]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d Dec 03 22:33:52 np0005544966.novalocal systemd[1]: Started Session c178 of User root. Dec 03 22:33:52 np0005544966.novalocal sudo[96947]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:52 np0005544966.novalocal sudo[96947]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:52 np0005544966.novalocal systemd[1]: session-c178.scope: Deactivated successfully. Dec 03 22:33:52 np0005544966.novalocal sudo[96952]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 03 22:33:52 np0005544966.novalocal systemd[1]: Started Session c179 of User root. Dec 03 22:33:52 np0005544966.novalocal sudo[96952]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:52 np0005544966.novalocal kernel: tap2f39203c-0e: entered promiscuous mode Dec 03 22:33:52 np0005544966.novalocal NetworkManager[846]: [1764819232.7929] manager: (tap2f39203c-0e): new Tun device (/org/freedesktop/NetworkManager/Devices/24) Dec 03 22:33:52 np0005544966.novalocal virtqemud[92372]: Domain id=7 name='instance-00000006' uuid=a651c581-1616-4b2b-a95c-82f81ef70eb0 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 03 22:33:52 np0005544966.novalocal virtqemud[92372]: Domain id=7 name='instance-00000006' uuid=a651c581-1616-4b2b-a95c-82f81ef70eb0 is tainted: deprecated-config (CPU model 'qemu64') Dec 03 22:33:52 np0005544966.novalocal systemd-machined[89644]: New machine qemu-7-instance-00000006. Dec 03 22:33:52 np0005544966.novalocal systemd-udevd[96971]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:33:52 np0005544966.novalocal systemd[1]: Started Virtual Machine qemu-7-instance-00000006. Dec 03 22:33:52 np0005544966.novalocal NetworkManager[846]: [1764819232.8787] device (tap2f39203c-0e): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 03 22:33:52 np0005544966.novalocal NetworkManager[846]: [1764819232.8818] device (tap2f39203c-0e): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 03 22:33:52 np0005544966.novalocal NetworkManager[846]: [1764819232.9581] manager: (tap75b64728-d0): new Veth device (/org/freedesktop/NetworkManager/Devices/25) Dec 03 22:33:53 np0005544966.novalocal NetworkManager[846]: [1764819233.0446] device (tap75b64728-d0): carrier: link connected Dec 03 22:33:53 np0005544966.novalocal sudo[96952]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:53 np0005544966.novalocal systemd[1]: session-c179.scope: Deactivated successfully. Dec 03 22:33:53 np0005544966.novalocal kernel: tap75b64728-d0: entered promiscuous mode Dec 03 22:33:53 np0005544966.novalocal sudo[97020]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-75b64728-d3ec-4a6c-b6ad-ecc305fc6add env PROCESS_TAG=haproxy-75b64728-d3ec-4a6c-b6ad-ecc305fc6add haproxy -f /var/lib/neutron/ovn-metadata-proxy/75b64728-d3ec-4a6c-b6ad-ecc305fc6add.conf Dec 03 22:33:53 np0005544966.novalocal systemd[1]: Started Session c180 of User root. Dec 03 22:33:53 np0005544966.novalocal sudo[97020]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:33:53 np0005544966.novalocal sudo[97020]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:55 np0005544966.novalocal sudo[97033]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 03 22:33:55 np0005544966.novalocal systemd[1]: Started Session c181 of User root. Dec 03 22:33:55 np0005544966.novalocal sudo[97033]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:56 np0005544966.novalocal sudo[97033]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:56 np0005544966.novalocal systemd[1]: session-c181.scope: Deactivated successfully. Dec 03 22:33:56 np0005544966.novalocal sudo[97038]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d Dec 03 22:33:56 np0005544966.novalocal systemd[1]: Started Session c182 of User root. Dec 03 22:33:56 np0005544966.novalocal sudo[97038]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:56 np0005544966.novalocal sudo[97038]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:56 np0005544966.novalocal systemd[1]: session-c182.scope: Deactivated successfully. Dec 03 22:33:56 np0005544966.novalocal sudo[97042]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d Dec 03 22:33:56 np0005544966.novalocal systemd[1]: Started Session c183 of User root. Dec 03 22:33:56 np0005544966.novalocal sudo[97042]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:57 np0005544966.novalocal sudo[97042]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:57 np0005544966.novalocal systemd[1]: session-c183.scope: Deactivated successfully. Dec 03 22:33:57 np0005544966.novalocal sudo[97046]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-d8f3f897-7c21-4c9d-8e24-d5769fe9677d Dec 03 22:33:57 np0005544966.novalocal systemd[1]: Started Session c184 of User root. Dec 03 22:33:57 np0005544966.novalocal sudo[97046]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:57 np0005544966.novalocal lvm[97053]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:33:57 np0005544966.novalocal lvm[97053]: VG cinder-volumes finished Dec 03 22:33:57 np0005544966.novalocal sudo[97046]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:57 np0005544966.novalocal systemd[1]: session-c184.scope: Deactivated successfully. Dec 03 22:33:57 np0005544966.novalocal sudo[97054]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:33:57 np0005544966.novalocal systemd[1]: Started Session c185 of User root. Dec 03 22:33:57 np0005544966.novalocal sudo[97054]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:58 np0005544966.novalocal sudo[97054]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:58 np0005544966.novalocal systemd[1]: session-c185.scope: Deactivated successfully. Dec 03 22:33:58 np0005544966.novalocal sudo[97058]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:33:58 np0005544966.novalocal systemd[1]: Started Session c186 of User root. Dec 03 22:33:58 np0005544966.novalocal sudo[97058]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:58 np0005544966.novalocal sudo[97058]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:58 np0005544966.novalocal systemd[1]: session-c186.scope: Deactivated successfully. Dec 03 22:33:58 np0005544966.novalocal sudo[97062]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:33:58 np0005544966.novalocal systemd[1]: Started Session c187 of User root. Dec 03 22:33:58 np0005544966.novalocal sudo[97062]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:59 np0005544966.novalocal sudo[97062]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:59 np0005544966.novalocal systemd[1]: session-c187.scope: Deactivated successfully. Dec 03 22:33:59 np0005544966.novalocal sudo[97066]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:33:59 np0005544966.novalocal systemd[1]: Started Session c188 of User root. Dec 03 22:33:59 np0005544966.novalocal sudo[97066]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:33:59 np0005544966.novalocal sudo[97066]: pam_unix(sudo:session): session closed for user root Dec 03 22:33:59 np0005544966.novalocal systemd[1]: session-c188.scope: Deactivated successfully. Dec 03 22:34:00 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Deactivated successfully. Dec 03 22:34:00 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Consumed 1.251s CPU time. Dec 03 22:34:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:34:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:34:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:34:00 np0005544966.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 03 22:34:00 np0005544966.novalocal systemd[1]: setroubleshootd.service: Consumed 5.808s CPU time. Dec 03 22:34:01 np0005544966.novalocal sudo[97098]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:34:02 np0005544966.novalocal systemd[1]: Started Session c189 of User root. Dec 03 22:34:02 np0005544966.novalocal sudo[97098]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:34:02 np0005544966.novalocal sudo[97098]: pam_unix(sudo:session): session closed for user root Dec 03 22:34:02 np0005544966.novalocal systemd[1]: session-c189.scope: Deactivated successfully. Dec 03 22:34:02 np0005544966.novalocal sudo[97102]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:34:02 np0005544966.novalocal systemd[1]: Started Session c190 of User root. Dec 03 22:34:02 np0005544966.novalocal sudo[97102]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:34:02 np0005544966.novalocal sudo[97102]: pam_unix(sudo:session): session closed for user root Dec 03 22:34:02 np0005544966.novalocal systemd[1]: session-c190.scope: Deactivated successfully. Dec 03 22:34:02 np0005544966.novalocal sudo[97106]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:34:02 np0005544966.novalocal systemd[1]: Started Session c191 of User root. Dec 03 22:34:02 np0005544966.novalocal sudo[97106]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:34:03 np0005544966.novalocal sudo[97106]: pam_unix(sudo:session): session closed for user root Dec 03 22:34:03 np0005544966.novalocal systemd[1]: session-c191.scope: Deactivated successfully. Dec 03 22:34:03 np0005544966.novalocal sudo[97112]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:34:03 np0005544966.novalocal systemd[1]: Started Session c192 of User root. Dec 03 22:34:03 np0005544966.novalocal sudo[97112]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:34:03 np0005544966.novalocal sudo[97112]: pam_unix(sudo:session): session closed for user root Dec 03 22:34:03 np0005544966.novalocal systemd[1]: session-c192.scope: Deactivated successfully. Dec 03 22:34:04 np0005544966.novalocal kernel: tap2f39203c-0e (unregistering): left promiscuous mode Dec 03 22:34:04 np0005544966.novalocal NetworkManager[846]: [1764819244.8633] device (tap2f39203c-0e): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 03 22:34:04 np0005544966.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Deactivated successfully. Dec 03 22:34:04 np0005544966.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Consumed 11.065s CPU time. Dec 03 22:34:04 np0005544966.novalocal systemd[1]: session-c180.scope: Deactivated successfully. Dec 03 22:34:04 np0005544966.novalocal systemd-machined[89644]: Machine qemu-7-instance-00000006 terminated. Dec 03 22:34:04 np0005544966.novalocal kernel: tap75b64728-d0: left promiscuous mode Dec 03 22:34:05 np0005544966.novalocal systemd[1]: run-netns-ovnmeta\x2d75b64728\x2dd3ec\x2d4a6c\x2db6ad\x2decc305fc6add.mount: Deactivated successfully. Dec 03 22:34:38 np0005544966.novalocal sshd-session[97193]: Invalid user 123 from 103.19.254.14 port 44510 Dec 03 22:34:39 np0005544966.novalocal sshd-session[97193]: Received disconnect from 103.19.254.14 port 44510:11: Bye Bye [preauth] Dec 03 22:34:39 np0005544966.novalocal sshd-session[97193]: Disconnected from invalid user 123 103.19.254.14 port 44510 [preauth] Dec 03 22:35:01 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:35:01 np0005544966.novalocal sudo[97204]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:35:02 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:35:02 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:35:02 np0005544966.novalocal systemd[1]: Started Session c193 of User root. Dec 03 22:35:02 np0005544966.novalocal sudo[97204]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:02 np0005544966.novalocal sudo[97204]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:02 np0005544966.novalocal systemd[1]: session-c193.scope: Deactivated successfully. Dec 03 22:35:02 np0005544966.novalocal sudo[97209]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:35:02 np0005544966.novalocal systemd[1]: Started Session c194 of User root. Dec 03 22:35:02 np0005544966.novalocal sudo[97209]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:02 np0005544966.novalocal sudo[97209]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:02 np0005544966.novalocal systemd[1]: session-c194.scope: Deactivated successfully. Dec 03 22:35:02 np0005544966.novalocal sudo[97213]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:35:02 np0005544966.novalocal systemd[1]: Started Session c195 of User root. Dec 03 22:35:02 np0005544966.novalocal sudo[97213]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:03 np0005544966.novalocal sudo[97213]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:03 np0005544966.novalocal systemd[1]: session-c195.scope: Deactivated successfully. Dec 03 22:35:03 np0005544966.novalocal sudo[97217]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:35:03 np0005544966.novalocal systemd[1]: Started Session c196 of User root. Dec 03 22:35:03 np0005544966.novalocal sudo[97217]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:03 np0005544966.novalocal sudo[97217]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:03 np0005544966.novalocal systemd[1]: session-c196.scope: Deactivated successfully. Dec 03 22:35:06 np0005544966.novalocal sudo[97260]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-3b9fd4af-1542-4fd8-b997-a5d26b27ec89 cinder-volumes/cinder-volumes-pool Dec 03 22:35:06 np0005544966.novalocal systemd[1]: Started Session c197 of User root. Dec 03 22:35:06 np0005544966.novalocal sudo[97260]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:07 np0005544966.novalocal lvm[97271]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:35:07 np0005544966.novalocal lvm[97271]: VG cinder-volumes finished Dec 03 22:35:07 np0005544966.novalocal sudo[97260]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:07 np0005544966.novalocal systemd[1]: session-c197.scope: Deactivated successfully. Dec 03 22:35:18 np0005544966.novalocal kernel: tapdf7ce029-fc: entered promiscuous mode Dec 03 22:35:18 np0005544966.novalocal NetworkManager[846]: [1764819318.6741] manager: (tapdf7ce029-fc): new Tun device (/org/freedesktop/NetworkManager/Devices/26) Dec 03 22:35:18 np0005544966.novalocal virtqemud[92372]: Domain id=8 name='instance-00000007' uuid=aeda04da-5dca-46cb-9be5-f66ddd7a47e7 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 03 22:35:18 np0005544966.novalocal virtqemud[92372]: Domain id=8 name='instance-00000007' uuid=aeda04da-5dca-46cb-9be5-f66ddd7a47e7 is tainted: deprecated-config (CPU model 'qemu64') Dec 03 22:35:18 np0005544966.novalocal systemd-udevd[97311]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:35:18 np0005544966.novalocal NetworkManager[846]: [1764819318.7537] device (tapdf7ce029-fc): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 03 22:35:18 np0005544966.novalocal NetworkManager[846]: [1764819318.7548] device (tapdf7ce029-fc): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 03 22:35:18 np0005544966.novalocal systemd-machined[89644]: New machine qemu-8-instance-00000007. Dec 03 22:35:18 np0005544966.novalocal systemd[1]: Started Virtual Machine qemu-8-instance-00000007. Dec 03 22:35:18 np0005544966.novalocal NetworkManager[846]: [1764819318.8524] manager: (tap0dddc0bb-30): new Veth device (/org/freedesktop/NetworkManager/Devices/27) Dec 03 22:35:18 np0005544966.novalocal NetworkManager[846]: [1764819318.9115] device (tap0dddc0bb-30): carrier: link connected Dec 03 22:35:19 np0005544966.novalocal kernel: tap0dddc0bb-30: entered promiscuous mode Dec 03 22:35:19 np0005544966.novalocal sudo[97360]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-0dddc0bb-3c5d-4156-af54-75559b1b2fc8 env PROCESS_TAG=haproxy-0dddc0bb-3c5d-4156-af54-75559b1b2fc8 haproxy -f /var/lib/neutron/ovn-metadata-proxy/0dddc0bb-3c5d-4156-af54-75559b1b2fc8.conf Dec 03 22:35:19 np0005544966.novalocal systemd[1]: Started Session c198 of User root. Dec 03 22:35:19 np0005544966.novalocal sudo[97360]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:35:19 np0005544966.novalocal sudo[97360]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:31 np0005544966.novalocal kernel: tapdf7ce029-fc (unregistering): left promiscuous mode Dec 03 22:35:31 np0005544966.novalocal NetworkManager[846]: [1764819331.7052] device (tapdf7ce029-fc): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 03 22:35:31 np0005544966.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Deactivated successfully. Dec 03 22:35:31 np0005544966.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Consumed 11.295s CPU time. Dec 03 22:35:31 np0005544966.novalocal systemd-machined[89644]: Machine qemu-8-instance-00000007 terminated. Dec 03 22:35:31 np0005544966.novalocal kernel: tap0dddc0bb-30: left promiscuous mode Dec 03 22:35:31 np0005544966.novalocal systemd[1]: run-netns-ovnmeta\x2d0dddc0bb\x2d3c5d\x2d4156\x2daf54\x2d75559b1b2fc8.mount: Deactivated successfully. Dec 03 22:35:31 np0005544966.novalocal systemd[1]: session-c198.scope: Deactivated successfully. Dec 03 22:35:41 np0005544966.novalocal sudo[97426]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-3b9fd4af-1542-4fd8-b997-a5d26b27ec89 Dec 03 22:35:41 np0005544966.novalocal systemd[1]: Started Session c199 of User root. Dec 03 22:35:41 np0005544966.novalocal sudo[97426]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:41 np0005544966.novalocal sudo[97426]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:41 np0005544966.novalocal systemd[1]: session-c199.scope: Deactivated successfully. Dec 03 22:35:42 np0005544966.novalocal sudo[97430]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-3b9fd4af-1542-4fd8-b997-a5d26b27ec89 Dec 03 22:35:42 np0005544966.novalocal systemd[1]: Started Session c200 of User root. Dec 03 22:35:42 np0005544966.novalocal sudo[97430]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:42 np0005544966.novalocal sudo[97430]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:42 np0005544966.novalocal systemd[1]: session-c200.scope: Deactivated successfully. Dec 03 22:35:42 np0005544966.novalocal sudo[97435]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-3b9fd4af-1542-4fd8-b997-a5d26b27ec89 Dec 03 22:35:42 np0005544966.novalocal systemd[1]: Started Session c201 of User root. Dec 03 22:35:42 np0005544966.novalocal sudo[97435]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:42 np0005544966.novalocal lvm[97443]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:35:42 np0005544966.novalocal lvm[97443]: VG cinder-volumes finished Dec 03 22:35:42 np0005544966.novalocal sudo[97435]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:42 np0005544966.novalocal systemd[1]: session-c201.scope: Deactivated successfully. Dec 03 22:35:43 np0005544966.novalocal sudo[97444]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:35:43 np0005544966.novalocal systemd[1]: Started Session c202 of User root. Dec 03 22:35:43 np0005544966.novalocal sudo[97444]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:43 np0005544966.novalocal sudo[97444]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:43 np0005544966.novalocal systemd[1]: session-c202.scope: Deactivated successfully. Dec 03 22:35:43 np0005544966.novalocal sudo[97450]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:35:43 np0005544966.novalocal systemd[1]: Started Session c203 of User root. Dec 03 22:35:43 np0005544966.novalocal sudo[97450]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:43 np0005544966.novalocal sudo[97450]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:44 np0005544966.novalocal systemd[1]: session-c203.scope: Deactivated successfully. Dec 03 22:35:44 np0005544966.novalocal sudo[97454]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:35:44 np0005544966.novalocal systemd[1]: Started Session c204 of User root. Dec 03 22:35:44 np0005544966.novalocal sudo[97454]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:44 np0005544966.novalocal sudo[97454]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:44 np0005544966.novalocal systemd[1]: session-c204.scope: Deactivated successfully. Dec 03 22:35:44 np0005544966.novalocal sudo[97460]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:35:44 np0005544966.novalocal systemd[1]: Started Session c205 of User root. Dec 03 22:35:44 np0005544966.novalocal sudo[97460]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:44 np0005544966.novalocal sudo[97460]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:44 np0005544966.novalocal systemd[1]: session-c205.scope: Deactivated successfully. Dec 03 22:35:48 np0005544966.novalocal sudo[97467]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-2862a404-09a8-4f65-8b12-784551a6b702 cinder-volumes/cinder-volumes-pool Dec 03 22:35:48 np0005544966.novalocal systemd[1]: Started Session c206 of User root. Dec 03 22:35:48 np0005544966.novalocal sudo[97467]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:48 np0005544966.novalocal lvm[97478]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:35:48 np0005544966.novalocal lvm[97478]: VG cinder-volumes finished Dec 03 22:35:48 np0005544966.novalocal sudo[97467]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:48 np0005544966.novalocal systemd[1]: session-c206.scope: Deactivated successfully. Dec 03 22:35:49 np0005544966.novalocal sudo[97479]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-75c9cf2b-6078-4fcd-9712-b24f9d9e9548 cinder-volumes/cinder-volumes-pool Dec 03 22:35:49 np0005544966.novalocal systemd[1]: Started Session c207 of User root. Dec 03 22:35:49 np0005544966.novalocal sudo[97479]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:50 np0005544966.novalocal lvm[97489]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:35:50 np0005544966.novalocal lvm[97489]: VG cinder-volumes finished Dec 03 22:35:50 np0005544966.novalocal sudo[97479]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:50 np0005544966.novalocal systemd[1]: session-c207.scope: Deactivated successfully. Dec 03 22:35:51 np0005544966.novalocal sudo[97490]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-75c9cf2b-6078-4fcd-9712-b24f9d9e9548 Dec 03 22:35:51 np0005544966.novalocal systemd[1]: Started Session c208 of User root. Dec 03 22:35:51 np0005544966.novalocal sudo[97490]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:51 np0005544966.novalocal sudo[97490]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:51 np0005544966.novalocal systemd[1]: session-c208.scope: Deactivated successfully. Dec 03 22:35:51 np0005544966.novalocal sudo[97494]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-75c9cf2b-6078-4fcd-9712-b24f9d9e9548 Dec 03 22:35:51 np0005544966.novalocal systemd[1]: Started Session c209 of User root. Dec 03 22:35:51 np0005544966.novalocal sudo[97494]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:51 np0005544966.novalocal sudo[97494]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:51 np0005544966.novalocal systemd[1]: session-c209.scope: Deactivated successfully. Dec 03 22:35:51 np0005544966.novalocal sudo[97498]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-75c9cf2b-6078-4fcd-9712-b24f9d9e9548 Dec 03 22:35:51 np0005544966.novalocal systemd[1]: Started Session c210 of User root. Dec 03 22:35:51 np0005544966.novalocal sudo[97498]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:52 np0005544966.novalocal lvm[97505]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:35:52 np0005544966.novalocal lvm[97505]: VG cinder-volumes finished Dec 03 22:35:52 np0005544966.novalocal sudo[97498]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:52 np0005544966.novalocal systemd[1]: session-c210.scope: Deactivated successfully. Dec 03 22:35:52 np0005544966.novalocal sudo[97506]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:35:52 np0005544966.novalocal systemd[1]: Started Session c211 of User root. Dec 03 22:35:52 np0005544966.novalocal sudo[97506]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:52 np0005544966.novalocal sudo[97506]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:52 np0005544966.novalocal systemd[1]: session-c211.scope: Deactivated successfully. Dec 03 22:35:52 np0005544966.novalocal sudo[97510]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:35:52 np0005544966.novalocal systemd[1]: Started Session c212 of User root. Dec 03 22:35:52 np0005544966.novalocal sudo[97510]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:53 np0005544966.novalocal sudo[97514]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-2862a404-09a8-4f65-8b12-784551a6b702 Dec 03 22:35:53 np0005544966.novalocal sudo[97510]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:53 np0005544966.novalocal systemd[1]: Started Session c213 of User root. Dec 03 22:35:53 np0005544966.novalocal systemd[1]: session-c212.scope: Deactivated successfully. Dec 03 22:35:53 np0005544966.novalocal sudo[97514]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:53 np0005544966.novalocal sudo[97516]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:35:53 np0005544966.novalocal systemd[1]: Started Session c214 of User root. Dec 03 22:35:53 np0005544966.novalocal sudo[97516]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:53 np0005544966.novalocal sudo[97514]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:53 np0005544966.novalocal systemd[1]: session-c213.scope: Deactivated successfully. Dec 03 22:35:53 np0005544966.novalocal sudo[97516]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:53 np0005544966.novalocal systemd[1]: session-c214.scope: Deactivated successfully. Dec 03 22:35:53 np0005544966.novalocal sudo[97524]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-2862a404-09a8-4f65-8b12-784551a6b702 Dec 03 22:35:53 np0005544966.novalocal systemd[1]: Started Session c215 of User root. Dec 03 22:35:53 np0005544966.novalocal sudo[97527]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:35:53 np0005544966.novalocal sudo[97524]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:53 np0005544966.novalocal systemd[1]: Started Session c216 of User root. Dec 03 22:35:53 np0005544966.novalocal sudo[97527]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:54 np0005544966.novalocal sudo[97524]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:54 np0005544966.novalocal systemd[1]: session-c215.scope: Deactivated successfully. Dec 03 22:35:54 np0005544966.novalocal sudo[97527]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:54 np0005544966.novalocal systemd[1]: session-c216.scope: Deactivated successfully. Dec 03 22:35:54 np0005544966.novalocal sudo[97533]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-2862a404-09a8-4f65-8b12-784551a6b702 Dec 03 22:35:54 np0005544966.novalocal systemd[1]: Started Session c217 of User root. Dec 03 22:35:54 np0005544966.novalocal sudo[97533]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:54 np0005544966.novalocal lvm[97538]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:35:54 np0005544966.novalocal lvm[97538]: VG cinder-volumes finished Dec 03 22:35:54 np0005544966.novalocal sudo[97533]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:54 np0005544966.novalocal systemd[1]: session-c217.scope: Deactivated successfully. Dec 03 22:35:54 np0005544966.novalocal sudo[97539]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:35:54 np0005544966.novalocal systemd[1]: Started Session c218 of User root. Dec 03 22:35:54 np0005544966.novalocal sudo[97539]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:55 np0005544966.novalocal sudo[97539]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:55 np0005544966.novalocal systemd[1]: session-c218.scope: Deactivated successfully. Dec 03 22:35:55 np0005544966.novalocal sudo[97543]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:35:55 np0005544966.novalocal systemd[1]: Started Session c219 of User root. Dec 03 22:35:55 np0005544966.novalocal sudo[97543]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:55 np0005544966.novalocal sudo[97543]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:55 np0005544966.novalocal systemd[1]: session-c219.scope: Deactivated successfully. Dec 03 22:35:55 np0005544966.novalocal sudo[97547]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:35:55 np0005544966.novalocal systemd[1]: Started Session c220 of User root. Dec 03 22:35:55 np0005544966.novalocal sudo[97547]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:55 np0005544966.novalocal sudo[97547]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:55 np0005544966.novalocal systemd[1]: session-c220.scope: Deactivated successfully. Dec 03 22:35:55 np0005544966.novalocal sudo[97551]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:35:55 np0005544966.novalocal systemd[1]: Started Session c221 of User root. Dec 03 22:35:55 np0005544966.novalocal sudo[97551]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:56 np0005544966.novalocal sudo[97551]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:56 np0005544966.novalocal systemd[1]: session-c221.scope: Deactivated successfully. Dec 03 22:35:56 np0005544966.novalocal sudo[97555]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-80775758-f3c0-4652-9e37-3c4d4e035cda Dec 03 22:35:56 np0005544966.novalocal systemd[1]: Started Session c222 of User root. Dec 03 22:35:56 np0005544966.novalocal sudo[97555]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:56 np0005544966.novalocal sudo[97555]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:56 np0005544966.novalocal systemd[1]: session-c222.scope: Deactivated successfully. Dec 03 22:35:56 np0005544966.novalocal sudo[97559]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate --name volume-02f28a82-52ab-4b32-9940-5d5efb6a5c3a --snapshot cinder-volumes/volume-80775758-f3c0-4652-9e37-3c4d4e035cda Dec 03 22:35:56 np0005544966.novalocal systemd[1]: Started Session c223 of User root. Dec 03 22:35:57 np0005544966.novalocal sudo[97559]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:57 np0005544966.novalocal dmeventd[88196]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Dec 03 22:35:57 np0005544966.novalocal dmeventd[88196]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Dec 03 22:35:57 np0005544966.novalocal lvm[97569]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:35:57 np0005544966.novalocal lvm[97569]: VG cinder-volumes finished Dec 03 22:35:57 np0005544966.novalocal sudo[97559]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:57 np0005544966.novalocal systemd[1]: session-c223.scope: Deactivated successfully. Dec 03 22:35:57 np0005544966.novalocal sudo[97570]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -k n cinder-volumes/volume-02f28a82-52ab-4b32-9940-5d5efb6a5c3a Dec 03 22:35:57 np0005544966.novalocal systemd[1]: Started Session c224 of User root. Dec 03 22:35:57 np0005544966.novalocal sudo[97570]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:57 np0005544966.novalocal lvm[97575]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:35:57 np0005544966.novalocal lvm[97575]: VG cinder-volumes finished Dec 03 22:35:57 np0005544966.novalocal sudo[97570]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:57 np0005544966.novalocal systemd[1]: session-c224.scope: Deactivated successfully. Dec 03 22:35:59 np0005544966.novalocal sudo[97582]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-8ac16b57-90aa-49b8-b084-301d9aac7e14 cinder-volumes/cinder-volumes-pool Dec 03 22:35:59 np0005544966.novalocal systemd[1]: Started Session c225 of User root. Dec 03 22:35:59 np0005544966.novalocal sudo[97582]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:35:59 np0005544966.novalocal lvm[97591]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:35:59 np0005544966.novalocal lvm[97591]: VG cinder-volumes finished Dec 03 22:35:59 np0005544966.novalocal sudo[97582]: pam_unix(sudo:session): session closed for user root Dec 03 22:35:59 np0005544966.novalocal systemd[1]: session-c225.scope: Deactivated successfully. Dec 03 22:36:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:36:00 np0005544966.novalocal sudo[97592]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-8ac16b57-90aa-49b8-b084-301d9aac7e14 Dec 03 22:36:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:36:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:36:00 np0005544966.novalocal systemd[1]: Started Session c226 of User root. Dec 03 22:36:00 np0005544966.novalocal sudo[97592]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:00 np0005544966.novalocal sudo[97592]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:00 np0005544966.novalocal systemd[1]: session-c226.scope: Deactivated successfully. Dec 03 22:36:00 np0005544966.novalocal sudo[97598]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-8ac16b57-90aa-49b8-b084-301d9aac7e14 Dec 03 22:36:00 np0005544966.novalocal systemd[1]: Started Session c227 of User root. Dec 03 22:36:00 np0005544966.novalocal sudo[97598]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:01 np0005544966.novalocal sudo[97598]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:01 np0005544966.novalocal systemd[1]: session-c227.scope: Deactivated successfully. Dec 03 22:36:01 np0005544966.novalocal sudo[97602]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-8ac16b57-90aa-49b8-b084-301d9aac7e14 Dec 03 22:36:01 np0005544966.novalocal systemd[1]: Started Session c228 of User root. Dec 03 22:36:01 np0005544966.novalocal sudo[97602]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:01 np0005544966.novalocal lvm[97609]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:36:01 np0005544966.novalocal lvm[97609]: VG cinder-volumes finished Dec 03 22:36:01 np0005544966.novalocal sudo[97602]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:01 np0005544966.novalocal systemd[1]: session-c228.scope: Deactivated successfully. Dec 03 22:36:01 np0005544966.novalocal sudo[97611]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:36:01 np0005544966.novalocal systemd[1]: Started Session c229 of User root. Dec 03 22:36:01 np0005544966.novalocal sudo[97611]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:01 np0005544966.novalocal sudo[97615]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:36:02 np0005544966.novalocal systemd[1]: Started Session c230 of User root. Dec 03 22:36:02 np0005544966.novalocal sudo[97615]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:02 np0005544966.novalocal sudo[97611]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:02 np0005544966.novalocal systemd[1]: session-c229.scope: Deactivated successfully. Dec 03 22:36:02 np0005544966.novalocal sudo[97619]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:36:02 np0005544966.novalocal systemd[1]: Started Session c231 of User root. Dec 03 22:36:02 np0005544966.novalocal sudo[97619]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:02 np0005544966.novalocal sudo[97615]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:02 np0005544966.novalocal systemd[1]: session-c230.scope: Deactivated successfully. Dec 03 22:36:02 np0005544966.novalocal sudo[97624]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:36:02 np0005544966.novalocal systemd[1]: Started Session c232 of User root. Dec 03 22:36:02 np0005544966.novalocal sudo[97624]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:02 np0005544966.novalocal sudo[97619]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:02 np0005544966.novalocal systemd[1]: session-c231.scope: Deactivated successfully. Dec 03 22:36:02 np0005544966.novalocal sudo[97627]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:36:02 np0005544966.novalocal systemd[1]: Started Session c233 of User root. Dec 03 22:36:02 np0005544966.novalocal sudo[97627]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:02 np0005544966.novalocal sudo[97629]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-02f28a82-52ab-4b32-9940-5d5efb6a5c3a Dec 03 22:36:02 np0005544966.novalocal systemd[1]: Started Session c234 of User root. Dec 03 22:36:02 np0005544966.novalocal sudo[97629]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:02 np0005544966.novalocal sudo[97624]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:02 np0005544966.novalocal systemd[1]: session-c232.scope: Deactivated successfully. Dec 03 22:36:02 np0005544966.novalocal sudo[97627]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:02 np0005544966.novalocal systemd[1]: session-c233.scope: Deactivated successfully. Dec 03 22:36:02 np0005544966.novalocal sudo[97629]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:02 np0005544966.novalocal systemd[1]: session-c234.scope: Deactivated successfully. Dec 03 22:36:02 np0005544966.novalocal sudo[97636]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:36:02 np0005544966.novalocal systemd[1]: Started Session c235 of User root. Dec 03 22:36:02 np0005544966.novalocal sudo[97637]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:36:03 np0005544966.novalocal sudo[97636]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:03 np0005544966.novalocal systemd[1]: Started Session c236 of User root. Dec 03 22:36:03 np0005544966.novalocal sudo[97639]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-02f28a82-52ab-4b32-9940-5d5efb6a5c3a Dec 03 22:36:03 np0005544966.novalocal sudo[97637]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:03 np0005544966.novalocal systemd[1]: Started Session c237 of User root. Dec 03 22:36:03 np0005544966.novalocal sudo[97639]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:03 np0005544966.novalocal sshd-session[97610]: Invalid user ghost from 103.19.254.14 port 45854 Dec 03 22:36:03 np0005544966.novalocal sudo[97637]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:03 np0005544966.novalocal systemd[1]: session-c236.scope: Deactivated successfully. Dec 03 22:36:03 np0005544966.novalocal sudo[97636]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:03 np0005544966.novalocal systemd[1]: session-c235.scope: Deactivated successfully. Dec 03 22:36:03 np0005544966.novalocal sudo[97650]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:36:03 np0005544966.novalocal systemd[1]: Started Session c238 of User root. Dec 03 22:36:03 np0005544966.novalocal sudo[97650]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:03 np0005544966.novalocal sudo[97639]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:03 np0005544966.novalocal systemd[1]: session-c237.scope: Deactivated successfully. Dec 03 22:36:03 np0005544966.novalocal sudo[97653]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-02f28a82-52ab-4b32-9940-5d5efb6a5c3a Dec 03 22:36:03 np0005544966.novalocal systemd[1]: Started Session c239 of User root. Dec 03 22:36:03 np0005544966.novalocal sudo[97653]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:03 np0005544966.novalocal sudo[97650]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:03 np0005544966.novalocal systemd[1]: session-c238.scope: Deactivated successfully. Dec 03 22:36:03 np0005544966.novalocal lvm[97660]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:36:03 np0005544966.novalocal lvm[97660]: VG cinder-volumes finished Dec 03 22:36:03 np0005544966.novalocal sudo[97653]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:03 np0005544966.novalocal systemd[1]: session-c239.scope: Deactivated successfully. Dec 03 22:36:03 np0005544966.novalocal sshd-session[97610]: Received disconnect from 103.19.254.14 port 45854:11: Bye Bye [preauth] Dec 03 22:36:03 np0005544966.novalocal sshd-session[97610]: Disconnected from invalid user ghost 103.19.254.14 port 45854 [preauth] Dec 03 22:36:04 np0005544966.novalocal sudo[97661]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:36:04 np0005544966.novalocal systemd[1]: Started Session c240 of User root. Dec 03 22:36:04 np0005544966.novalocal sudo[97661]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:04 np0005544966.novalocal sudo[97661]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:04 np0005544966.novalocal systemd[1]: session-c240.scope: Deactivated successfully. Dec 03 22:36:04 np0005544966.novalocal sudo[97665]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:36:04 np0005544966.novalocal systemd[1]: Started Session c241 of User root. Dec 03 22:36:04 np0005544966.novalocal sudo[97665]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:04 np0005544966.novalocal sudo[97665]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:04 np0005544966.novalocal systemd[1]: session-c241.scope: Deactivated successfully. Dec 03 22:36:04 np0005544966.novalocal sudo[97669]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:36:04 np0005544966.novalocal systemd[1]: Started Session c242 of User root. Dec 03 22:36:04 np0005544966.novalocal sudo[97669]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:05 np0005544966.novalocal sudo[97669]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:05 np0005544966.novalocal systemd[1]: session-c242.scope: Deactivated successfully. Dec 03 22:36:05 np0005544966.novalocal sudo[97673]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:36:05 np0005544966.novalocal systemd[1]: Started Session c243 of User root. Dec 03 22:36:05 np0005544966.novalocal sudo[97673]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:05 np0005544966.novalocal sudo[97673]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:05 np0005544966.novalocal systemd[1]: session-c243.scope: Deactivated successfully. Dec 03 22:36:08 np0005544966.novalocal sudo[97713]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-194a0835-6a42-4397-9df8-4d894b45e0f9 cinder-volumes/cinder-volumes-pool Dec 03 22:36:08 np0005544966.novalocal systemd[1]: Started Session c244 of User root. Dec 03 22:36:08 np0005544966.novalocal sudo[97713]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:09 np0005544966.novalocal lvm[97724]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:36:09 np0005544966.novalocal lvm[97724]: VG cinder-volumes finished Dec 03 22:36:09 np0005544966.novalocal sudo[97713]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:09 np0005544966.novalocal systemd[1]: session-c244.scope: Deactivated successfully. Dec 03 22:36:10 np0005544966.novalocal sudo[97725]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-39f456f5-1758-4671-a612-955fac3f40d4 cinder-volumes/cinder-volumes-pool Dec 03 22:36:10 np0005544966.novalocal systemd[1]: Started Session c245 of User root. Dec 03 22:36:10 np0005544966.novalocal sudo[97725]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:10 np0005544966.novalocal lvm[97734]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:36:10 np0005544966.novalocal lvm[97734]: VG cinder-volumes finished Dec 03 22:36:10 np0005544966.novalocal sudo[97725]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:10 np0005544966.novalocal systemd[1]: session-c245.scope: Deactivated successfully. Dec 03 22:36:11 np0005544966.novalocal sudo[97738]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-9eda9526-2362-4b14-94f9-4061ae4aca39 cinder-volumes/cinder-volumes-pool Dec 03 22:36:11 np0005544966.novalocal systemd[1]: Started Session c246 of User root. Dec 03 22:36:11 np0005544966.novalocal sudo[97738]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:11 np0005544966.novalocal lvm[97748]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:36:11 np0005544966.novalocal lvm[97748]: VG cinder-volumes finished Dec 03 22:36:11 np0005544966.novalocal sudo[97738]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:12 np0005544966.novalocal systemd[1]: session-c246.scope: Deactivated successfully. Dec 03 22:36:12 np0005544966.novalocal sudo[97749]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-9eda9526-2362-4b14-94f9-4061ae4aca39 Dec 03 22:36:12 np0005544966.novalocal systemd[1]: Started Session c247 of User root. Dec 03 22:36:12 np0005544966.novalocal sudo[97749]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:13 np0005544966.novalocal sudo[97749]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:13 np0005544966.novalocal systemd[1]: session-c247.scope: Deactivated successfully. Dec 03 22:36:13 np0005544966.novalocal sudo[97753]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-9eda9526-2362-4b14-94f9-4061ae4aca39 Dec 03 22:36:13 np0005544966.novalocal systemd[1]: Started Session c248 of User root. Dec 03 22:36:13 np0005544966.novalocal sudo[97753]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:13 np0005544966.novalocal sudo[97753]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:13 np0005544966.novalocal systemd[1]: session-c248.scope: Deactivated successfully. Dec 03 22:36:13 np0005544966.novalocal sudo[97759]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-9eda9526-2362-4b14-94f9-4061ae4aca39 Dec 03 22:36:13 np0005544966.novalocal systemd[1]: Started Session c249 of User root. Dec 03 22:36:13 np0005544966.novalocal sudo[97759]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:14 np0005544966.novalocal lvm[97769]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:36:14 np0005544966.novalocal lvm[97769]: VG cinder-volumes finished Dec 03 22:36:14 np0005544966.novalocal sudo[97759]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:14 np0005544966.novalocal systemd[1]: session-c249.scope: Deactivated successfully. Dec 03 22:36:14 np0005544966.novalocal sudo[97770]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:36:14 np0005544966.novalocal systemd[1]: Started Session c250 of User root. Dec 03 22:36:14 np0005544966.novalocal sudo[97770]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:14 np0005544966.novalocal sudo[97770]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:14 np0005544966.novalocal systemd[1]: session-c250.scope: Deactivated successfully. Dec 03 22:36:14 np0005544966.novalocal sudo[97774]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:36:14 np0005544966.novalocal systemd[1]: Started Session c251 of User root. Dec 03 22:36:14 np0005544966.novalocal sudo[97774]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:14 np0005544966.novalocal sudo[97774]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:14 np0005544966.novalocal systemd[1]: session-c251.scope: Deactivated successfully. Dec 03 22:36:14 np0005544966.novalocal sudo[97778]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:36:15 np0005544966.novalocal systemd[1]: Started Session c252 of User root. Dec 03 22:36:15 np0005544966.novalocal sudo[97778]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:15 np0005544966.novalocal sudo[97781]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-39f456f5-1758-4671-a612-955fac3f40d4 Dec 03 22:36:15 np0005544966.novalocal systemd[1]: Started Session c253 of User root. Dec 03 22:36:15 np0005544966.novalocal sudo[97781]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:15 np0005544966.novalocal sudo[97778]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:15 np0005544966.novalocal systemd[1]: session-c252.scope: Deactivated successfully. Dec 03 22:36:15 np0005544966.novalocal sudo[97781]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:15 np0005544966.novalocal systemd[1]: session-c253.scope: Deactivated successfully. Dec 03 22:36:15 np0005544966.novalocal sudo[97786]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:36:15 np0005544966.novalocal systemd[1]: Started Session c254 of User root. Dec 03 22:36:15 np0005544966.novalocal sudo[97786]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:15 np0005544966.novalocal sudo[97789]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-39f456f5-1758-4671-a612-955fac3f40d4 Dec 03 22:36:15 np0005544966.novalocal systemd[1]: Started Session c255 of User root. Dec 03 22:36:15 np0005544966.novalocal sudo[97789]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:15 np0005544966.novalocal sudo[97786]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:15 np0005544966.novalocal systemd[1]: session-c254.scope: Deactivated successfully. Dec 03 22:36:15 np0005544966.novalocal sudo[97789]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:15 np0005544966.novalocal systemd[1]: session-c255.scope: Deactivated successfully. Dec 03 22:36:15 np0005544966.novalocal sudo[97796]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-39f456f5-1758-4671-a612-955fac3f40d4 Dec 03 22:36:15 np0005544966.novalocal systemd[1]: Started Session c256 of User root. Dec 03 22:36:15 np0005544966.novalocal sudo[97796]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:16 np0005544966.novalocal lvm[97801]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:36:16 np0005544966.novalocal lvm[97801]: VG cinder-volumes finished Dec 03 22:36:16 np0005544966.novalocal sudo[97796]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:16 np0005544966.novalocal systemd[1]: session-c256.scope: Deactivated successfully. Dec 03 22:36:16 np0005544966.novalocal sudo[97802]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:36:16 np0005544966.novalocal systemd[1]: Started Session c257 of User root. Dec 03 22:36:16 np0005544966.novalocal sudo[97802]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:16 np0005544966.novalocal sudo[97802]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:16 np0005544966.novalocal systemd[1]: session-c257.scope: Deactivated successfully. Dec 03 22:36:16 np0005544966.novalocal sudo[97806]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:36:16 np0005544966.novalocal systemd[1]: Started Session c258 of User root. Dec 03 22:36:16 np0005544966.novalocal sudo[97806]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:17 np0005544966.novalocal sudo[97806]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:17 np0005544966.novalocal systemd[1]: session-c258.scope: Deactivated successfully. Dec 03 22:36:17 np0005544966.novalocal sudo[97810]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-194a0835-6a42-4397-9df8-4d894b45e0f9 Dec 03 22:36:17 np0005544966.novalocal systemd[1]: Started Session c259 of User root. Dec 03 22:36:17 np0005544966.novalocal sudo[97810]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:17 np0005544966.novalocal sudo[97812]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:36:17 np0005544966.novalocal systemd[1]: Started Session c260 of User root. Dec 03 22:36:17 np0005544966.novalocal sudo[97812]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:17 np0005544966.novalocal sshd-session[97741]: Connection closed by 14.103.118.167 port 52666 [preauth] Dec 03 22:36:17 np0005544966.novalocal sudo[97810]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:17 np0005544966.novalocal systemd[1]: session-c259.scope: Deactivated successfully. Dec 03 22:36:17 np0005544966.novalocal sudo[97812]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:17 np0005544966.novalocal systemd[1]: session-c260.scope: Deactivated successfully. Dec 03 22:36:17 np0005544966.novalocal sudo[97819]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-194a0835-6a42-4397-9df8-4d894b45e0f9 Dec 03 22:36:17 np0005544966.novalocal systemd[1]: Started Session c261 of User root. Dec 03 22:36:17 np0005544966.novalocal sudo[97820]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:36:17 np0005544966.novalocal sudo[97819]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:17 np0005544966.novalocal systemd[1]: Started Session c262 of User root. Dec 03 22:36:17 np0005544966.novalocal sudo[97820]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:18 np0005544966.novalocal sudo[97819]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:18 np0005544966.novalocal systemd[1]: session-c261.scope: Deactivated successfully. Dec 03 22:36:18 np0005544966.novalocal sudo[97820]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:18 np0005544966.novalocal systemd[1]: session-c262.scope: Deactivated successfully. Dec 03 22:36:18 np0005544966.novalocal sudo[97827]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-194a0835-6a42-4397-9df8-4d894b45e0f9 Dec 03 22:36:18 np0005544966.novalocal systemd[1]: Started Session c263 of User root. Dec 03 22:36:18 np0005544966.novalocal sudo[97827]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:18 np0005544966.novalocal lvm[97834]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 03 22:36:18 np0005544966.novalocal lvm[97834]: VG cinder-volumes finished Dec 03 22:36:18 np0005544966.novalocal sudo[97827]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:18 np0005544966.novalocal systemd[1]: session-c263.scope: Deactivated successfully. Dec 03 22:36:18 np0005544966.novalocal sudo[97835]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:36:18 np0005544966.novalocal systemd[1]: Started Session c264 of User root. Dec 03 22:36:19 np0005544966.novalocal sudo[97835]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:19 np0005544966.novalocal sudo[97835]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:19 np0005544966.novalocal systemd[1]: session-c264.scope: Deactivated successfully. Dec 03 22:36:19 np0005544966.novalocal sudo[97839]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:36:19 np0005544966.novalocal systemd[1]: Started Session c265 of User root. Dec 03 22:36:19 np0005544966.novalocal sudo[97839]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:19 np0005544966.novalocal sudo[97839]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:19 np0005544966.novalocal systemd[1]: session-c265.scope: Deactivated successfully. Dec 03 22:36:19 np0005544966.novalocal sudo[97844]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:36:19 np0005544966.novalocal systemd[1]: Started Session c266 of User root. Dec 03 22:36:19 np0005544966.novalocal sudo[97844]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:20 np0005544966.novalocal sudo[97844]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:20 np0005544966.novalocal systemd[1]: session-c266.scope: Deactivated successfully. Dec 03 22:36:20 np0005544966.novalocal sudo[97848]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:36:20 np0005544966.novalocal systemd[1]: Started Session c267 of User root. Dec 03 22:36:20 np0005544966.novalocal sudo[97848]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:36:20 np0005544966.novalocal sudo[97848]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:20 np0005544966.novalocal systemd[1]: session-c267.scope: Deactivated successfully. Dec 03 22:36:40 np0005544966.novalocal sudo[97877]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmp2ijbfnrv/privsep.sock Dec 03 22:36:40 np0005544966.novalocal systemd[1]: Started Session c268 of User root. Dec 03 22:36:40 np0005544966.novalocal sudo[97877]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:36:40 np0005544966.novalocal sudo[97877]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:41 np0005544966.novalocal kernel: tap855f6665-fd: entered promiscuous mode Dec 03 22:36:41 np0005544966.novalocal NetworkManager[846]: [1764819401.1102] manager: (tap855f6665-fd): new Tun device (/org/freedesktop/NetworkManager/Devices/28) Dec 03 22:36:41 np0005544966.novalocal virtqemud[92372]: Domain id=9 name='instance-00000008' uuid=1e57d85a-b6b9-44b0-a185-358b5dcd3904 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 03 22:36:41 np0005544966.novalocal virtqemud[92372]: Domain id=9 name='instance-00000008' uuid=1e57d85a-b6b9-44b0-a185-358b5dcd3904 is tainted: deprecated-config (CPU model 'qemu64') Dec 03 22:36:41 np0005544966.novalocal systemd-machined[89644]: New machine qemu-9-instance-00000008. Dec 03 22:36:41 np0005544966.novalocal systemd[1]: Started Virtual Machine qemu-9-instance-00000008. Dec 03 22:36:41 np0005544966.novalocal systemd-udevd[97908]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:36:41 np0005544966.novalocal NetworkManager[846]: [1764819401.2376] device (tap855f6665-fd): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 03 22:36:41 np0005544966.novalocal NetworkManager[846]: [1764819401.2381] device (tap855f6665-fd): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 03 22:36:41 np0005544966.novalocal NetworkManager[846]: [1764819401.2427] manager: (tap9421848f-80): new Veth device (/org/freedesktop/NetworkManager/Devices/29) Dec 03 22:36:41 np0005544966.novalocal systemd-udevd[97913]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:36:41 np0005544966.novalocal NetworkManager[846]: [1764819401.3183] device (tap9421848f-80): carrier: link connected Dec 03 22:36:41 np0005544966.novalocal kernel: tap9421848f-80: entered promiscuous mode Dec 03 22:36:41 np0005544966.novalocal sudo[97946]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-9421848f-8f15-493a-be2f-b4a535c7d590 env PROCESS_TAG=haproxy-9421848f-8f15-493a-be2f-b4a535c7d590 haproxy -f /var/lib/neutron/ovn-metadata-proxy/9421848f-8f15-493a-be2f-b4a535c7d590.conf Dec 03 22:36:41 np0005544966.novalocal systemd[1]: Started Session c269 of User root. Dec 03 22:36:41 np0005544966.novalocal sudo[97946]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:36:41 np0005544966.novalocal sudo[97946]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:42 np0005544966.novalocal sudo[97962]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmppwwxdzll/privsep.sock Dec 03 22:36:42 np0005544966.novalocal systemd[1]: Started Session c270 of User root. Dec 03 22:36:42 np0005544966.novalocal sudo[97962]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:36:42 np0005544966.novalocal sudo[97962]: pam_unix(sudo:session): session closed for user root Dec 03 22:36:44 np0005544966.novalocal sudo[97975]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap-daemon /etc/neutron/rootwrap.conf Dec 03 22:36:44 np0005544966.novalocal systemd[1]: Started Session c271 of User root. Dec 03 22:36:44 np0005544966.novalocal sudo[97975]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:36:44 np0005544966.novalocal kernel: vg5b11e6ec-4f5: entered promiscuous mode Dec 03 22:36:44 np0005544966.novalocal NetworkManager[846]: [1764819404.4850] manager: (vg5b11e6ec-4f5): 'openvswitch' plugin not available; creating generic device Dec 03 22:36:44 np0005544966.novalocal NetworkManager[846]: [1764819404.4900] manager: (vg5b11e6ec-4f5): new Generic device (/org/freedesktop/NetworkManager/Devices/30) Dec 03 22:36:45 np0005544966.novalocal kernel: vrf2bf322e-146: entered promiscuous mode Dec 03 22:36:45 np0005544966.novalocal systemd-udevd[98003]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:36:45 np0005544966.novalocal NetworkManager[846]: [1764819405.4872] manager: (vrf2bf322e-146): 'openvswitch' plugin not available; creating generic device Dec 03 22:36:45 np0005544966.novalocal NetworkManager[846]: [1764819405.4887] manager: (vrf2bf322e-146): new Generic device (/org/freedesktop/NetworkManager/Devices/31) Dec 03 22:36:47 np0005544966.novalocal kernel: IPv4 over IPsec tunneling driver Dec 03 22:36:47 np0005544966.novalocal systemd-udevd[98168]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:36:47 np0005544966.novalocal NetworkManager[846]: [1764819407.9496] manager: (ip_vti0): new IPTunnel device (/org/freedesktop/NetworkManager/Devices/32) Dec 03 22:36:47 np0005544966.novalocal kernel: IPsec XFRM device driver Dec 03 22:36:56 np0005544966.novalocal sshd-session[98361]: Invalid user userm from 121.52.147.5 port 36178 Dec 03 22:36:56 np0005544966.novalocal sshd-session[98361]: Received disconnect from 121.52.147.5 port 36178:11: Bye Bye [preauth] Dec 03 22:36:56 np0005544966.novalocal sshd-session[98361]: Disconnected from invalid user userm 121.52.147.5 port 36178 [preauth] Dec 03 22:37:01 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58706 [03/Dec/2025:22:37:00.949] listener listener/metadata 0/0/0/234/234 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 03 22:37:01 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58718 [03/Dec/2025:22:37:01.274] listener listener/metadata 0/0/0/15/15 200 160 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Dec 03 22:37:01 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58730 [03/Dec/2025:22:37:01.317] listener listener/metadata 0/0/0/14/14 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Dec 03 22:37:01 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58744 [03/Dec/2025:22:37:01.399] listener listener/metadata 0/0/0/10/10 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 03 22:37:01 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58756 [03/Dec/2025:22:37:01.463] listener listener/metadata 0/0/0/12/12 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Dec 03 22:37:01 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58762 [03/Dec/2025:22:37:01.515] listener listener/metadata 0/0/0/11/11 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Dec 03 22:37:01 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58766 [03/Dec/2025:22:37:01.565] listener listener/metadata 0/0/0/16/16 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Dec 03 22:37:01 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58776 [03/Dec/2025:22:37:01.651] listener listener/metadata 0/0/0/16/16 200 132 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Dec 03 22:37:01 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58782 [03/Dec/2025:22:37:01.712] listener listener/metadata 0/0/0/13/13 200 173 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Dec 03 22:37:01 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58790 [03/Dec/2025:22:37:01.795] listener listener/metadata 0/0/0/13/13 200 173 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Dec 03 22:37:01 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58804 [03/Dec/2025:22:37:01.862] listener listener/metadata 0/0/0/23/23 404 281 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Dec 03 22:37:01 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58816 [03/Dec/2025:22:37:01.931] listener listener/metadata 0/0/0/13/13 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Dec 03 22:37:01 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:37:01 np0005544966.novalocal sudo[98392]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:37:01 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58826 [03/Dec/2025:22:37:01.976] listener listener/metadata 0/0/0/16/16 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Dec 03 22:37:01 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:37:01 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:37:02 np0005544966.novalocal systemd[1]: Started Session c272 of User root. Dec 03 22:37:02 np0005544966.novalocal sudo[98392]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:37:02 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58832 [03/Dec/2025:22:37:02.025] listener listener/metadata 0/0/0/13/13 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Dec 03 22:37:02 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58834 [03/Dec/2025:22:37:02.090] listener listener/metadata 0/0/0/19/19 200 173 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Dec 03 22:37:02 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.14:58840 [03/Dec/2025:22:37:02.152] listener listener/metadata 0/0/0/25/25 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Dec 03 22:37:02 np0005544966.novalocal sudo[98392]: pam_unix(sudo:session): session closed for user root Dec 03 22:37:02 np0005544966.novalocal systemd[1]: session-c272.scope: Deactivated successfully. Dec 03 22:37:02 np0005544966.novalocal sudo[98397]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:37:02 np0005544966.novalocal systemd[1]: Started Session c273 of User root. Dec 03 22:37:02 np0005544966.novalocal sudo[98397]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:37:02 np0005544966.novalocal sudo[98397]: pam_unix(sudo:session): session closed for user root Dec 03 22:37:02 np0005544966.novalocal systemd[1]: session-c273.scope: Deactivated successfully. Dec 03 22:37:02 np0005544966.novalocal sudo[98406]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:37:02 np0005544966.novalocal systemd[1]: Started Session c274 of User root. Dec 03 22:37:02 np0005544966.novalocal sudo[98406]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:37:03 np0005544966.novalocal sudo[98406]: pam_unix(sudo:session): session closed for user root Dec 03 22:37:03 np0005544966.novalocal systemd[1]: session-c274.scope: Deactivated successfully. Dec 03 22:37:03 np0005544966.novalocal sudo[98411]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:37:03 np0005544966.novalocal systemd[1]: Started Session c275 of User root. Dec 03 22:37:03 np0005544966.novalocal sudo[98411]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:37:03 np0005544966.novalocal sudo[98411]: pam_unix(sudo:session): session closed for user root Dec 03 22:37:03 np0005544966.novalocal systemd[1]: session-c275.scope: Deactivated successfully. Dec 03 22:37:09 np0005544966.novalocal kernel: vrf2bf322e-146: left promiscuous mode Dec 03 22:37:09 np0005544966.novalocal kernel: vg5b11e6ec-4f5: left promiscuous mode Dec 03 22:37:09 np0005544966.novalocal systemd[1]: run-netns-qvpn\x2dce493dba\x2df94c\x2d4550\x2d8c2c\x2d6c40d694fe0f.mount: Deactivated successfully. Dec 03 22:37:29 np0005544966.novalocal sshd-session[98510]: Received disconnect from 103.19.254.14 port 48698:11: Bye Bye [preauth] Dec 03 22:37:29 np0005544966.novalocal sshd-session[98510]: Disconnected from authenticating user root 103.19.254.14 port 48698 [preauth] Dec 03 22:37:38 np0005544966.novalocal kernel: tapf43a9e69-74: entered promiscuous mode Dec 03 22:37:38 np0005544966.novalocal NetworkManager[846]: [1764819458.9621] manager: (tapf43a9e69-74): new Tun device (/org/freedesktop/NetworkManager/Devices/33) Dec 03 22:37:38 np0005544966.novalocal virtqemud[92372]: Domain id=10 name='instance-00000009' uuid=6e9830e9-6f73-4d61-89f5-d4dcb8844140 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 03 22:37:38 np0005544966.novalocal virtqemud[92372]: Domain id=10 name='instance-00000009' uuid=6e9830e9-6f73-4d61-89f5-d4dcb8844140 is tainted: deprecated-config (CPU model 'qemu64') Dec 03 22:37:39 np0005544966.novalocal systemd-machined[89644]: New machine qemu-10-instance-00000009. Dec 03 22:37:39 np0005544966.novalocal systemd[1]: Started Virtual Machine qemu-10-instance-00000009. Dec 03 22:37:39 np0005544966.novalocal systemd-udevd[98555]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:37:39 np0005544966.novalocal NetworkManager[846]: [1764819459.0627] device (tapf43a9e69-74): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 03 22:37:39 np0005544966.novalocal NetworkManager[846]: [1764819459.0637] device (tapf43a9e69-74): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 03 22:37:58 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36084 [03/Dec/2025:22:37:58.073] listener listener/metadata 0/0/0/162/162 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 03 22:37:58 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36088 [03/Dec/2025:22:37:58.340] listener listener/metadata 0/0/0/16/16 200 158 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Dec 03 22:37:58 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36100 [03/Dec/2025:22:37:58.385] listener listener/metadata 0/0/0/15/15 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Dec 03 22:37:58 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36106 [03/Dec/2025:22:37:58.442] listener listener/metadata 0/0/0/15/15 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 03 22:37:58 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36118 [03/Dec/2025:22:37:58.495] listener listener/metadata 0/0/0/16/16 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Dec 03 22:37:58 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36120 [03/Dec/2025:22:37:58.551] listener listener/metadata 0/0/0/14/14 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Dec 03 22:37:58 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36134 [03/Dec/2025:22:37:58.607] listener listener/metadata 0/0/0/14/14 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Dec 03 22:37:58 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36150 [03/Dec/2025:22:37:58.659] listener listener/metadata 0/0/0/16/16 200 132 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Dec 03 22:37:58 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36158 [03/Dec/2025:22:37:58.751] listener listener/metadata 0/0/0/16/16 200 174 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Dec 03 22:37:58 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36166 [03/Dec/2025:22:37:58.817] listener listener/metadata 0/0/0/16/16 200 174 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Dec 03 22:37:58 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36170 [03/Dec/2025:22:37:58.879] listener listener/metadata 0/0/0/15/15 404 281 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Dec 03 22:37:58 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36178 [03/Dec/2025:22:37:58.935] listener listener/metadata 0/0/0/16/16 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Dec 03 22:37:59 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36194 [03/Dec/2025:22:37:59.003] listener listener/metadata 0/0/0/15/15 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Dec 03 22:37:59 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36202 [03/Dec/2025:22:37:59.072] listener listener/metadata 0/0/0/16/16 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Dec 03 22:37:59 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36206 [03/Dec/2025:22:37:59.142] listener listener/metadata 0/0/0/16/16 200 174 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Dec 03 22:37:59 np0005544966.novalocal haproxy-metadata-proxy-9421848f-8f15-493a-be2f-b4a535c7d590[97951]: 10.100.0.13:36212 [03/Dec/2025:22:37:59.198] listener listener/metadata 0/0/0/16/16 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Dec 03 22:38:02 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:38:02 np0005544966.novalocal sudo[98597]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:38:02 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:38:02 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:38:02 np0005544966.novalocal systemd[1]: Started Session c276 of User root. Dec 03 22:38:02 np0005544966.novalocal sudo[98597]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:38:02 np0005544966.novalocal sudo[98597]: pam_unix(sudo:session): session closed for user root Dec 03 22:38:02 np0005544966.novalocal systemd[1]: session-c276.scope: Deactivated successfully. Dec 03 22:38:02 np0005544966.novalocal sudo[98604]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:38:02 np0005544966.novalocal systemd[1]: Started Session c277 of User root. Dec 03 22:38:02 np0005544966.novalocal sudo[98604]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:38:02 np0005544966.novalocal sudo[98604]: pam_unix(sudo:session): session closed for user root Dec 03 22:38:02 np0005544966.novalocal systemd[1]: session-c277.scope: Deactivated successfully. Dec 03 22:38:02 np0005544966.novalocal sudo[98608]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:38:02 np0005544966.novalocal systemd[1]: Started Session c278 of User root. Dec 03 22:38:02 np0005544966.novalocal sudo[98608]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:38:03 np0005544966.novalocal sudo[98608]: pam_unix(sudo:session): session closed for user root Dec 03 22:38:03 np0005544966.novalocal systemd[1]: session-c278.scope: Deactivated successfully. Dec 03 22:38:03 np0005544966.novalocal sudo[98612]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:38:03 np0005544966.novalocal systemd[1]: Started Session c279 of User root. Dec 03 22:38:03 np0005544966.novalocal sudo[98612]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:38:03 np0005544966.novalocal sudo[98612]: pam_unix(sudo:session): session closed for user root Dec 03 22:38:03 np0005544966.novalocal systemd[1]: session-c279.scope: Deactivated successfully. Dec 03 22:38:04 np0005544966.novalocal sshd-session[98618]: error: kex_exchange_identification: read: Connection reset by peer Dec 03 22:38:04 np0005544966.novalocal sshd-session[98618]: Connection reset by 14.103.118.167 port 60826 Dec 03 22:38:14 np0005544966.novalocal kernel: tapf43a9e69-74 (unregistering): left promiscuous mode Dec 03 22:38:14 np0005544966.novalocal NetworkManager[846]: [1764819494.3060] device (tapf43a9e69-74): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 03 22:38:14 np0005544966.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Deactivated successfully. Dec 03 22:38:14 np0005544966.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Consumed 24.700s CPU time. Dec 03 22:38:14 np0005544966.novalocal systemd-machined[89644]: Machine qemu-10-instance-00000009 terminated. Dec 03 22:38:25 np0005544966.novalocal kernel: tap855f6665-fd (unregistering): left promiscuous mode Dec 03 22:38:25 np0005544966.novalocal NetworkManager[846]: [1764819505.1725] device (tap855f6665-fd): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 03 22:38:25 np0005544966.novalocal systemd[1]: session-c269.scope: Deactivated successfully. Dec 03 22:38:25 np0005544966.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Deactivated successfully. Dec 03 22:38:25 np0005544966.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Consumed 34.981s CPU time. Dec 03 22:38:25 np0005544966.novalocal systemd-machined[89644]: Machine qemu-9-instance-00000008 terminated. Dec 03 22:38:25 np0005544966.novalocal kernel: tap9421848f-80: left promiscuous mode Dec 03 22:38:25 np0005544966.novalocal kernel: tap855f6665-fd: entered promiscuous mode Dec 03 22:38:25 np0005544966.novalocal NetworkManager[846]: [1764819505.3818] manager: (tap855f6665-fd): new Tun device (/org/freedesktop/NetworkManager/Devices/34) Dec 03 22:38:25 np0005544966.novalocal systemd-udevd[98700]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:38:25 np0005544966.novalocal kernel: tap855f6665-fd (unregistering): left promiscuous mode Dec 03 22:38:25 np0005544966.novalocal NetworkManager[846]: [1764819505.4457] manager: (tap9421848f-80): new Veth device (/org/freedesktop/NetworkManager/Devices/35) Dec 03 22:38:25 np0005544966.novalocal NetworkManager[846]: [1764819505.5306] device (tap9421848f-80): carrier: link connected Dec 03 22:38:25 np0005544966.novalocal kernel: tap9421848f-80: entered promiscuous mode Dec 03 22:38:25 np0005544966.novalocal sudo[98750]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-9421848f-8f15-493a-be2f-b4a535c7d590 env PROCESS_TAG=haproxy-9421848f-8f15-493a-be2f-b4a535c7d590 haproxy -f /var/lib/neutron/ovn-metadata-proxy/9421848f-8f15-493a-be2f-b4a535c7d590.conf Dec 03 22:38:25 np0005544966.novalocal systemd[1]: Started Session c280 of User root. Dec 03 22:38:25 np0005544966.novalocal sudo[98750]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:38:26 np0005544966.novalocal sudo[98750]: pam_unix(sudo:session): session closed for user root Dec 03 22:38:26 np0005544966.novalocal systemd[1]: session-c280.scope: Deactivated successfully. Dec 03 22:38:26 np0005544966.novalocal kernel: tap9421848f-80: left promiscuous mode Dec 03 22:38:38 np0005544966.novalocal sshd-session[98772]: Invalid user stperez from 189.169.67.183 port 35656 Dec 03 22:38:39 np0005544966.novalocal sshd-session[98772]: Received disconnect from 189.169.67.183 port 35656:11: Bye Bye [preauth] Dec 03 22:38:39 np0005544966.novalocal sshd-session[98772]: Disconnected from invalid user stperez 189.169.67.183 port 35656 [preauth] Dec 03 22:38:53 np0005544966.novalocal sshd-session[98778]: Received disconnect from 103.19.254.14 port 53226:11: Bye Bye [preauth] Dec 03 22:38:53 np0005544966.novalocal sshd-session[98778]: Disconnected from authenticating user root 103.19.254.14 port 53226 [preauth] Dec 03 22:39:01 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:39:01 np0005544966.novalocal sudo[98797]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:39:02 np0005544966.novalocal systemd[1]: Started Session c281 of User root. Dec 03 22:39:02 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:39:02 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:39:02 np0005544966.novalocal sudo[98797]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:39:02 np0005544966.novalocal sudo[98797]: pam_unix(sudo:session): session closed for user root Dec 03 22:39:02 np0005544966.novalocal systemd[1]: session-c281.scope: Deactivated successfully. Dec 03 22:39:02 np0005544966.novalocal sudo[98803]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:39:02 np0005544966.novalocal systemd[1]: Started Session c282 of User root. Dec 03 22:39:02 np0005544966.novalocal sudo[98803]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:39:02 np0005544966.novalocal sudo[98803]: pam_unix(sudo:session): session closed for user root Dec 03 22:39:02 np0005544966.novalocal systemd[1]: session-c282.scope: Deactivated successfully. Dec 03 22:39:02 np0005544966.novalocal sudo[98810]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:39:02 np0005544966.novalocal systemd[1]: Started Session c283 of User root. Dec 03 22:39:02 np0005544966.novalocal sudo[98810]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:39:03 np0005544966.novalocal sudo[98810]: pam_unix(sudo:session): session closed for user root Dec 03 22:39:03 np0005544966.novalocal systemd[1]: session-c283.scope: Deactivated successfully. Dec 03 22:39:03 np0005544966.novalocal sudo[98814]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:39:03 np0005544966.novalocal systemd[1]: Started Session c284 of User root. Dec 03 22:39:03 np0005544966.novalocal sudo[98814]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:39:03 np0005544966.novalocal sudo[98814]: pam_unix(sudo:session): session closed for user root Dec 03 22:39:03 np0005544966.novalocal systemd[1]: session-c284.scope: Deactivated successfully. Dec 03 22:39:04 np0005544966.novalocal kernel: tap9f79a49a-9a: entered promiscuous mode Dec 03 22:39:04 np0005544966.novalocal NetworkManager[846]: [1764819544.6130] manager: (tap9f79a49a-9a): new Tun device (/org/freedesktop/NetworkManager/Devices/36) Dec 03 22:39:04 np0005544966.novalocal virtqemud[92372]: Domain id=11 name='instance-0000000a' uuid=5af6dd7f-5458-4018-95a1-71f3045b0a9b is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 03 22:39:04 np0005544966.novalocal virtqemud[92372]: Domain id=11 name='instance-0000000a' uuid=5af6dd7f-5458-4018-95a1-71f3045b0a9b is tainted: deprecated-config (CPU model 'qemu64') Dec 03 22:39:04 np0005544966.novalocal systemd-machined[89644]: New machine qemu-11-instance-0000000a. Dec 03 22:39:04 np0005544966.novalocal systemd[1]: Started Virtual Machine qemu-11-instance-0000000a. Dec 03 22:39:04 np0005544966.novalocal systemd-udevd[98842]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:39:04 np0005544966.novalocal NetworkManager[846]: [1764819544.7359] device (tap9f79a49a-9a): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 03 22:39:04 np0005544966.novalocal NetworkManager[846]: [1764819544.7372] device (tap9f79a49a-9a): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 03 22:39:04 np0005544966.novalocal systemd-udevd[98846]: Network interface NamePolicy= disabled on kernel command line. Dec 03 22:39:04 np0005544966.novalocal NetworkManager[846]: [1764819544.7702] manager: (tapae9acefd-f0): new Veth device (/org/freedesktop/NetworkManager/Devices/37) Dec 03 22:39:04 np0005544966.novalocal NetworkManager[846]: [1764819544.8401] device (tapae9acefd-f0): carrier: link connected Dec 03 22:39:05 np0005544966.novalocal kernel: tapae9acefd-f0: entered promiscuous mode Dec 03 22:39:05 np0005544966.novalocal sudo[98885]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-ae9acefd-f138-4c76-87e5-3d39acce57a1 env PROCESS_TAG=haproxy-ae9acefd-f138-4c76-87e5-3d39acce57a1 haproxy -f /var/lib/neutron/ovn-metadata-proxy/ae9acefd-f138-4c76-87e5-3d39acce57a1.conf Dec 03 22:39:05 np0005544966.novalocal systemd[1]: Started Session c285 of User root. Dec 03 22:39:05 np0005544966.novalocal sudo[98885]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 03 22:39:05 np0005544966.novalocal sudo[98885]: pam_unix(sudo:session): session closed for user root Dec 03 22:39:12 np0005544966.novalocal sshd-session[98934]: Invalid user ir from 185.228.135.173 port 20231 Dec 03 22:39:12 np0005544966.novalocal sshd-session[98934]: Received disconnect from 185.228.135.173 port 20231:11: Bye Bye [preauth] Dec 03 22:39:12 np0005544966.novalocal sshd-session[98934]: Disconnected from invalid user ir 185.228.135.173 port 20231 [preauth] Dec 03 22:39:23 np0005544966.novalocal haproxy-metadata-proxy-ae9acefd-f138-4c76-87e5-3d39acce57a1[98890]: 10.100.0.13:43740 [03/Dec/2025:22:39:23.135] listener listener/metadata 0/0/0/129/129 200 131 - - ---- 1/1/0/0/0 0/0 "GET /latest/meta-data/public-ipv4 HTTP/1.1" Dec 03 22:39:23 np0005544966.novalocal haproxy-metadata-proxy-ae9acefd-f138-4c76-87e5-3d39acce57a1[98890]: 10.100.0.13:43750 [03/Dec/2025:22:39:23.515] listener listener/metadata 0/0/0/334/334 200 118 - - ---- 1/1/0/0/0 0/0 "POST /openstack/2013-10-17/password HTTP/1.1" Dec 03 22:39:27 np0005544966.novalocal kernel: tap9f79a49a-9a (unregistering): left promiscuous mode Dec 03 22:39:27 np0005544966.novalocal NetworkManager[846]: [1764819567.1672] device (tap9f79a49a-9a): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 03 22:39:27 np0005544966.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Deactivated successfully. Dec 03 22:39:27 np0005544966.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Consumed 18.195s CPU time. Dec 03 22:39:27 np0005544966.novalocal systemd-machined[89644]: Machine qemu-11-instance-0000000a terminated. Dec 03 22:39:27 np0005544966.novalocal kernel: tapae9acefd-f0: left promiscuous mode Dec 03 22:39:27 np0005544966.novalocal systemd[1]: session-c285.scope: Deactivated successfully. Dec 03 22:39:58 np0005544966.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 03 22:39:58 np0005544966.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 03 22:39:59 np0005544966.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service. Dec 03 22:40:00 np0005544966.novalocal setroubleshoot[99027]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l d25bd071-f1f0-46f2-9417-92594691f02e Dec 03 22:40:00 np0005544966.novalocal setroubleshoot[99027]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:40:02 np0005544966.novalocal setroubleshoot[99027]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l d25bd071-f1f0-46f2-9417-92594691f02e Dec 03 22:40:02 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:40:02 np0005544966.novalocal sudo[99043]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:40:02 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:40:02 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:40:02 np0005544966.novalocal setroubleshoot[99027]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 03 22:40:02 np0005544966.novalocal systemd[1]: Started Session c286 of User root. Dec 03 22:40:02 np0005544966.novalocal sudo[99043]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:40:02 np0005544966.novalocal sudo[99043]: pam_unix(sudo:session): session closed for user root Dec 03 22:40:02 np0005544966.novalocal systemd[1]: session-c286.scope: Deactivated successfully. Dec 03 22:40:02 np0005544966.novalocal sudo[99053]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:40:02 np0005544966.novalocal systemd[1]: Started Session c287 of User root. Dec 03 22:40:02 np0005544966.novalocal sudo[99053]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:40:02 np0005544966.novalocal sudo[99053]: pam_unix(sudo:session): session closed for user root Dec 03 22:40:02 np0005544966.novalocal systemd[1]: session-c287.scope: Deactivated successfully. Dec 03 22:40:02 np0005544966.novalocal sudo[99059]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:40:02 np0005544966.novalocal systemd[1]: Started Session c288 of User root. Dec 03 22:40:02 np0005544966.novalocal sudo[99059]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:40:03 np0005544966.novalocal sudo[99059]: pam_unix(sudo:session): session closed for user root Dec 03 22:40:03 np0005544966.novalocal systemd[1]: session-c288.scope: Deactivated successfully. Dec 03 22:40:03 np0005544966.novalocal sudo[99063]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:40:03 np0005544966.novalocal systemd[1]: Started Session c289 of User root. Dec 03 22:40:03 np0005544966.novalocal sudo[99063]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:40:03 np0005544966.novalocal sudo[99063]: pam_unix(sudo:session): session closed for user root Dec 03 22:40:03 np0005544966.novalocal systemd[1]: session-c289.scope: Deactivated successfully. Dec 03 22:40:12 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Deactivated successfully. Dec 03 22:40:12 np0005544966.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Consumed 1.138s CPU time. Dec 03 22:40:12 np0005544966.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 03 22:40:12 np0005544966.novalocal systemd[1]: setroubleshootd.service: Consumed 1.243s CPU time. Dec 03 22:40:20 np0005544966.novalocal sshd-session[99117]: Invalid user ubuntu from 103.19.254.14 port 56966 Dec 03 22:40:20 np0005544966.novalocal sshd-session[99117]: Received disconnect from 103.19.254.14 port 56966:11: Bye Bye [preauth] Dec 03 22:40:20 np0005544966.novalocal sshd-session[99117]: Disconnected from invalid user ubuntu 103.19.254.14 port 56966 [preauth] Dec 03 22:40:42 np0005544966.novalocal sshd-session[99140]: Invalid user nishant from 185.228.135.173 port 9864 Dec 03 22:40:43 np0005544966.novalocal sshd-session[99140]: Received disconnect from 185.228.135.173 port 9864:11: Bye Bye [preauth] Dec 03 22:40:43 np0005544966.novalocal sshd-session[99140]: Disconnected from invalid user nishant 185.228.135.173 port 9864 [preauth] Dec 03 22:40:48 np0005544966.novalocal sshd-session[99148]: Received disconnect from 121.52.147.5 port 40018:11: Bye Bye [preauth] Dec 03 22:40:48 np0005544966.novalocal sshd-session[99148]: Disconnected from authenticating user root 121.52.147.5 port 40018 [preauth] Dec 03 22:41:02 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:41:02 np0005544966.novalocal sudo[99161]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:41:02 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:41:02 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:41:02 np0005544966.novalocal systemd[1]: Started Session c290 of User root. Dec 03 22:41:02 np0005544966.novalocal sudo[99161]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:41:02 np0005544966.novalocal sudo[99161]: pam_unix(sudo:session): session closed for user root Dec 03 22:41:02 np0005544966.novalocal systemd[1]: session-c290.scope: Deactivated successfully. Dec 03 22:41:02 np0005544966.novalocal sudo[99167]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:41:02 np0005544966.novalocal systemd[1]: Started Session c291 of User root. Dec 03 22:41:02 np0005544966.novalocal sudo[99167]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:41:02 np0005544966.novalocal sudo[99167]: pam_unix(sudo:session): session closed for user root Dec 03 22:41:02 np0005544966.novalocal systemd[1]: session-c291.scope: Deactivated successfully. Dec 03 22:41:02 np0005544966.novalocal sudo[99171]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:41:02 np0005544966.novalocal systemd[1]: Started Session c292 of User root. Dec 03 22:41:02 np0005544966.novalocal sudo[99171]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:41:03 np0005544966.novalocal sudo[99171]: pam_unix(sudo:session): session closed for user root Dec 03 22:41:03 np0005544966.novalocal systemd[1]: session-c292.scope: Deactivated successfully. Dec 03 22:41:03 np0005544966.novalocal sudo[99175]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:41:03 np0005544966.novalocal systemd[1]: Started Session c293 of User root. Dec 03 22:41:03 np0005544966.novalocal sudo[99175]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:41:03 np0005544966.novalocal sudo[99175]: pam_unix(sudo:session): session closed for user root Dec 03 22:41:03 np0005544966.novalocal systemd[1]: session-c293.scope: Deactivated successfully. Dec 03 22:41:11 np0005544966.novalocal sshd-session[99221]: Invalid user actions from 189.169.67.183 port 48236 Dec 03 22:41:12 np0005544966.novalocal sshd-session[99221]: Received disconnect from 189.169.67.183 port 48236:11: Bye Bye [preauth] Dec 03 22:41:12 np0005544966.novalocal sshd-session[99221]: Disconnected from invalid user actions 189.169.67.183 port 48236 [preauth] Dec 03 22:41:45 np0005544966.novalocal sshd-session[99255]: Received disconnect from 103.19.254.14 port 59140:11: Bye Bye [preauth] Dec 03 22:41:45 np0005544966.novalocal sshd-session[99255]: Disconnected from authenticating user root 103.19.254.14 port 59140 [preauth] Dec 03 22:41:58 np0005544966.novalocal sshd-session[99268]: Received disconnect from 193.46.255.99 port 40882:11: [preauth] Dec 03 22:41:58 np0005544966.novalocal sshd-session[99268]: Disconnected from authenticating user root 193.46.255.99 port 40882 [preauth] Dec 03 22:41:59 np0005544966.novalocal sshd-session[99270]: Invalid user mcserver from 185.228.135.173 port 2561 Dec 03 22:41:59 np0005544966.novalocal sshd-session[99270]: Received disconnect from 185.228.135.173 port 2561:11: Bye Bye [preauth] Dec 03 22:41:59 np0005544966.novalocal sshd-session[99270]: Disconnected from invalid user mcserver 185.228.135.173 port 2561 [preauth] Dec 03 22:42:02 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:42:02 np0005544966.novalocal sudo[99275]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:42:02 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:42:02 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:42:02 np0005544966.novalocal systemd[1]: Started Session c294 of User root. Dec 03 22:42:02 np0005544966.novalocal sudo[99275]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:42:02 np0005544966.novalocal sudo[99275]: pam_unix(sudo:session): session closed for user root Dec 03 22:42:02 np0005544966.novalocal systemd[1]: session-c294.scope: Deactivated successfully. Dec 03 22:42:02 np0005544966.novalocal sudo[99280]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:42:02 np0005544966.novalocal systemd[1]: Started Session c295 of User root. Dec 03 22:42:02 np0005544966.novalocal sudo[99280]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:42:02 np0005544966.novalocal sudo[99280]: pam_unix(sudo:session): session closed for user root Dec 03 22:42:02 np0005544966.novalocal systemd[1]: session-c295.scope: Deactivated successfully. Dec 03 22:42:02 np0005544966.novalocal sudo[99284]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:42:02 np0005544966.novalocal systemd[1]: Started Session c296 of User root. Dec 03 22:42:02 np0005544966.novalocal sudo[99284]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:42:03 np0005544966.novalocal sudo[99284]: pam_unix(sudo:session): session closed for user root Dec 03 22:42:03 np0005544966.novalocal systemd[1]: session-c296.scope: Deactivated successfully. Dec 03 22:42:03 np0005544966.novalocal sudo[99288]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:42:03 np0005544966.novalocal systemd[1]: Started Session c297 of User root. Dec 03 22:42:03 np0005544966.novalocal sudo[99288]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:42:03 np0005544966.novalocal sudo[99288]: pam_unix(sudo:session): session closed for user root Dec 03 22:42:03 np0005544966.novalocal systemd[1]: session-c297.scope: Deactivated successfully. Dec 03 22:42:10 np0005544966.novalocal sshd-session[99333]: Connection reset by authenticating user root 45.135.232.92 port 40994 [preauth] Dec 03 22:42:13 np0005544966.novalocal sshd-session[99335]: Connection reset by authenticating user root 45.135.232.92 port 40998 [preauth] Dec 03 22:42:15 np0005544966.novalocal sshd-session[99340]: Connection reset by authenticating user adm 45.135.232.92 port 41022 [preauth] Dec 03 22:42:16 np0005544966.novalocal sshd-session[99344]: Invalid user user from 45.135.232.92 port 56926 Dec 03 22:42:17 np0005544966.novalocal sshd-session[99344]: Connection reset by invalid user user 45.135.232.92 port 56926 [preauth] Dec 03 22:42:18 np0005544966.novalocal sshd-session[99346]: Received disconnect from 121.52.147.5 port 59654:11: Bye Bye [preauth] Dec 03 22:42:18 np0005544966.novalocal sshd-session[99346]: Disconnected from authenticating user root 121.52.147.5 port 59654 [preauth] Dec 03 22:42:20 np0005544966.novalocal sshd-session[99351]: Connection reset by authenticating user root 45.135.232.92 port 56960 [preauth] Dec 03 22:42:30 np0005544966.novalocal sshd-session[99362]: Invalid user ionadmin from 189.169.67.183 port 47258 Dec 03 22:42:30 np0005544966.novalocal sshd-session[99362]: Received disconnect from 189.169.67.183 port 47258:11: Bye Bye [preauth] Dec 03 22:42:30 np0005544966.novalocal sshd-session[99362]: Disconnected from invalid user ionadmin 189.169.67.183 port 47258 [preauth] Dec 03 22:43:01 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:43:02 np0005544966.novalocal sudo[99389]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:43:02 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:43:02 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:43:02 np0005544966.novalocal systemd[1]: Started Session c298 of User root. Dec 03 22:43:02 np0005544966.novalocal sudo[99389]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:43:02 np0005544966.novalocal sudo[99389]: pam_unix(sudo:session): session closed for user root Dec 03 22:43:02 np0005544966.novalocal systemd[1]: session-c298.scope: Deactivated successfully. Dec 03 22:43:02 np0005544966.novalocal sudo[99394]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:43:02 np0005544966.novalocal systemd[1]: Started Session c299 of User root. Dec 03 22:43:02 np0005544966.novalocal sudo[99394]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:43:02 np0005544966.novalocal sudo[99394]: pam_unix(sudo:session): session closed for user root Dec 03 22:43:02 np0005544966.novalocal systemd[1]: session-c299.scope: Deactivated successfully. Dec 03 22:43:02 np0005544966.novalocal sudo[99398]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:43:02 np0005544966.novalocal systemd[1]: Started Session c300 of User root. Dec 03 22:43:02 np0005544966.novalocal sudo[99398]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:43:03 np0005544966.novalocal sudo[99398]: pam_unix(sudo:session): session closed for user root Dec 03 22:43:03 np0005544966.novalocal systemd[1]: session-c300.scope: Deactivated successfully. Dec 03 22:43:03 np0005544966.novalocal sudo[99402]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:43:03 np0005544966.novalocal systemd[1]: Started Session c301 of User root. Dec 03 22:43:03 np0005544966.novalocal sudo[99402]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:43:03 np0005544966.novalocal sudo[99402]: pam_unix(sudo:session): session closed for user root Dec 03 22:43:03 np0005544966.novalocal systemd[1]: session-c301.scope: Deactivated successfully. Dec 03 22:43:09 np0005544966.novalocal sshd-session[99449]: Invalid user alex from 185.228.135.173 port 15437 Dec 03 22:43:09 np0005544966.novalocal sshd-session[99449]: Received disconnect from 185.228.135.173 port 15437:11: Bye Bye [preauth] Dec 03 22:43:09 np0005544966.novalocal sshd-session[99449]: Disconnected from invalid user alex 185.228.135.173 port 15437 [preauth] Dec 03 22:43:10 np0005544966.novalocal sshd-session[99447]: Received disconnect from 103.19.254.14 port 33298:11: Bye Bye [preauth] Dec 03 22:43:10 np0005544966.novalocal sshd-session[99447]: Disconnected from authenticating user root 103.19.254.14 port 33298 [preauth] Dec 03 22:43:26 np0005544966.novalocal sshd[44935]: Timeout before authentication for connection from 14.103.118.167 to 38.102.83.17, pid = 99239 Dec 03 22:43:41 np0005544966.novalocal sshd-session[99477]: Invalid user odoo17 from 121.52.147.5 port 50442 Dec 03 22:43:41 np0005544966.novalocal sshd-session[99479]: Received disconnect from 189.169.67.183 port 46280:11: Bye Bye [preauth] Dec 03 22:43:41 np0005544966.novalocal sshd-session[99479]: Disconnected from authenticating user root 189.169.67.183 port 46280 [preauth] Dec 03 22:43:42 np0005544966.novalocal sshd-session[99477]: Received disconnect from 121.52.147.5 port 50442:11: Bye Bye [preauth] Dec 03 22:43:42 np0005544966.novalocal sshd-session[99477]: Disconnected from invalid user odoo17 121.52.147.5 port 50442 [preauth] Dec 03 22:44:02 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:44:02 np0005544966.novalocal sudo[99497]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:44:02 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:44:02 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:44:02 np0005544966.novalocal systemd[1]: Started Session c302 of User root. Dec 03 22:44:02 np0005544966.novalocal sudo[99497]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:44:02 np0005544966.novalocal sudo[99497]: pam_unix(sudo:session): session closed for user root Dec 03 22:44:02 np0005544966.novalocal systemd[1]: session-c302.scope: Deactivated successfully. Dec 03 22:44:02 np0005544966.novalocal sudo[99503]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:44:02 np0005544966.novalocal systemd[1]: Started Session c303 of User root. Dec 03 22:44:02 np0005544966.novalocal sudo[99503]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:44:02 np0005544966.novalocal sudo[99503]: pam_unix(sudo:session): session closed for user root Dec 03 22:44:02 np0005544966.novalocal systemd[1]: session-c303.scope: Deactivated successfully. Dec 03 22:44:02 np0005544966.novalocal sudo[99507]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:44:02 np0005544966.novalocal systemd[1]: Started Session c304 of User root. Dec 03 22:44:02 np0005544966.novalocal sudo[99507]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:44:03 np0005544966.novalocal sudo[99507]: pam_unix(sudo:session): session closed for user root Dec 03 22:44:03 np0005544966.novalocal systemd[1]: session-c304.scope: Deactivated successfully. Dec 03 22:44:03 np0005544966.novalocal sudo[99511]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:44:03 np0005544966.novalocal systemd[1]: Started Session c305 of User root. Dec 03 22:44:03 np0005544966.novalocal sudo[99511]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:44:03 np0005544966.novalocal sudo[99511]: pam_unix(sudo:session): session closed for user root Dec 03 22:44:03 np0005544966.novalocal systemd[1]: session-c305.scope: Deactivated successfully. Dec 03 22:44:20 np0005544966.novalocal sshd-session[99567]: Received disconnect from 185.228.135.173 port 17156:11: Bye Bye [preauth] Dec 03 22:44:20 np0005544966.novalocal sshd-session[99567]: Disconnected from authenticating user root 185.228.135.173 port 17156 [preauth] Dec 03 22:44:31 np0005544966.novalocal sshd-session[99572]: Invalid user tech from 103.19.254.14 port 36358 Dec 03 22:44:31 np0005544966.novalocal sshd-session[99572]: Received disconnect from 103.19.254.14 port 36358:11: Bye Bye [preauth] Dec 03 22:44:31 np0005544966.novalocal sshd-session[99572]: Disconnected from invalid user tech 103.19.254.14 port 36358 [preauth] Dec 03 22:44:45 np0005544966.novalocal lvm[99592]: PV /dev/loop3 online, VG lvm-shares is complete. Dec 03 22:44:45 np0005544966.novalocal lvm[99592]: VG lvm-shares finished Dec 03 22:44:45 np0005544966.novalocal kernel: EXT4-fs (dm-6): mounted filesystem 09aa71d0-4bdd-40fd-82b1-ac41e11c1270 r/w with ordered data mode. Quota mode: none. Dec 03 22:44:48 np0005544966.novalocal systemd[1]: var-lib-manila-mnt-share\x2dd793484a\x2d1a85\x2d43a0\x2d9c96\x2dcda650dee112.mount: Deactivated successfully. Dec 03 22:44:48 np0005544966.novalocal kernel: EXT4-fs (dm-6): unmounting filesystem 09aa71d0-4bdd-40fd-82b1-ac41e11c1270. Dec 03 22:44:48 np0005544966.novalocal lvm[99609]: PV /dev/loop3 online, VG lvm-shares is complete. Dec 03 22:44:48 np0005544966.novalocal lvm[99609]: VG lvm-shares finished Dec 03 22:44:50 np0005544966.novalocal sshd-session[99610]: Received disconnect from 189.169.67.183 port 45306:11: Bye Bye [preauth] Dec 03 22:44:50 np0005544966.novalocal sshd-session[99610]: Disconnected from authenticating user root 189.169.67.183 port 45306 [preauth] Dec 03 22:44:57 np0005544966.novalocal sudo[53789]: pam_unix(sudo:session): session closed for user root Dec 03 22:44:58 np0005544966.novalocal sudo[100317]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zyitnaihgfjiydjddeuflqsyvivpkpok ; WORKSPACE=/var/log/weirdo-project /usr/bin/python3' Dec 03 22:44:58 np0005544966.novalocal sudo[100317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:44:58 np0005544966.novalocal python3[100319]: ansible-command Invoked with chdir=/tmp/puppet-openstack creates=/var/log/weirdo-project/logs _raw_params=./copy_logs.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None removes=None stdin=None Dec 03 22:44:59 np0005544966.novalocal sudo[100442]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ceph /var/log/weirdo-project/logs/etc/ Dec 03 22:44:59 np0005544966.novalocal sudo[100442]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:44:59 np0005544966.novalocal sudo[100442]: pam_unix(sudo:session): session closed for user root Dec 03 22:44:59 np0005544966.novalocal sudo[100445]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/cinder /var/log/weirdo-project/logs/etc/ Dec 03 22:44:59 np0005544966.novalocal sudo[100445]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:44:59 np0005544966.novalocal sudo[100445]: pam_unix(sudo:session): session closed for user root Dec 03 22:44:59 np0005544966.novalocal sudo[100448]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/cinder /var/log/weirdo-project/logs Dec 03 22:44:59 np0005544966.novalocal sudo[100448]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:44:59 np0005544966.novalocal sudo[100448]: pam_unix(sudo:session): session closed for user root Dec 03 22:44:59 np0005544966.novalocal sudo[100451]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/glance /var/log/weirdo-project/logs/etc/ Dec 03 22:44:59 np0005544966.novalocal sudo[100451]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:44:59 np0005544966.novalocal sudo[100451]: pam_unix(sudo:session): session closed for user root Dec 03 22:44:59 np0005544966.novalocal sudo[100454]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/glance /var/log/weirdo-project/logs Dec 03 22:44:59 np0005544966.novalocal sudo[100454]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:44:59 np0005544966.novalocal sudo[100454]: pam_unix(sudo:session): session closed for user root Dec 03 22:44:59 np0005544966.novalocal sudo[100457]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/horizon /var/log/weirdo-project/logs Dec 03 22:44:59 np0005544966.novalocal sudo[100457]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:44:59 np0005544966.novalocal sudo[100457]: pam_unix(sudo:session): session closed for user root Dec 03 22:44:59 np0005544966.novalocal sudo[100460]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/keystone /var/log/weirdo-project/logs/etc/ Dec 03 22:44:59 np0005544966.novalocal sudo[100460]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:44:59 np0005544966.novalocal sudo[100460]: pam_unix(sudo:session): session closed for user root Dec 03 22:44:59 np0005544966.novalocal sudo[100463]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/keystone /var/log/weirdo-project/logs Dec 03 22:44:59 np0005544966.novalocal sudo[100463]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:44:59 np0005544966.novalocal sudo[100463]: pam_unix(sudo:session): session closed for user root Dec 03 22:44:59 np0005544966.novalocal sudo[100466]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/manila /var/log/weirdo-project/logs/etc/ Dec 03 22:44:59 np0005544966.novalocal sudo[100466]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:44:59 np0005544966.novalocal sudo[100466]: pam_unix(sudo:session): session closed for user root Dec 03 22:44:59 np0005544966.novalocal sudo[100469]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/manila /var/log/weirdo-project/logs Dec 03 22:44:59 np0005544966.novalocal sudo[100469]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:44:59 np0005544966.novalocal sudo[100469]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:45:00 np0005544966.novalocal sudo[100472]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/neutron /var/log/weirdo-project/logs/etc/ Dec 03 22:45:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:45:00 np0005544966.novalocal sudo[100472]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:45:00 np0005544966.novalocal sudo[100472]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100476]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/neutron /var/log/weirdo-project/logs Dec 03 22:45:00 np0005544966.novalocal sudo[100476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100476]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100479]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/nova /var/log/weirdo-project/logs/etc/ Dec 03 22:45:00 np0005544966.novalocal sudo[100479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100479]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100482]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/nova /var/log/weirdo-project/logs Dec 03 22:45:00 np0005544966.novalocal sudo[100482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100482]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100485]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/octavia /var/log/weirdo-project/logs/etc/ Dec 03 22:45:00 np0005544966.novalocal sudo[100485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100485]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100488]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/octavia /var/log/weirdo-project/logs Dec 03 22:45:00 np0005544966.novalocal sudo[100488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100488]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100491]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ovn /var/log/weirdo-project/logs/etc/ Dec 03 22:45:00 np0005544966.novalocal sudo[100491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100491]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100494]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/ovn /var/log/weirdo-project/logs Dec 03 22:45:00 np0005544966.novalocal sudo[100494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100494]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100497]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/placement /var/log/weirdo-project/logs/etc/ Dec 03 22:45:00 np0005544966.novalocal sudo[100497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100497]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100500]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/placement /var/log/weirdo-project/logs Dec 03 22:45:00 np0005544966.novalocal sudo[100500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100500]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100503]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/tempest /var/log/weirdo-project/logs/etc/ Dec 03 22:45:00 np0005544966.novalocal sudo[100503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100503]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100506]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/puppet/puppet.conf /var/log/weirdo-project/logs/ Dec 03 22:45:00 np0005544966.novalocal sudo[100506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100506]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100510]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/journalctl --no-pager Dec 03 22:45:00 np0005544966.novalocal sudo[100510]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100510]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100513]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rsyslog.d /var/log/weirdo-project/logs/etc/ Dec 03 22:45:00 np0005544966.novalocal sudo[100513]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100513]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100516]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyslog.conf /var/log/weirdo-project/logs/etc/ Dec 03 22:45:00 np0005544966.novalocal sudo[100516]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100516]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100519]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/network-scripts /var/log/weirdo-project/logs/etc/sysconfig/ Dec 03 22:45:00 np0005544966.novalocal sudo[100519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100519]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100522]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rabbitmq /var/log/weirdo-project/logs/etc/ Dec 03 22:45:00 np0005544966.novalocal sudo[100522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100522]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100525]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/rabbitmq /var/log/weirdo-project/logs Dec 03 22:45:00 np0005544966.novalocal sudo[100525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100525]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100528]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/my.cnf /var/log/weirdo-project/logs/etc/ Dec 03 22:45:00 np0005544966.novalocal sudo[100528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100528]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100531]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/my.cnf.d /var/log/weirdo-project/logs/etc/ Dec 03 22:45:00 np0005544966.novalocal sudo[100531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100531]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100534]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/mariadb /var/log/weirdo-project/logs/ Dec 03 22:45:00 np0005544966.novalocal sudo[100534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100534]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100537]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/iscsi /var/log/weirdo-project/logs/etc/ Dec 03 22:45:00 np0005544966.novalocal sudo[100537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100537]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100540]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/tempest.log /var/log/weirdo-project/logs/ Dec 03 22:45:00 np0005544966.novalocal sudo[100540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:00 np0005544966.novalocal sudo[100540]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:00 np0005544966.novalocal sudo[100543]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testrepository.subunit /var/log/weirdo-project/logs/testrepository.subunit Dec 03 22:45:00 np0005544966.novalocal sudo[100543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100543]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100546]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testr_results.html /var/log/weirdo-project/logs/testr_results.html Dec 03 22:45:01 np0005544966.novalocal sudo[100546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100546]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100549]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dstat.log /var/log/weirdo-project/logs/ Dec 03 22:45:01 np0005544966.novalocal sudo[100549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100549]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100552]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iostat.log /var/log/weirdo-project/logs/ Dec 03 22:45:01 np0005544966.novalocal sudo[100552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100552]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100555]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iotop.log /var/log/weirdo-project/logs/ Dec 03 22:45:01 np0005544966.novalocal sudo[100555]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100555]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100558]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/libvirt /var/log/weirdo-project/logs/ Dec 03 22:45:01 np0005544966.novalocal sudo[100558]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100558]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100561]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/virsh net-list --all Dec 03 22:45:01 np0005544966.novalocal sudo[100561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal virtqemud[92372]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Dec 03 22:45:01 np0005544966.novalocal sudo[100561]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100565]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/libvirt /var/log/weirdo-project/logs/etc/ Dec 03 22:45:01 np0005544966.novalocal sudo[100565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100565]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100568]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig Dec 03 22:45:01 np0005544966.novalocal sudo[100568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100568]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100571]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openvswitch /var/log/weirdo-project/logs/etc/ Dec 03 22:45:01 np0005544966.novalocal sudo[100571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100571]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100574]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/openvswitch /var/log/weirdo-project/logs/ Dec 03 22:45:01 np0005544966.novalocal sudo[100574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100574]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100578]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Dec 03 22:45:01 np0005544966.novalocal sudo[100578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100578]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100581]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Dec 03 22:45:01 np0005544966.novalocal sudo[100581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100581]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100584]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-ssl Dec 03 22:45:01 np0005544966.novalocal sudo[100584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100584]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100587]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Dec 03 22:45:01 np0005544966.novalocal sudo[100587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100587]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100590]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Dec 03 22:45:01 np0005544966.novalocal sudo[100590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100590]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100593]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-ssl Dec 03 22:45:01 np0005544966.novalocal sudo[100593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100593]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100596]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ Dec 03 22:45:01 np0005544966.novalocal sudo[100596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100596]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100599]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ Dec 03 22:45:01 np0005544966.novalocal sudo[100599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100599]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100602]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sudoers.d /var/log/weirdo-project/logs/ Dec 03 22:45:01 np0005544966.novalocal sudo[100602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100602]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100605]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sudoers /var/log/weirdo-project/logs/sudoers.txt Dec 03 22:45:01 np0005544966.novalocal sudo[100605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100605]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100609]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/magic /etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ Dec 03 22:45:01 np0005544966.novalocal sudo[100609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:01 np0005544966.novalocal sudo[100609]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:01 np0005544966.novalocal sudo[100611]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:45:02 np0005544966.novalocal systemd[1]: Started Session c306 of User root. Dec 03 22:45:02 np0005544966.novalocal sudo[100614]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.d/10-cinder_wsgi.conf /etc/httpd/conf.d/10-glance_wsgi.conf /etc/httpd/conf.d/10-keystone_wsgi.conf /etc/httpd/conf.d/10-manila_wsgi.conf /etc/httpd/conf.d/10-nova_api_wsgi.conf /etc/httpd/conf.d/10-nova_metadata_wsgi.conf /etc/httpd/conf.d/10-octavia_wsgi.conf /etc/httpd/conf.d/10-placement_wsgi.conf /etc/httpd/conf.d/15-horizon_ssl_vhost.conf /etc/httpd/conf.d/15-horizon_vhost.conf /etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/ Dec 03 22:45:02 np0005544966.novalocal sudo[100611]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:45:02 np0005544966.novalocal sudo[100614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100614]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100620]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.modules.d/alias.conf /etc/httpd/conf.modules.d/alias.load /etc/httpd/conf.modules.d/authz_core.load /etc/httpd/conf.modules.d/authz_host.load /etc/httpd/conf.modules.d/filter.load /etc/httpd/conf.modules.d/log_config.load /etc/httpd/conf.modules.d/mime.conf /etc/httpd/conf.modules.d/mime.load /etc/httpd/conf.modules.d/prefork.conf /etc/httpd/conf.modules.d/prefork.load /etc/httpd/conf.modules.d/setenvif.conf /etc/httpd/conf.modules.d/setenvif.load /etc/httpd/conf.modules.d/socache_shmcb.load /etc/httpd/conf.modules.d/ssl.conf /etc/httpd/conf.modules.d/ssl.load /etc/httpd/conf.modules.d/systemd.load /etc/httpd/conf.modules.d/unixd.load /etc/httpd/conf.modules.d/wsgi.conf /etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ Dec 03 22:45:02 np0005544966.novalocal sudo[100620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100620]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100623]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/httpd /var/log/weirdo-project/logs/apache Dec 03 22:45:02 np0005544966.novalocal sudo[100623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100623]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100626]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/redis /var/log/weirdo-project/logs/ Dec 03 22:45:02 np0005544966.novalocal sudo[100626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100626]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100629]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/redis /var/log/weirdo-project/logs/etc/ Dec 03 22:45:02 np0005544966.novalocal sudo[100629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100629]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100632]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/audit/audit.log /var/log/weirdo-project/logs/audit.log.txt Dec 03 22:45:02 np0005544966.novalocal sudo[100632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100632]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100635]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/spool/cron /var/log/weirdo-project/logs/ Dec 03 22:45:02 np0005544966.novalocal sudo[100635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100635]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100638]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/etc/tempest.conf /var/log/weirdo-project/logs/tempest.conf.txt Dec 03 22:45:02 np0005544966.novalocal sudo[100638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100638]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100641]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack-dashboard /var/log/weirdo-project/logs/etc/openstack-dashboard Dec 03 22:45:02 np0005544966.novalocal sudo[100641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100641]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100646]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt Dec 03 22:45:02 np0005544966.novalocal sudo[100646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100646]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100649]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt Dec 03 22:45:02 np0005544966.novalocal sudo[100649]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100649]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100652]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt Dec 03 22:45:02 np0005544966.novalocal sudo[100652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100652]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100655]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt Dec 03 22:45:02 np0005544966.novalocal sudo[100655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100655]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100658]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt Dec 03 22:45:02 np0005544966.novalocal sudo[100658]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100658]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100611]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal systemd[1]: session-c306.scope: Deactivated successfully. Dec 03 22:45:02 np0005544966.novalocal sudo[100661]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt Dec 03 22:45:02 np0005544966.novalocal sudo[100661]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100661]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100662]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:45:02 np0005544966.novalocal systemd[1]: Started Session c307 of User root. Dec 03 22:45:02 np0005544966.novalocal sudo[100666]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt Dec 03 22:45:02 np0005544966.novalocal sudo[100662]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:45:02 np0005544966.novalocal sudo[100666]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100666]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100670]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt Dec 03 22:45:02 np0005544966.novalocal sudo[100670]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100670]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100673]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt Dec 03 22:45:02 np0005544966.novalocal sudo[100673]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100673]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100676]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt Dec 03 22:45:02 np0005544966.novalocal sudo[100676]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100676]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100679]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt Dec 03 22:45:02 np0005544966.novalocal sudo[100679]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100679]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100682]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt Dec 03 22:45:02 np0005544966.novalocal sudo[100682]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100682]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100686]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf Dec 03 22:45:02 np0005544966.novalocal sudo[100686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:02 np0005544966.novalocal sudo[100686]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal sudo[100662]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:02 np0005544966.novalocal systemd[1]: session-c307.scope: Deactivated successfully. Dec 03 22:45:02 np0005544966.novalocal sudo[100694]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:45:02 np0005544966.novalocal systemd[1]: Started Session c308 of User root. Dec 03 22:45:02 np0005544966.novalocal sudo[100694]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:45:03 np0005544966.novalocal sudo[100698]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf repolist -v Dec 03 22:45:03 np0005544966.novalocal sudo[100698]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:03 np0005544966.novalocal sudo[100694]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:03 np0005544966.novalocal systemd[1]: session-c308.scope: Deactivated successfully. Dec 03 22:45:03 np0005544966.novalocal sudo[100702]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:45:03 np0005544966.novalocal systemd[1]: Started Session c309 of User root. Dec 03 22:45:03 np0005544966.novalocal sudo[100702]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:45:03 np0005544966.novalocal sudo[100702]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:03 np0005544966.novalocal systemd[1]: session-c309.scope: Deactivated successfully. Dec 03 22:45:04 np0005544966.novalocal sudo[100698]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:04 np0005544966.novalocal sudo[100710]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf list installed Dec 03 22:45:04 np0005544966.novalocal sudo[100710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:04 np0005544966.novalocal sshd-session[100705]: Invalid user david from 121.52.147.5 port 43276 Dec 03 22:45:05 np0005544966.novalocal sshd-session[100705]: Received disconnect from 121.52.147.5 port 43276:11: Bye Bye [preauth] Dec 03 22:45:05 np0005544966.novalocal sshd-session[100705]: Disconnected from invalid user david 121.52.147.5 port 43276 [preauth] Dec 03 22:45:05 np0005544966.novalocal sudo[100710]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:05 np0005544966.novalocal sudo[100713]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf module list Dec 03 22:45:05 np0005544966.novalocal sudo[100713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:06 np0005544966.novalocal sudo[100713]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:06 np0005544966.novalocal sudo[100716]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/yum.repos.d /var/log/weirdo-project/logs/etc/yum.repos.d Dec 03 22:45:06 np0005544966.novalocal sudo[100716]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:06 np0005544966.novalocal sudo[100716]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:06 np0005544966.novalocal sudo[100720]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.log /var/log/weirdo-project/logs/dnf Dec 03 22:45:06 np0005544966.novalocal sudo[100720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:06 np0005544966.novalocal sudo[100720]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:06 np0005544966.novalocal sudo[100723]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.rpm.log /var/log/weirdo-project/logs/dnf Dec 03 22:45:06 np0005544966.novalocal sudo[100723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:06 np0005544966.novalocal sudo[100723]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:07 np0005544966.novalocal sudo[100729]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/passwd /var/log/weirdo-project/logs/etc Dec 03 22:45:07 np0005544966.novalocal sudo[100729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:07 np0005544966.novalocal sudo[100729]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:07 np0005544966.novalocal sudo[100732]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/group /var/log/weirdo-project/logs/etc Dec 03 22:45:07 np0005544966.novalocal sudo[100732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:07 np0005544966.novalocal sudo[100732]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:07 np0005544966.novalocal sudo[100735]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack /var/log/weirdo-project/logs/etc Dec 03 22:45:07 np0005544966.novalocal sudo[100735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:07 np0005544966.novalocal sudo[100735]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:07 np0005544966.novalocal sudo[100738]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml Dec 03 22:45:07 np0005544966.novalocal sudo[100738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:07 np0005544966.novalocal sudo[100738]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:07 np0005544966.novalocal sudo[100745]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ps -eo user,pid,ppid,lwp,%cpu,%mem,size,rss,cmd Dec 03 22:45:07 np0005544966.novalocal sudo[100745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:07 np0005544966.novalocal sudo[100745]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:07 np0005544966.novalocal sudo[100748]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/ip -d address Dec 03 22:45:07 np0005544966.novalocal sudo[100748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:07 np0005544966.novalocal sudo[100748]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:07 np0005544966.novalocal sudo[100754]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl show Dec 03 22:45:07 np0005544966.novalocal sudo[100754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:07 np0005544966.novalocal sudo[100754]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:07 np0005544966.novalocal sudo[100757]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl list open_vswitch Dec 03 22:45:07 np0005544966.novalocal sudo[100757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:07 np0005544966.novalocal sudo[100757]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:07 np0005544966.novalocal sudo[100761]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Dec 03 22:45:07 np0005544966.novalocal sudo[100761]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:07 np0005544966.novalocal sudo[100761]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:07 np0005544966.novalocal sudo[100765]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Dec 03 22:45:07 np0005544966.novalocal sudo[100765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:07 np0005544966.novalocal sudo[100765]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:07 np0005544966.novalocal sudo[100768]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/netstat -tulpn Dec 03 22:45:07 np0005544966.novalocal sudo[100768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:07 np0005544966.novalocal sudo[100768]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:07 np0005544966.novalocal sudo[100771]: root : PWD=/tmp/puppet-openstack ; USER=root ; ENV=LC_CTYPE=C SYSTEMD_COLORS=false ; COMMAND=/bin/systemctl status --all --no-pager Dec 03 22:45:07 np0005544966.novalocal sudo[100771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:10 np0005544966.novalocal sudo[100771]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:10 np0005544966.novalocal sudo[100810]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t raw -vnxL Dec 03 22:45:10 np0005544966.novalocal sudo[100810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:10 np0005544966.novalocal sudo[100810]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:10 np0005544966.novalocal sudo[100813]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t filter -vnxL Dec 03 22:45:10 np0005544966.novalocal sudo[100813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:10 np0005544966.novalocal sudo[100813]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:10 np0005544966.novalocal sudo[100816]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t nat -vnxL Dec 03 22:45:10 np0005544966.novalocal sudo[100816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:10 np0005544966.novalocal sudo[100816]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:10 np0005544966.novalocal sudo[100819]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t mangle -vnxL Dec 03 22:45:10 np0005544966.novalocal sudo[100819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:10 np0005544966.novalocal sudo[100819]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:10 np0005544966.novalocal sudo[100822]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/fstab /var/log/weirdo-project/logs/etc/ Dec 03 22:45:10 np0005544966.novalocal sudo[100822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:10 np0005544966.novalocal sudo[100822]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:10 np0005544966.novalocal sudo[100825]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mount Dec 03 22:45:10 np0005544966.novalocal sudo[100825]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:10 np0005544966.novalocal sudo[100825]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:10 np0005544966.novalocal sudo[100828]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/losetup -al Dec 03 22:45:10 np0005544966.novalocal sudo[100828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:10 np0005544966.novalocal sudo[100828]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:10 np0005544966.novalocal sudo[100831]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/pvs Dec 03 22:45:10 np0005544966.novalocal sudo[100831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:10 np0005544966.novalocal sudo[100831]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:10 np0005544966.novalocal sudo[100834]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/vgs Dec 03 22:45:10 np0005544966.novalocal sudo[100834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:10 np0005544966.novalocal sudo[100834]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:10 np0005544966.novalocal sudo[100837]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/lvs Dec 03 22:45:10 np0005544966.novalocal sudo[100837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:10 np0005544966.novalocal sudo[100837]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:10 np0005544966.novalocal sudo[100841]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/semanage boolean --list Dec 03 22:45:10 np0005544966.novalocal sudo[100841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:11 np0005544966.novalocal sudo[100841]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:16 np0005544966.novalocal sudo[100849]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_cells --verbose Dec 03 22:45:16 np0005544966.novalocal sudo[100849]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Dec 03 22:45:18 np0005544966.novalocal sudo[100849]: pam_unix(sudo:session): session closed for user nova Dec 03 22:45:18 np0005544966.novalocal sudo[100853]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_hosts Dec 03 22:45:18 np0005544966.novalocal sudo[100853]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Dec 03 22:45:21 np0005544966.novalocal sudo[100853]: pam_unix(sudo:session): session closed for user nova Dec 03 22:45:33 np0005544966.novalocal sudo[100867]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type d -execdir sudo chmod 755 {} ; Dec 03 22:45:33 np0005544966.novalocal sudo[100867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100870]: root : PWD=/var/log/weirdo-project ; USER=root ; COMMAND=/bin/chmod 755 ./logs Dec 03 22:45:33 np0005544966.novalocal sudo[100870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100870]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100873]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./etc Dec 03 22:45:33 np0005544966.novalocal sudo[100873]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100873]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100876]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./sysconfig Dec 03 22:45:33 np0005544966.novalocal sudo[100876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100876]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100879]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 755 ./network-scripts Dec 03 22:45:33 np0005544966.novalocal sudo[100879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100879]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100882]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ceph Dec 03 22:45:33 np0005544966.novalocal sudo[100882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100882]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100885]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Dec 03 22:45:33 np0005544966.novalocal sudo[100885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100885]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100888]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Dec 03 22:45:33 np0005544966.novalocal sudo[100888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100888]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100891]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./volumes Dec 03 22:45:33 np0005544966.novalocal sudo[100891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100891]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100894]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 03 22:45:33 np0005544966.novalocal sudo[100894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100894]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100897]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 03 22:45:33 np0005544966.novalocal sudo[100897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100897]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100900]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./glance Dec 03 22:45:33 np0005544966.novalocal sudo[100900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100900]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100903]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 03 22:45:33 np0005544966.novalocal sudo[100903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100903]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100906]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 03 22:45:33 np0005544966.novalocal sudo[100906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100906]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100909]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./metadefs Dec 03 22:45:33 np0005544966.novalocal sudo[100909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100909]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100912]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Dec 03 22:45:33 np0005544966.novalocal sudo[100912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100912]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100915]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Dec 03 22:45:33 np0005544966.novalocal sudo[100915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100915]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:33 np0005544966.novalocal sudo[100918]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./fernet-keys Dec 03 22:45:33 np0005544966.novalocal sudo[100918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:33 np0005544966.novalocal sudo[100918]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100921]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./credential-keys Dec 03 22:45:34 np0005544966.novalocal sudo[100921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100921]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100925]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 03 22:45:34 np0005544966.novalocal sudo[100925]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100925]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100929]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 03 22:45:34 np0005544966.novalocal sudo[100929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100929]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100932]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./policy.d Dec 03 22:45:34 np0005544966.novalocal sudo[100932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100932]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100935]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./manila Dec 03 22:45:34 np0005544966.novalocal sudo[100935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100935]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100938]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 03 22:45:34 np0005544966.novalocal sudo[100938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100938]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100941]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 03 22:45:34 np0005544966.novalocal sudo[100941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100941]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100944]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Dec 03 22:45:34 np0005544966.novalocal sudo[100944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100944]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100947]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 03 22:45:34 np0005544966.novalocal sudo[100947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100947]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100950]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 03 22:45:34 np0005544966.novalocal sudo[100950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100950]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100953]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./kill_scripts Dec 03 22:45:34 np0005544966.novalocal sudo[100953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100953]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100956]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Dec 03 22:45:34 np0005544966.novalocal sudo[100956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100956]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100959]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-dhcp-agent Dec 03 22:45:34 np0005544966.novalocal sudo[100959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100959]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100962]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-l3-agent Dec 03 22:45:34 np0005544966.novalocal sudo[100962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100962]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100965]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-linuxbridge-cleanup Dec 03 22:45:34 np0005544966.novalocal sudo[100965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100965]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100968]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-metadata-agent Dec 03 22:45:34 np0005544966.novalocal sudo[100968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100968]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100971]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-vpn-agent Dec 03 22:45:34 np0005544966.novalocal sudo[100971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100971]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100974]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-netns-cleanup Dec 03 22:45:34 np0005544966.novalocal sudo[100974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100974]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100977]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovs-cleanup Dec 03 22:45:34 np0005544966.novalocal sudo[100977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100977]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100980]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-server Dec 03 22:45:34 np0005544966.novalocal sudo[100980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100980]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100983]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovn-agent Dec 03 22:45:34 np0005544966.novalocal sudo[100983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100983]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100986]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Dec 03 22:45:34 np0005544966.novalocal sudo[100986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100986]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100989]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./plugins Dec 03 22:45:34 np0005544966.novalocal sudo[100989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100989]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100992]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./ml2 Dec 03 22:45:34 np0005544966.novalocal sudo[100992]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100992]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100995]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./networking-ovn Dec 03 22:45:34 np0005544966.novalocal sudo[100995]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100995]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:34 np0005544966.novalocal sudo[100998]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./nova Dec 03 22:45:34 np0005544966.novalocal sudo[100998]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:34 np0005544966.novalocal sudo[100998]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101001]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 03 22:45:35 np0005544966.novalocal sudo[101001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101001]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101004]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 03 22:45:35 np0005544966.novalocal sudo[101004]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101004]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101007]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Dec 03 22:45:35 np0005544966.novalocal sudo[101007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101007]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101010]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./certs Dec 03 22:45:35 np0005544966.novalocal sudo[101010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101010]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101013]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Dec 03 22:45:35 np0005544966.novalocal sudo[101013]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101013]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101016]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-driver-agent Dec 03 22:45:35 np0005544966.novalocal sudo[101016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101016]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101019]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-health-manager Dec 03 22:45:35 np0005544966.novalocal sudo[101019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101019]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101022]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Dec 03 22:45:35 np0005544966.novalocal sudo[101022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101022]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101025]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-worker Dec 03 22:45:35 np0005544966.novalocal sudo[101025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101025]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101028]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-housekeeping Dec 03 22:45:35 np0005544966.novalocal sudo[101028]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101028]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101031]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-api Dec 03 22:45:35 np0005544966.novalocal sudo[101031]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101031]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101034]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 03 22:45:35 np0005544966.novalocal sudo[101034]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101034]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101037]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 03 22:45:35 np0005544966.novalocal sudo[101037]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101037]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101040]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Dec 03 22:45:35 np0005544966.novalocal sudo[101040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101040]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101043]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./placement Dec 03 22:45:35 np0005544966.novalocal sudo[101043]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101043]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101046]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 03 22:45:35 np0005544966.novalocal sudo[101046]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101046]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101049]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 03 22:45:35 np0005544966.novalocal sudo[101049]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101049]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101052]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./tempest Dec 03 22:45:35 np0005544966.novalocal sudo[101052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101052]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101055]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rsyslog.d Dec 03 22:45:35 np0005544966.novalocal sudo[101055]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101055]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101058]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Dec 03 22:45:35 np0005544966.novalocal sudo[101058]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101058]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101061]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 03 22:45:35 np0005544966.novalocal sudo[101061]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101061]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101064]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 03 22:45:35 np0005544966.novalocal sudo[101064]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101064]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101067]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./my.cnf.d Dec 03 22:45:35 np0005544966.novalocal sudo[101067]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101067]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101070]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./iscsi Dec 03 22:45:35 np0005544966.novalocal sudo[101070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101070]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:35 np0005544966.novalocal sudo[101073]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Dec 03 22:45:35 np0005544966.novalocal sudo[101073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:35 np0005544966.novalocal sudo[101073]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101076]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./storage Dec 03 22:45:36 np0005544966.novalocal sudo[101076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101076]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101079]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/storage ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Dec 03 22:45:36 np0005544966.novalocal sudo[101079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101079]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101082]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Dec 03 22:45:36 np0005544966.novalocal sudo[101082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101082]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101085]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./networks Dec 03 22:45:36 np0005544966.novalocal sudo[101085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101085]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101088]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Dec 03 22:45:36 np0005544966.novalocal sudo[101088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101088]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101091]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Dec 03 22:45:36 np0005544966.novalocal sudo[101091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101091]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101094]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./secrets Dec 03 22:45:36 np0005544966.novalocal sudo[101094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101094]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101097]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./nwfilter Dec 03 22:45:36 np0005544966.novalocal sudo[101097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101097]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101100]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Dec 03 22:45:36 np0005544966.novalocal sudo[101100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101100]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101103]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./httpd Dec 03 22:45:36 np0005544966.novalocal sudo[101103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101103]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101106]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf Dec 03 22:45:36 np0005544966.novalocal sudo[101106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101106]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101109]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Dec 03 22:45:36 np0005544966.novalocal sudo[101109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101109]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101112]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.modules.d Dec 03 22:45:36 np0005544966.novalocal sudo[101112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101112]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101115]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./redis Dec 03 22:45:36 np0005544966.novalocal sudo[101115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101115]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101118]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 03 22:45:36 np0005544966.novalocal sudo[101118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101118]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101121]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 03 22:45:36 np0005544966.novalocal sudo[101121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101121]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101124]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack-dashboard Dec 03 22:45:36 np0005544966.novalocal sudo[101124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101124]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101127]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./default_policies.txt Dec 03 22:45:36 np0005544966.novalocal sudo[101127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101127]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101130]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./enabled.txt Dec 03 22:45:36 np0005544966.novalocal sudo[101130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101130]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101133]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./local_settings.d.txt Dec 03 22:45:36 np0005544966.novalocal sudo[101133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101133]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101136]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./nova_policy.d.txt Dec 03 22:45:36 np0005544966.novalocal sudo[101136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101136]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101139]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./ssl.txt Dec 03 22:45:36 np0005544966.novalocal sudo[101139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101139]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101142]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 03 22:45:36 np0005544966.novalocal sudo[101142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101142]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101145]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./yum.repos.d Dec 03 22:45:36 np0005544966.novalocal sudo[101145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101145]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101148]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack Dec 03 22:45:36 np0005544966.novalocal sudo[101148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:36 np0005544966.novalocal sudo[101148]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:36 np0005544966.novalocal sudo[101151]: root : PWD=/var/log/weirdo-project/logs/etc/openstack ; USER=root ; COMMAND=/bin/chmod 755 ./puppet Dec 03 22:45:36 np0005544966.novalocal sudo[101151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101151]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101154]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Dec 03 22:45:37 np0005544966.novalocal sudo[101154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101154]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101157]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./glance Dec 03 22:45:37 np0005544966.novalocal sudo[101157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101157]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101160]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./horizon Dec 03 22:45:37 np0005544966.novalocal sudo[101160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101160]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101163]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Dec 03 22:45:37 np0005544966.novalocal sudo[101163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101163]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101166]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./manila Dec 03 22:45:37 np0005544966.novalocal sudo[101166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101166]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101169]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Dec 03 22:45:37 np0005544966.novalocal sudo[101169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101169]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101172]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./nova Dec 03 22:45:37 np0005544966.novalocal sudo[101172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101172]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101175]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Dec 03 22:45:37 np0005544966.novalocal sudo[101175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101175]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101178]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Dec 03 22:45:37 np0005544966.novalocal sudo[101178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101178]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101183]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./placement Dec 03 22:45:37 np0005544966.novalocal sudo[101183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101183]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101186]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Dec 03 22:45:37 np0005544966.novalocal sudo[101186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101186]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101189]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./mariadb Dec 03 22:45:37 np0005544966.novalocal sudo[101189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101189]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101192]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Dec 03 22:45:37 np0005544966.novalocal sudo[101192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101192]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101195]: root : PWD=/var/log/weirdo-project/logs/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Dec 03 22:45:37 np0005544966.novalocal sudo[101195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101195]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101198]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Dec 03 22:45:37 np0005544966.novalocal sudo[101198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101198]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101201]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./sudoers.d Dec 03 22:45:37 np0005544966.novalocal sudo[101201]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101201]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101204]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./apache Dec 03 22:45:37 np0005544966.novalocal sudo[101204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101204]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101207]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./redis Dec 03 22:45:37 np0005544966.novalocal sudo[101207]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101207]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101210]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cron Dec 03 22:45:37 np0005544966.novalocal sudo[101210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101210]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101213]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./dnf Dec 03 22:45:37 np0005544966.novalocal sudo[101213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101213]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101216]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openstack_resources Dec 03 22:45:37 np0005544966.novalocal sudo[101216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101216]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[100867]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101219]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type f -execdir sudo chmod 644 {} ; Dec 03 22:45:37 np0005544966.novalocal sudo[101219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101222]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20251203_222725.log Dec 03 22:45:37 np0005544966.novalocal sudo[101222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101222]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101225]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20251203_223020.log Dec 03 22:45:37 np0005544966.novalocal sudo[101225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101225]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101228]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-loop1 Dec 03 22:45:37 np0005544966.novalocal sudo[101228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101228]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101231]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-br-ex Dec 03 22:45:37 np0005544966.novalocal sudo[101231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:37 np0005544966.novalocal sudo[101231]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:37 np0005544966.novalocal sudo[101234]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-eth0 Dec 03 22:45:38 np0005544966.novalocal sudo[101234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101234]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101237]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./readme-ifcfg-rh.txt Dec 03 22:45:38 np0005544966.novalocal sudo[101237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101237]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101240]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-lo Dec 03 22:45:38 np0005544966.novalocal sudo[101240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101240]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101243]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown Dec 03 22:45:38 np0005544966.novalocal sudo[101243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101243]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101246]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-eth Dec 03 22:45:38 np0005544966.novalocal sudo[101246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101246]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101249]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ipv6 Dec 03 22:45:38 np0005544966.novalocal sudo[101249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101249]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101252]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ovs Dec 03 22:45:38 np0005544966.novalocal sudo[101252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101252]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101255]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-post Dec 03 22:45:38 np0005544966.novalocal sudo[101255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101255]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101258]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-routes Dec 03 22:45:38 np0005544966.novalocal sudo[101258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101258]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101261]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-tunnel Dec 03 22:45:38 np0005544966.novalocal sudo[101261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101261]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101264]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup Dec 03 22:45:38 np0005544966.novalocal sudo[101264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101264]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101267]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-aliases Dec 03 22:45:38 np0005544966.novalocal sudo[101267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101267]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sshd-session[101180]: Received disconnect from 185.228.135.173 port 4570:11: Bye Bye [preauth] Dec 03 22:45:38 np0005544966.novalocal sshd-session[101180]: Disconnected from authenticating user root 185.228.135.173 port 4570 [preauth] Dec 03 22:45:38 np0005544966.novalocal sudo[101270]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-eth Dec 03 22:45:38 np0005544966.novalocal sudo[101270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101270]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101273]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ipv6 Dec 03 22:45:38 np0005544966.novalocal sudo[101273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101273]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101276]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ovs Dec 03 22:45:38 np0005544966.novalocal sudo[101276]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101276]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101279]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-post Dec 03 22:45:38 np0005544966.novalocal sudo[101279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101279]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101282]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-routes Dec 03 22:45:38 np0005544966.novalocal sudo[101282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101282]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101285]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-tunnel Dec 03 22:45:38 np0005544966.novalocal sudo[101285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101285]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101288]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./init.ipv6-global Dec 03 22:45:38 np0005544966.novalocal sudo[101288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101288]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101291]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions Dec 03 22:45:38 np0005544966.novalocal sudo[101291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101291]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101294]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions-ipv6 Dec 03 22:45:38 np0005544966.novalocal sudo[101294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101294]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101297]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-guests Dec 03 22:45:38 np0005544966.novalocal sudo[101297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101297]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101300]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd Dec 03 22:45:38 np0005544966.novalocal sudo[101300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101300]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101303]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller Dec 03 22:45:38 np0005544966.novalocal sudo[101303]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101303]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101306]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Dec 03 22:45:38 np0005544966.novalocal sudo[101306]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101306]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101309]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.conf Dec 03 22:45:38 np0005544966.novalocal sudo[101309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101309]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101312]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./resource_filters.json Dec 03 22:45:38 np0005544966.novalocal sudo[101312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:38 np0005544966.novalocal sudo[101312]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:38 np0005544966.novalocal sudo[101315]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Dec 03 22:45:38 np0005544966.novalocal sudo[101315]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101315]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101318]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005544966.novalocal.pem Dec 03 22:45:39 np0005544966.novalocal sudo[101318]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101318]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101321]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 03 22:45:39 np0005544966.novalocal sudo[101321]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101321]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101324]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005544966.novalocal.pem Dec 03 22:45:39 np0005544966.novalocal sudo[101324]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101324]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101327]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api-paste.ini Dec 03 22:45:39 np0005544966.novalocal sudo[101327]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101327]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101330]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api.conf Dec 03 22:45:39 np0005544966.novalocal sudo[101330]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101330]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101333]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-cache.conf Dec 03 22:45:39 np0005544966.novalocal sudo[101333]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101333]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101336]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-image-import.conf Dec 03 22:45:39 np0005544966.novalocal sudo[101336]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101336]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101339]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-scrubber.conf Dec 03 22:45:39 np0005544966.novalocal sudo[101339]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101339]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101342]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-swift.conf Dec 03 22:45:39 np0005544966.novalocal sudo[101342]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101342]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101345]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Dec 03 22:45:39 np0005544966.novalocal sudo[101345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101345]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101348]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./schema-image.json Dec 03 22:45:39 np0005544966.novalocal sudo[101348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101348]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101351]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 03 22:45:39 np0005544966.novalocal sudo[101351]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101351]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101354]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-hypervisor.json Dec 03 22:45:39 np0005544966.novalocal sudo[101354]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101354]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101357]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-instance-data.json Dec 03 22:45:39 np0005544966.novalocal sudo[101357]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101357]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101360]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt-image.json Dec 03 22:45:39 np0005544966.novalocal sudo[101360]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101360]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101363]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt.json Dec 03 22:45:39 np0005544966.novalocal sudo[101363]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101363]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101366]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-quota.json Dec 03 22:45:39 np0005544966.novalocal sudo[101366]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101366]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101369]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-randomgen.json Dec 03 22:45:39 np0005544966.novalocal sudo[101369]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101369]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101372]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vcputopology.json Dec 03 22:45:39 np0005544966.novalocal sudo[101372]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101372]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101375]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-flavor.json Dec 03 22:45:39 np0005544966.novalocal sudo[101375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101375]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101378]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-quota-flavor.json Dec 03 22:45:39 np0005544966.novalocal sudo[101378]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101378]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101381]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware.json Dec 03 22:45:39 np0005544966.novalocal sudo[101381]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101381]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101384]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm-hw.json Dec 03 22:45:39 np0005544966.novalocal sudo[101384]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101384]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101387]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm.json Dec 03 22:45:39 np0005544966.novalocal sudo[101387]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101387]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:39 np0005544966.novalocal sudo[101390]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-watchdog.json Dec 03 22:45:39 np0005544966.novalocal sudo[101390]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:39 np0005544966.novalocal sudo[101390]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101393]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-xenapi.json Dec 03 22:45:40 np0005544966.novalocal sudo[101393]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101393]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101396]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./glance-common-image-props.json Dec 03 22:45:40 np0005544966.novalocal sudo[101396]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101396]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101399]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./image-signature-verification.json Dec 03 22:45:40 np0005544966.novalocal sudo[101399]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101399]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101402]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./operating-system.json Dec 03 22:45:40 np0005544966.novalocal sudo[101402]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101402]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101405]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-databases.json Dec 03 22:45:40 np0005544966.novalocal sudo[101405]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101405]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101408]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-runtimes.json Dec 03 22:45:40 np0005544966.novalocal sudo[101408]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101408]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101411]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-webservers.json Dec 03 22:45:40 np0005544966.novalocal sudo[101411]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101411]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101414]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./storage-volume-type.json Dec 03 22:45:40 np0005544966.novalocal sudo[101414]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101414]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101417]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-processor-allocation-setting-data.json Dec 03 22:45:40 np0005544966.novalocal sudo[101417]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101417]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101420]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-resource-allocation-setting-data.json Dec 03 22:45:40 np0005544966.novalocal sudo[101420]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101420]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101423]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-storage-allocation-setting-data.json Dec 03 22:45:40 np0005544966.novalocal sudo[101423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101423]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101426]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-virtual-system-setting-data.json Dec 03 22:45:40 np0005544966.novalocal sudo[101426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101426]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101429]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-disk-filter.json Dec 03 22:45:40 np0005544966.novalocal sudo[101429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101429]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101432]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-iops-filter.json Dec 03 22:45:40 np0005544966.novalocal sudo[101432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101432]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101435]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-num-instances.json Dec 03 22:45:40 np0005544966.novalocal sudo[101435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101435]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101438]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-mode.json Dec 03 22:45:40 np0005544966.novalocal sudo[101438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101438]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101441]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-pinning.json Dec 03 22:45:40 np0005544966.novalocal sudo[101441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101441]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101445]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-memory-backing.json Dec 03 22:45:40 np0005544966.novalocal sudo[101445]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101445]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101448]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-shutdown.json Dec 03 22:45:40 np0005544966.novalocal sudo[101448]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101448]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101451]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-host-capabilities.json Dec 03 22:45:40 np0005544966.novalocal sudo[101451]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101451]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101454]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Dec 03 22:45:40 np0005544966.novalocal sudo[101454]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101454]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101457]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Dec 03 22:45:40 np0005544966.novalocal sudo[101457]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101457]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101460]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./2 Dec 03 22:45:40 np0005544966.novalocal sudo[101460]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101460]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101463]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Dec 03 22:45:40 np0005544966.novalocal sudo[101463]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101463]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101466]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Dec 03 22:45:40 np0005544966.novalocal sudo[101466]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101466]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101469]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005544966.novalocal.pem Dec 03 22:45:40 np0005544966.novalocal sudo[101469]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:40 np0005544966.novalocal sudo[101469]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:40 np0005544966.novalocal sudo[101472]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./default_catalog.templates Dec 03 22:45:41 np0005544966.novalocal sudo[101472]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101472]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101475]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.conf Dec 03 22:45:41 np0005544966.novalocal sudo[101475]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101475]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101478]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf Dec 03 22:45:41 np0005544966.novalocal sudo[101478]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101478]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101481]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./sso_callback_template.html Dec 03 22:45:41 np0005544966.novalocal sudo[101481]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101481]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101484]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 03 22:45:41 np0005544966.novalocal sudo[101484]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101484]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101487]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 03 22:45:41 np0005544966.novalocal sudo[101487]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101487]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101490]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Dec 03 22:45:41 np0005544966.novalocal sudo[101490]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101490]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101493]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila.conf Dec 03 22:45:41 np0005544966.novalocal sudo[101493]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101493]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101496]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Dec 03 22:45:41 np0005544966.novalocal sudo[101496]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101496]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101499]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005544966.novalocal.pem Dec 03 22:45:41 np0005544966.novalocal sudo[101499]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101499]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101502]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005544966.novalocal.pem Dec 03 22:45:41 np0005544966.novalocal sudo[101502]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101502]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101505]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.conf Dec 03 22:45:41 np0005544966.novalocal sudo[101505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101505]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101508]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Dec 03 22:45:41 np0005544966.novalocal sudo[101508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101508]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101511]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Dec 03 22:45:41 np0005544966.novalocal sudo[101511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101511]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101514]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./dhcp_agent.ini Dec 03 22:45:41 np0005544966.novalocal sudo[101514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101514]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101517]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./l3_agent.ini Dec 03 22:45:41 np0005544966.novalocal sudo[101517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101517]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101520]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./metadata_agent.ini Dec 03 22:45:41 np0005544966.novalocal sudo[101520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101520]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101523]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_vpn_agent.ini Dec 03 22:45:41 np0005544966.novalocal sudo[101523]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101523]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101526]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_vpnaas.conf Dec 03 22:45:41 np0005544966.novalocal sudo[101526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101526]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101529]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./vpn_agent.ini Dec 03 22:45:41 np0005544966.novalocal sudo[101529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101529]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101532]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 03 22:45:41 np0005544966.novalocal sudo[101532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101532]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101535]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Dec 03 22:45:41 np0005544966.novalocal sudo[101535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101535]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101538]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Dec 03 22:45:41 np0005544966.novalocal sudo[101538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101538]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101541]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Dec 03 22:45:41 np0005544966.novalocal sudo[101541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:41 np0005544966.novalocal sudo[101541]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:41 np0005544966.novalocal sudo[101544]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Dec 03 22:45:42 np0005544966.novalocal sudo[101544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101544]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101547]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Dec 03 22:45:42 np0005544966.novalocal sudo[101547]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101547]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101550]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./README Dec 03 22:45:42 np0005544966.novalocal sudo[101550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101550]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101553]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ml2_conf.ini Dec 03 22:45:42 np0005544966.novalocal sudo[101553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101553]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101556]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_agent.ini Dec 03 22:45:42 np0005544966.novalocal sudo[101556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101556]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101559]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./sriov_agent.ini Dec 03 22:45:42 np0005544966.novalocal sudo[101559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101559]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101562]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Dec 03 22:45:42 np0005544966.novalocal sudo[101562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101562]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101565]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova.conf Dec 03 22:45:42 np0005544966.novalocal sudo[101565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101565]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101568]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./release Dec 03 22:45:42 np0005544966.novalocal sudo[101568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101568]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101571]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Dec 03 22:45:42 np0005544966.novalocal sudo[101571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101571]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101574]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.conf Dec 03 22:45:42 np0005544966.novalocal sudo[101574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101574]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101577]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 03 22:45:42 np0005544966.novalocal sudo[101577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101577]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101580]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005544966.novalocal.pem Dec 03 22:45:42 np0005544966.novalocal sudo[101580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101580]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101583]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.conf Dec 03 22:45:42 np0005544966.novalocal sudo[101583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101583]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101586]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 03 22:45:42 np0005544966.novalocal sudo[101586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101586]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101589]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.cert.pem Dec 03 22:45:42 np0005544966.novalocal sudo[101589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101589]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101592]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.key.pem Dec 03 22:45:42 np0005544966.novalocal sudo[101592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101592]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101595]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client_ca.cert.pem Dec 03 22:45:42 np0005544966.novalocal sudo[101595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101595]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101598]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client.cert-and-key.pem Dec 03 22:45:42 np0005544966.novalocal sudo[101598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101598]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101601]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Dec 03 22:45:42 np0005544966.novalocal sudo[101601]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101601]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101604]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Dec 03 22:45:42 np0005544966.novalocal sudo[101604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101604]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101607]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Dec 03 22:45:42 np0005544966.novalocal sudo[101607]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101607]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101610]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Dec 03 22:45:42 np0005544966.novalocal sudo[101610]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101610]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101613]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Dec 03 22:45:42 np0005544966.novalocal sudo[101613]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101613]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101616]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005544966.novalocal.pem Dec 03 22:45:42 np0005544966.novalocal sudo[101616]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101616]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101619]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.conf Dec 03 22:45:42 np0005544966.novalocal sudo[101619]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101619]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101622]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 03 22:45:42 np0005544966.novalocal sudo[101622]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101622]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:42 np0005544966.novalocal sudo[101625]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005544966.novalocal.pem Dec 03 22:45:42 np0005544966.novalocal sudo[101625]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:42 np0005544966.novalocal sudo[101625]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101628]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./accounts.yaml.sample Dec 03 22:45:43 np0005544966.novalocal sudo[101628]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101628]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101631]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./allow-list.yaml Dec 03 22:45:43 np0005544966.novalocal sudo[101631]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101631]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101634]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf.sample Dec 03 22:45:43 np0005544966.novalocal sudo[101634]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101634]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101637]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./rbac-persona-accounts.yaml.sample Dec 03 22:45:43 np0005544966.novalocal sudo[101637]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101637]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101640]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf Dec 03 22:45:43 np0005544966.novalocal sudo[101640]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101640]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101643]: root : PWD=/var/log/weirdo-project/logs/etc/rsyslog.d ; USER=root ; COMMAND=/bin/chmod 644 ./21-cloudinit.conf Dec 03 22:45:43 np0005544966.novalocal sudo[101643]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101643]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101646]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyslog.conf Dec 03 22:45:43 np0005544966.novalocal sudo[101646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101646]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101649]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005544966.novalocal.pem Dec 03 22:45:43 np0005544966.novalocal sudo[101649]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101649]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101652]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.config Dec 03 22:45:43 np0005544966.novalocal sudo[101652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101652]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101655]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.conf Dec 03 22:45:43 np0005544966.novalocal sudo[101655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101655]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101658]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq-env.conf Dec 03 22:45:43 np0005544966.novalocal sudo[101658]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101658]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101661]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./inetrc Dec 03 22:45:43 np0005544966.novalocal sudo[101661]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101661]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101664]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmqadmin.conf Dec 03 22:45:43 np0005544966.novalocal sudo[101664]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101664]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101667]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./enabled_plugins Dec 03 22:45:43 np0005544966.novalocal sudo[101667]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101667]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101670]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./my.cnf Dec 03 22:45:43 np0005544966.novalocal sudo[101670]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101670]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101673]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_gssapi.cnf Dec 03 22:45:43 np0005544966.novalocal sudo[101673]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101673]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101676]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./enable_encryption.preset Dec 03 22:45:43 np0005544966.novalocal sudo[101676]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101676]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101679]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb-server.cnf Dec 03 22:45:43 np0005544966.novalocal sudo[101679]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101679]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101682]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./spider.cnf Dec 03 22:45:43 np0005544966.novalocal sudo[101682]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101682]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101685]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mysql-clients.cnf Dec 03 22:45:43 np0005544966.novalocal sudo[101685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101685]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101688]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./server.cnf Dec 03 22:45:43 np0005544966.novalocal sudo[101688]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101688]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101691]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./client.cnf Dec 03 22:45:43 np0005544966.novalocal sudo[101691]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101691]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101694]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./np0005544966.novalocal.pem Dec 03 22:45:43 np0005544966.novalocal sudo[101694]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101694]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101697]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./iscsid.conf Dec 03 22:45:43 np0005544966.novalocal sudo[101697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101697]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101700]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./initiatorname.iscsi Dec 03 22:45:43 np0005544966.novalocal sudo[101700]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101700]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101703]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 644 ./default.xml Dec 03 22:45:43 np0005544966.novalocal sudo[101703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101703]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:43 np0005544966.novalocal sudo[101706]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-lockd.conf Dec 03 22:45:43 np0005544966.novalocal sudo[101706]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:43 np0005544966.novalocal sudo[101706]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101709]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101709]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101709]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101712]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtqemud.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101712]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101712]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101717]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtsecretd.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101717]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101720]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-admin.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101720]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101723]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101723]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101726]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlockd.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101726]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101729]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlogd.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101729]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101732]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtproxyd.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101732]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101735]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtstoraged.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101735]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101738]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirtd.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101738]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101741]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtinterfaced.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101741]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101744]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./network.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101744]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101744]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101747]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnetworkd.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101747]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101747]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101750]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnodedevd.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101750]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101750]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101753]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnwfilterd.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101753]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101756]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Dec 03 22:45:44 np0005544966.novalocal sudo[101756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101756]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101759]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Dec 03 22:45:44 np0005544966.novalocal sudo[101759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101759]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101762]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-privkey.pem Dec 03 22:45:44 np0005544966.novalocal sudo[101762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101762]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101765]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./default.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101765]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101768]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./.conf.db.~lock~ Dec 03 22:45:44 np0005544966.novalocal sudo[101768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101768]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101771]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./conf.db Dec 03 22:45:44 np0005544966.novalocal sudo[101771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101771]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101774]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./system-id.conf Dec 03 22:45:44 np0005544966.novalocal sudo[101774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101774]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101777]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-req.pem Dec 03 22:45:44 np0005544966.novalocal sudo[101777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101777]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101780]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Dec 03 22:45:44 np0005544966.novalocal sudo[101780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101780]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101783]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-req.pem Dec 03 22:45:44 np0005544966.novalocal sudo[101783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101783]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101786]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Dec 03 22:45:44 np0005544966.novalocal sudo[101786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101786]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101789]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-req.pem Dec 03 22:45:44 np0005544966.novalocal sudo[101789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:44 np0005544966.novalocal sudo[101789]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:44 np0005544966.novalocal sudo[101792]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-cert.pem Dec 03 22:45:45 np0005544966.novalocal sudo[101792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101792]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101795]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./httpd.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101795]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101798]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./magic Dec 03 22:45:45 np0005544966.novalocal sudo[101798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101798]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101801]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./ports.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101801]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101804]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-cinder_wsgi.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101804]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101807]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-glance_wsgi.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101807]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101810]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-keystone_wsgi.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101810]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101813]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-manila_wsgi.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101813]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101816]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_api_wsgi.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101816]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101819]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_metadata_wsgi.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101819]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101822]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-octavia_wsgi.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101822]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101825]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-placement_wsgi.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101825]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101825]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101828]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_ssl_vhost.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101828]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101831]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_vhost.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101831]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101834]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./openstack-dashboard.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101834]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101837]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101837]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101840]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.load Dec 03 22:45:45 np0005544966.novalocal sudo[101840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101840]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101843]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_core.load Dec 03 22:45:45 np0005544966.novalocal sudo[101843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101843]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101846]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_host.load Dec 03 22:45:45 np0005544966.novalocal sudo[101846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101846]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101849]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./filter.load Dec 03 22:45:45 np0005544966.novalocal sudo[101849]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101849]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101852]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./log_config.load Dec 03 22:45:45 np0005544966.novalocal sudo[101852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101852]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101855]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101855]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101855]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101858]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.load Dec 03 22:45:45 np0005544966.novalocal sudo[101858]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101858]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101861]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101861]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101864]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.load Dec 03 22:45:45 np0005544966.novalocal sudo[101864]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101864]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101867]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.conf Dec 03 22:45:45 np0005544966.novalocal sudo[101867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:45 np0005544966.novalocal sudo[101867]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:45 np0005544966.novalocal sudo[101870]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.load Dec 03 22:45:45 np0005544966.novalocal sudo[101870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101870]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101873]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./socache_shmcb.load Dec 03 22:45:46 np0005544966.novalocal sudo[101873]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101873]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101876]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.conf Dec 03 22:45:46 np0005544966.novalocal sudo[101876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101876]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101879]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.load Dec 03 22:45:46 np0005544966.novalocal sudo[101879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101879]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101882]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./systemd.load Dec 03 22:45:46 np0005544966.novalocal sudo[101882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101882]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101885]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./unixd.load Dec 03 22:45:46 np0005544966.novalocal sudo[101885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101885]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101888]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.conf Dec 03 22:45:46 np0005544966.novalocal sudo[101888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101888]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101891]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.load Dec 03 22:45:46 np0005544966.novalocal sudo[101891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101891]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101894]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf Dec 03 22:45:46 np0005544966.novalocal sudo[101894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101894]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101897]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf.puppet Dec 03 22:45:46 np0005544966.novalocal sudo[101897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101897]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101900]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf.puppet Dec 03 22:45:46 np0005544966.novalocal sudo[101900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101900]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101903]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf Dec 03 22:45:46 np0005544966.novalocal sudo[101903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101903]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101906]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005544966.novalocal.pem Dec 03 22:45:46 np0005544966.novalocal sudo[101906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101906]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101909]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./.secret_key_store Dec 03 22:45:46 np0005544966.novalocal sudo[101909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101909]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101912]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_policy.yaml.txt Dec 03 22:45:46 np0005544966.novalocal sudo[101912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101912]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101915]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./manila.yaml Dec 03 22:45:46 np0005544966.novalocal sudo[101915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101915]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101918]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./README.txt Dec 03 22:45:46 np0005544966.novalocal sudo[101918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101918]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101921]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.yaml Dec 03 22:45:46 np0005544966.novalocal sudo[101921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101921]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101924]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./glance.yaml Dec 03 22:45:46 np0005544966.novalocal sudo[101924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101924]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101927]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.yaml Dec 03 22:45:46 np0005544966.novalocal sudo[101927]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101927]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101930]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.yaml Dec 03 22:45:46 np0005544966.novalocal sudo[101930]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101930]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101933]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./nova.yaml Dec 03 22:45:46 np0005544966.novalocal sudo[101933]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101933]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101936]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./glance_policy.yaml.txt Dec 03 22:45:46 np0005544966.novalocal sudo[101936]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101936]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101939]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_policy.yaml.txt Dec 03 22:45:46 np0005544966.novalocal sudo[101939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101939]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:46 np0005544966.novalocal sudo[101942]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./local_settings.txt Dec 03 22:45:46 np0005544966.novalocal sudo[101942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:46 np0005544966.novalocal sudo[101942]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101945]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_90_manila_shares.py Dec 03 22:45:47 np0005544966.novalocal sudo[101945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101945]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101948]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_10_set_custom_theme.py.example Dec 03 22:45:47 np0005544966.novalocal sudo[101948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101948]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101951]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_11_toggle_angular_features.py.example Dec 03 22:45:47 np0005544966.novalocal sudo[101951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101951]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101954]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_2010_integration_tests_deprecated.py.example Dec 03 22:45:47 np0005544966.novalocal sudo[101954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101954]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101957]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_20_integration_tests_scaffolds.py.example Dec 03 22:45:47 np0005544966.novalocal sudo[101957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101957]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101960]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_9030_profiler_settings.py.example Dec 03 22:45:47 np0005544966.novalocal sudo[101960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101960]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101963]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./manila_policy.yaml.txt Dec 03 22:45:47 np0005544966.novalocal sudo[101963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101963]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101966]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_policy.yaml.txt Dec 03 22:45:47 np0005544966.novalocal sudo[101966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101966]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101969]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./api-extensions.yaml Dec 03 22:45:47 np0005544966.novalocal sudo[101969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101969]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101972]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./nova_policy.yaml.txt Dec 03 22:45:47 np0005544966.novalocal sudo[101972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101972]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101975]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005544966.novalocal.pem Dec 03 22:45:47 np0005544966.novalocal sudo[101975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101975]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101978]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyncd.conf Dec 03 22:45:47 np0005544966.novalocal sudo[101978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101978]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101981]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos-addons.repo Dec 03 22:45:47 np0005544966.novalocal sudo[101981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101981]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101984]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos.repo Dec 03 22:45:47 np0005544966.novalocal sudo[101984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101984]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101987]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean-deps.repo Dec 03 22:45:47 np0005544966.novalocal sudo[101987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101987]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101990]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean.repo Dec 03 22:45:47 np0005544966.novalocal sudo[101990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101990]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101993]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./redhat.repo Dec 03 22:45:47 np0005544966.novalocal sudo[101993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101993]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101996]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./passwd Dec 03 22:45:47 np0005544966.novalocal sudo[101996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101996]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[101999]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./group Dec 03 22:45:47 np0005544966.novalocal sudo[101999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[101999]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[102002]: root : PWD=/var/log/weirdo-project/logs/etc/openstack/puppet ; USER=root ; COMMAND=/bin/chmod 644 ./admin-clouds.yaml Dec 03 22:45:47 np0005544966.novalocal sudo[102002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[102002]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[102005]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./fstab Dec 03 22:45:47 np0005544966.novalocal sudo[102005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[102005]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[102008]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-manage.log Dec 03 22:45:47 np0005544966.novalocal sudo[102008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[102008]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[102011]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Dec 03 22:45:47 np0005544966.novalocal sudo[102011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[102011]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[102014]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./volume.log Dec 03 22:45:47 np0005544966.novalocal sudo[102014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[102014]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[102017]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./backup.log Dec 03 22:45:47 np0005544966.novalocal sudo[102017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:47 np0005544966.novalocal sudo[102017]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:47 np0005544966.novalocal sudo[102020]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-api.log Dec 03 22:45:47 np0005544966.novalocal sudo[102020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102020]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102023]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./api.log Dec 03 22:45:48 np0005544966.novalocal sudo[102023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102023]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102026]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./cache.log Dec 03 22:45:48 np0005544966.novalocal sudo[102026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102026]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102029]: root : PWD=/var/log/weirdo-project/logs/horizon ; USER=root ; COMMAND=/bin/chmod 644 ./horizon.log Dec 03 22:45:48 np0005544966.novalocal sudo[102029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102029]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102032]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.log Dec 03 22:45:48 np0005544966.novalocal sudo[102032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102032]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102035]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone-manage.log Dec 03 22:45:48 np0005544966.novalocal sudo[102035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102035]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102038]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-api.log Dec 03 22:45:48 np0005544966.novalocal sudo[102038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102038]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102041]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-manage.log Dec 03 22:45:48 np0005544966.novalocal sudo[102041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102041]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102044]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Dec 03 22:45:48 np0005544966.novalocal sudo[102044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102044]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102047]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./share.log Dec 03 22:45:48 np0005544966.novalocal sudo[102047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102047]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102050]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Dec 03 22:45:48 np0005544966.novalocal sudo[102050]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102050]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102053]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./data.log Dec 03 22:45:48 np0005544966.novalocal sudo[102053]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102053]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102056]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./server.log Dec 03 22:45:48 np0005544966.novalocal sudo[102056]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102056]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102059]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron-ovn-agent.log Dec 03 22:45:48 np0005544966.novalocal sudo[102059]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102059]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102062]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-vpn-agent.log Dec 03 22:45:48 np0005544966.novalocal sudo[102062]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102062]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102065]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Dec 03 22:45:48 np0005544966.novalocal sudo[102065]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102065]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102068]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-manage.log Dec 03 22:45:48 np0005544966.novalocal sudo[102068]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102068]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102071]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-conductor.log Dec 03 22:45:48 np0005544966.novalocal sudo[102071]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102071]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102074]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.log Dec 03 22:45:48 np0005544966.novalocal sudo[102074]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102074]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102077]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-scheduler.log Dec 03 22:45:48 np0005544966.novalocal sudo[102077]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102077]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102080]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-api.log Dec 03 22:45:48 np0005544966.novalocal sudo[102080]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102080]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102083]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Dec 03 22:45:48 np0005544966.novalocal sudo[102083]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102083]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102086]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-metadata-api.log Dec 03 22:45:48 np0005544966.novalocal sudo[102086]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102086]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102089]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-novncproxy.log Dec 03 22:45:48 np0005544966.novalocal sudo[102089]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102089]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102092]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./health-manager.log Dec 03 22:45:48 np0005544966.novalocal sudo[102092]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:48 np0005544966.novalocal sudo[102092]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:48 np0005544966.novalocal sudo[102095]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./housekeeping.log Dec 03 22:45:48 np0005544966.novalocal sudo[102095]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102095]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102098]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./driver-agent.log Dec 03 22:45:49 np0005544966.novalocal sudo[102098]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102098]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102101]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./worker.log Dec 03 22:45:49 np0005544966.novalocal sudo[102101]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102101]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102104]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./app.log Dec 03 22:45:49 np0005544966.novalocal sudo[102104]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102104]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102107]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-nb.log Dec 03 22:45:49 np0005544966.novalocal sudo[102107]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102107]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102110]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-sb.log Dec 03 22:45:49 np0005544966.novalocal sudo[102110]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102110]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102113]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd.log Dec 03 22:45:49 np0005544966.novalocal sudo[102113]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102113]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102116]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller.log Dec 03 22:45:49 np0005544966.novalocal sudo[102116]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102116]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102119]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Dec 03 22:45:49 np0005544966.novalocal sudo[102119]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102119]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102122]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-connection.txt Dec 03 22:45:49 np0005544966.novalocal sudo[102122]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102122]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102125]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-ssl.txt Dec 03 22:45:49 np0005544966.novalocal sudo[102125]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102125]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102128]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Dec 03 22:45:49 np0005544966.novalocal sudo[102128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102128]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102131]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-connection.txt Dec 03 22:45:49 np0005544966.novalocal sudo[102131]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102131]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102134]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-ssl.txt Dec 03 22:45:49 np0005544966.novalocal sudo[102134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102134]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102137]: root : PWD=/var/log/weirdo-project/logs/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.log Dec 03 22:45:49 np0005544966.novalocal sudo[102137]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102137]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102140]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.conf Dec 03 22:45:49 np0005544966.novalocal sudo[102140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102140]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102143]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./syslog.txt Dec 03 22:45:49 np0005544966.novalocal sudo[102143]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102143]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102146]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6.log Dec 03 22:45:49 np0005544966.novalocal sudo[102146]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102146]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102149]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6_upgrade.log Dec 03 22:45:49 np0005544966.novalocal sudo[102149]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102149]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102152]: root : PWD=/var/log/weirdo-project/logs/mariadb ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb.log Dec 03 22:45:49 np0005544966.novalocal sudo[102152]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102152]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102155]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.log Dec 03 22:45:49 np0005544966.novalocal sudo[102155]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102155]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102158]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testrepository.subunit Dec 03 22:45:49 np0005544966.novalocal sudo[102158]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102158]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102161]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testr_results.html Dec 03 22:45:49 np0005544966.novalocal sudo[102161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102161]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102164]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./dstat.log Dec 03 22:45:49 np0005544966.novalocal sudo[102164]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102164]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:49 np0005544966.novalocal sudo[102167]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iostat.log Dec 03 22:45:49 np0005544966.novalocal sudo[102167]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:49 np0005544966.novalocal sudo[102167]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102170]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iotop.log Dec 03 22:45:50 np0005544966.novalocal sudo[102170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102170]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102173]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000001.log Dec 03 22:45:50 np0005544966.novalocal sudo[102173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102173]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102176]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000004.log Dec 03 22:45:50 np0005544966.novalocal sudo[102176]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102176]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102179]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000002.log Dec 03 22:45:50 np0005544966.novalocal sudo[102179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102179]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102182]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000003.log Dec 03 22:45:50 np0005544966.novalocal sudo[102182]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102182]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102185]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000006.log Dec 03 22:45:50 np0005544966.novalocal sudo[102185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102185]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102188]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000005.log Dec 03 22:45:50 np0005544966.novalocal sudo[102188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102188]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102192]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000007.log Dec 03 22:45:50 np0005544966.novalocal sudo[102192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102192]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102196]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000008.log Dec 03 22:45:50 np0005544966.novalocal sudo[102196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102196]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102199]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-0000000a.log Dec 03 22:45:50 np0005544966.novalocal sudo[102199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102199]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102202]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000009.log Dec 03 22:45:50 np0005544966.novalocal sudo[102202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102202]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102205]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./virsh-net-list.txt Dec 03 22:45:50 np0005544966.novalocal sudo[102205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102205]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102208]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-pki.log Dec 03 22:45:50 np0005544966.novalocal sudo[102208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102208]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102211]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server.log Dec 03 22:45:50 np0005544966.novalocal sudo[102211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102211]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102214]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vswitchd.log Dec 03 22:45:50 np0005544966.novalocal sudo[102214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102214]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102217]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./zuul Dec 03 22:45:50 np0005544966.novalocal sudo[102217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102217]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102220]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./90-cloud-init-users Dec 03 22:45:50 np0005544966.novalocal sudo[102220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102220]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102223]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./glance Dec 03 22:45:50 np0005544966.novalocal sudo[102223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102223]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102226]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./nova Dec 03 22:45:50 np0005544966.novalocal sudo[102226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102226]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102229]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./neutron Dec 03 22:45:50 np0005544966.novalocal sudo[102229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102229]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102232]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Dec 03 22:45:50 np0005544966.novalocal sudo[102232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102232]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102235]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./manila Dec 03 22:45:50 np0005544966.novalocal sudo[102235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102235]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102238]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./sudoers.txt Dec 03 22:45:50 np0005544966.novalocal sudo[102238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102238]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102241]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./error_log Dec 03 22:45:50 np0005544966.novalocal sudo[102241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102241]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:50 np0005544966.novalocal sudo[102244]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_error.log Dec 03 22:45:50 np0005544966.novalocal sudo[102244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:50 np0005544966.novalocal sudo[102244]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102247]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_error.log Dec 03 22:45:51 np0005544966.novalocal sudo[102247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102247]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102250]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_error_ssl.log Dec 03 22:45:51 np0005544966.novalocal sudo[102250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102250]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102253]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_error_ssl.log Dec 03 22:45:51 np0005544966.novalocal sudo[102253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102253]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102256]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_error_ssl.log Dec 03 22:45:51 np0005544966.novalocal sudo[102256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102256]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102259]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_error_ssl.log Dec 03 22:45:51 np0005544966.novalocal sudo[102259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102259]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102262]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_error_ssl.log Dec 03 22:45:51 np0005544966.novalocal sudo[102262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102262]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102265]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_error_ssl.log Dec 03 22:45:51 np0005544966.novalocal sudo[102265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102265]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102268]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_error_ssl.log Dec 03 22:45:51 np0005544966.novalocal sudo[102268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102268]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102271]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_error_ssl.log Dec 03 22:45:51 np0005544966.novalocal sudo[102271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102271]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102274]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_access.log Dec 03 22:45:51 np0005544966.novalocal sudo[102274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102274]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sshd-session[102190]: Invalid user huawei from 103.19.254.14 port 51724 Dec 03 22:45:51 np0005544966.novalocal sudo[102277]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_access.log Dec 03 22:45:51 np0005544966.novalocal sudo[102277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102277]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102280]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_access_ssl.log Dec 03 22:45:51 np0005544966.novalocal sudo[102280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102280]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102283]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_access_ssl.log Dec 03 22:45:51 np0005544966.novalocal sudo[102283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102283]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102286]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_access_ssl.log Dec 03 22:45:51 np0005544966.novalocal sudo[102286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102286]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102289]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_access_ssl.log Dec 03 22:45:51 np0005544966.novalocal sudo[102289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102289]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102292]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_access_ssl.log Dec 03 22:45:51 np0005544966.novalocal sshd-session[102190]: Received disconnect from 103.19.254.14 port 51724:11: Bye Bye [preauth] Dec 03 22:45:51 np0005544966.novalocal sshd-session[102190]: Disconnected from invalid user huawei 103.19.254.14 port 51724 [preauth] Dec 03 22:45:51 np0005544966.novalocal sudo[102292]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102292]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102295]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_access_ssl.log Dec 03 22:45:51 np0005544966.novalocal sudo[102295]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102295]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102298]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_access_ssl.log Dec 03 22:45:51 np0005544966.novalocal sudo[102298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102298]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102301]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_access_ssl.log Dec 03 22:45:51 np0005544966.novalocal sudo[102301]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102301]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102304]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.log Dec 03 22:45:51 np0005544966.novalocal sudo[102304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102304]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102307]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.log Dec 03 22:45:51 np0005544966.novalocal sudo[102307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102307]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102310]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./audit.log.txt Dec 03 22:45:51 np0005544966.novalocal sudo[102310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102310]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102313]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./nova Dec 03 22:45:51 np0005544966.novalocal sudo[102313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102313]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:51 np0005544966.novalocal sudo[102316]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./keystone Dec 03 22:45:51 np0005544966.novalocal sudo[102316]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:51 np0005544966.novalocal sudo[102316]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102319]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./manila Dec 03 22:45:52 np0005544966.novalocal sudo[102319]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102319]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102322]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Dec 03 22:45:52 np0005544966.novalocal sudo[102322]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102322]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102325]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./glance Dec 03 22:45:52 np0005544966.novalocal sudo[102325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102325]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102328]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102328]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102331]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./rpm-qa.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102331]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102334]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./repolist.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102334]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102334]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102337]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./installed-packages.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102337]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102340]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./modulelist.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102340]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102343]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.log Dec 03 22:45:52 np0005544966.novalocal sudo[102343]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102343]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102346]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.rpm.log Dec 03 22:45:52 np0005544966.novalocal sudo[102346]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102346]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102349]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./gem-list.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102349]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102349]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102352]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./df.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102352]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102352]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102355]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./free.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102355]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102355]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102358]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lsmod.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102358]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102358]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102361]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./cpuinfo.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102361]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102361]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102364]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ps.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102364]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102364]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102367]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ip_-d_address.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102367]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102367]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102370]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./brctl_show.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102370]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102370]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102373]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_show.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102373]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102373]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102376]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_list_open_vswitch.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102376]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102376]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102379]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102379]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102382]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102382]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102385]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./netstat.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102385]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102385]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102388]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./systemctl.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102388]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102388]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:52 np0005544966.novalocal sudo[102391]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iptables.txt Dec 03 22:45:52 np0005544966.novalocal sudo[102391]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:52 np0005544966.novalocal sudo[102391]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102394]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./mount.txt Dec 03 22:45:53 np0005544966.novalocal sudo[102394]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102394]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102397]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./losetup_-al.txt Dec 03 22:45:53 np0005544966.novalocal sudo[102397]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102397]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102400]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lvm.txt Dec 03 22:45:53 np0005544966.novalocal sudo[102400]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102400]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102403]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./semanage-boolean-list.txt Dec 03 22:45:53 np0005544966.novalocal sudo[102403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102403]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102406]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.txt Dec 03 22:45:53 np0005544966.novalocal sudo[102406]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102406]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102409]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./nova.txt Dec 03 22:45:53 np0005544966.novalocal sudo[102409]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102409]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102412]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./placement.txt Dec 03 22:45:53 np0005544966.novalocal sudo[102412]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102412]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102415]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.txt Dec 03 22:45:53 np0005544966.novalocal sudo[102415]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102415]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102418]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./glance.txt Dec 03 22:45:53 np0005544966.novalocal sudo[102418]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102418]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102421]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.txt Dec 03 22:45:53 np0005544966.novalocal sudo[102421]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102421]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102424]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./manila.txt Dec 03 22:45:53 np0005544966.novalocal sudo[102424]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102424]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102427]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.txt Dec 03 22:45:53 np0005544966.novalocal sudo[102427]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102427]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102430]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./nova-cell_v2.txt Dec 03 22:45:53 np0005544966.novalocal sudo[102430]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102430]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[101219]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102435]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chown -R 0:0 /var/log/weirdo-project/logs Dec 03 22:45:53 np0005544966.novalocal sudo[102435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102435]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102438]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type l -execdir sudo rm -f {} ; Dec 03 22:45:53 np0005544966.novalocal sudo[102438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102441]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Dec 03 22:45:53 np0005544966.novalocal sudo[102441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102441]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102444]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./glance_cinder_store.filters Dec 03 22:45:53 np0005544966.novalocal sudo[102444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102444]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102447]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Dec 03 22:45:53 np0005544966.novalocal sudo[102447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102447]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102450]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./ovn.ini Dec 03 22:45:53 np0005544966.novalocal sudo[102450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102450]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102453]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./plugin.ini Dec 03 22:45:53 np0005544966.novalocal sudo[102453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102453]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102456]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn.ini Dec 03 22:45:53 np0005544966.novalocal sudo[102456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102456]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102459]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks/autostart ; USER=root ; COMMAND=/bin/rm -f ./default.xml Dec 03 22:45:53 np0005544966.novalocal sudo[102459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102459]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102462]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_admin_add_share_panel_group.py Dec 03 22:45:53 np0005544966.novalocal sudo[102462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102462]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:53 np0005544966.novalocal sudo[102465]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_project_add_share_panel_group.py Dec 03 22:45:53 np0005544966.novalocal sudo[102465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:53 np0005544966.novalocal sudo[102465]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102468]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_admin_add_shares_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102468]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102471]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_project_add_shares_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102471]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102476]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_admin_add_share_snapshots_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102476]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102479]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_project_add_share_snapshots_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102479]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102482]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9030_manila_admin_add_share_types_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102482]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102485]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_admin_add_share_networks_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102485]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102488]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_project_add_share_networks_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102488]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102491]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_admin_add_security_services_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102491]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102494]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_project_add_security_services_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102494]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102497]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9060_manila_admin_add_share_servers_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102497]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102500]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9070_manila_admin_add_share_instances_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102500]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102503]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_admin_add_share_groups_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102503]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102506]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_project_add_share_groups_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102506]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102509]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_admin_add_share_group_snapshots_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102509]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102512]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_project_add_share_group_snapshots_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102512]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102515]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9090_manila_admin_add_share_group_types_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102515]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102518]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_admin_add_user_messages_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102518]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102521]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_project_add_user_messages_panel_to_share_panel_group.py Dec 03 22:45:54 np0005544966.novalocal sudo[102521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102521]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102438]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102525]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20251203_222725.log /var/log/weirdo-project/logs/puppet-20251203_222725.txt Dec 03 22:45:54 np0005544966.novalocal sudo[102525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102525]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102528]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20251203_223020.log /var/log/weirdo-project/logs/puppet-20251203_223020.txt Dec 03 22:45:54 np0005544966.novalocal sudo[102528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102528]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102531]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-manage.log /var/log/weirdo-project/logs/cinder/cinder-manage.txt Dec 03 22:45:54 np0005544966.novalocal sudo[102531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102531]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102534]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/scheduler.log /var/log/weirdo-project/logs/cinder/scheduler.txt Dec 03 22:45:54 np0005544966.novalocal sudo[102534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102534]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102537]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/volume.log /var/log/weirdo-project/logs/cinder/volume.txt Dec 03 22:45:54 np0005544966.novalocal sudo[102537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102537]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102540]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/backup.log /var/log/weirdo-project/logs/cinder/backup.txt Dec 03 22:45:54 np0005544966.novalocal sudo[102540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102540]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102543]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-api.log /var/log/weirdo-project/logs/cinder/cinder-api.txt Dec 03 22:45:54 np0005544966.novalocal sudo[102543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102543]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:54 np0005544966.novalocal sudo[102546]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/api.log /var/log/weirdo-project/logs/glance/api.txt Dec 03 22:45:54 np0005544966.novalocal sudo[102546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:54 np0005544966.novalocal sudo[102546]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102549]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/cache.log /var/log/weirdo-project/logs/glance/cache.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102549]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102552]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/horizon/horizon.log /var/log/weirdo-project/logs/horizon/horizon.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102552]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102555]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone.log /var/log/weirdo-project/logs/keystone/keystone.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102555]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102555]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102558]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone-manage.log /var/log/weirdo-project/logs/keystone/keystone-manage.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102558]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102558]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102561]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-api.log /var/log/weirdo-project/logs/manila/manila-api.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102561]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102564]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-manage.log /var/log/weirdo-project/logs/manila/manila-manage.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102564]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102564]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102567]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/scheduler.log /var/log/weirdo-project/logs/manila/scheduler.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102567]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102567]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102570]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/share.log /var/log/weirdo-project/logs/manila/share.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102570]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102570]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102573]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/privsep-helper.log /var/log/weirdo-project/logs/manila/privsep-helper.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102573]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102573]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102576]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/data.log /var/log/weirdo-project/logs/manila/data.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102576]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102576]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102579]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/server.log /var/log/weirdo-project/logs/neutron/server.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102579]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102579]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102582]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.log /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102582]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102582]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102585]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.log /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102585]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102585]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102588]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/privsep-helper.log /var/log/weirdo-project/logs/neutron/privsep-helper.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102588]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102588]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102591]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-manage.log /var/log/weirdo-project/logs/nova/nova-manage.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102591]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102591]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102594]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-conductor.log /var/log/weirdo-project/logs/nova/nova-conductor.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102594]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102594]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102597]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-compute.log /var/log/weirdo-project/logs/nova/nova-compute.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102597]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102597]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102600]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-scheduler.log /var/log/weirdo-project/logs/nova/nova-scheduler.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102600]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102600]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102603]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-api.log /var/log/weirdo-project/logs/nova/nova-api.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102603]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102603]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102606]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/privsep-helper.log /var/log/weirdo-project/logs/nova/privsep-helper.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102606]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102609]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-metadata-api.log /var/log/weirdo-project/logs/nova/nova-metadata-api.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102609]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102612]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-novncproxy.log /var/log/weirdo-project/logs/nova/nova-novncproxy.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102612]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102612]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102615]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/health-manager.log /var/log/weirdo-project/logs/octavia/health-manager.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102615]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:55 np0005544966.novalocal sudo[102618]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/housekeeping.log /var/log/weirdo-project/logs/octavia/housekeeping.txt Dec 03 22:45:55 np0005544966.novalocal sudo[102618]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:55 np0005544966.novalocal sudo[102618]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102621]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/driver-agent.log /var/log/weirdo-project/logs/octavia/driver-agent.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102621]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102621]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102624]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/worker.log /var/log/weirdo-project/logs/octavia/worker.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102624]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102624]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102627]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/app.log /var/log/weirdo-project/logs/octavia/app.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102627]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102630]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102630]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102630]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102633]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102633]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102633]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102636]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-northd.log /var/log/weirdo-project/logs/ovn/ovn-northd.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102636]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102639]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-controller.log /var/log/weirdo-project/logs/ovn/ovn-controller.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102639]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102639]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102642]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/placement/placement.log /var/log/weirdo-project/logs/placement/placement.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102642]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102645]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102645]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102645]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102648]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102648]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102651]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/mariadb/mariadb.log /var/log/weirdo-project/logs/mariadb/mariadb.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102651]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102651]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102654]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/tempest.log /var/log/weirdo-project/logs/tempest.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102654]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102654]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102657]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dstat.log /var/log/weirdo-project/logs/dstat.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102657]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102657]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102660]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iostat.log /var/log/weirdo-project/logs/iostat.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102660]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102660]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102663]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iotop.log /var/log/weirdo-project/logs/iotop.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102663]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102663]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102666]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102666]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102666]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102669]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102669]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102669]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102672]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102672]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102672]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102675]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102675]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102675]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102678]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102678]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102678]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102681]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102681]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102681]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102684]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102684]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102684]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:56 np0005544966.novalocal sudo[102687]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.txt Dec 03 22:45:56 np0005544966.novalocal sudo[102687]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:56 np0005544966.novalocal sudo[102687]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102690]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.log /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102690]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102693]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102693]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102696]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-pki.log /var/log/weirdo-project/logs/openvswitch/ovs-pki.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102696]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102699]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovsdb-server.log /var/log/weirdo-project/logs/openvswitch/ovsdb-server.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102699]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102702]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.log /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102702]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102705]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_error.log /var/log/weirdo-project/logs/apache/horizon_error.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102705]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102708]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_error.log /var/log/weirdo-project/logs/apache/horizon_ssl_error.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102708]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102711]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102711]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102714]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102714]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102717]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102717]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102720]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102720]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102723]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102723]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102726]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102726]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102729]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102729]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102732]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102732]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102735]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_access.log /var/log/weirdo-project/logs/apache/horizon_access.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102735]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102738]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_access.log /var/log/weirdo-project/logs/apache/horizon_ssl_access.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102738]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102741]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102741]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102744]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102744]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102744]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102747]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102747]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102747]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102750]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102750]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102750]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102753]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.txt Dec 03 22:45:57 np0005544966.novalocal sudo[102753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:57 np0005544966.novalocal sudo[102753]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:57 np0005544966.novalocal sudo[102756]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102756]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102759]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102759]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102762]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102762]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102765]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/redis.log /var/log/weirdo-project/logs/redis/redis.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102765]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102768]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/sentinel.log /var/log/weirdo-project/logs/redis/sentinel.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102768]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102771]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.log /var/log/weirdo-project/logs/dnf/dnf.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102771]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102774]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.rpm.log /var/log/weirdo-project/logs/dnf/dnf.rpm.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102774]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102778]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/zuul /var/log/weirdo-project/logs/sudoers.d/zuul.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102778]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102781]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102781]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102781]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102784]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/glance /var/log/weirdo-project/logs/sudoers.d/glance.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102784]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102784]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102787]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/nova /var/log/weirdo-project/logs/sudoers.d/nova.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102787]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102787]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102790]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/neutron /var/log/weirdo-project/logs/sudoers.d/neutron.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102790]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102793]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/cinder /var/log/weirdo-project/logs/sudoers.d/cinder.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102793]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102796]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/manila /var/log/weirdo-project/logs/sudoers.d/manila.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102796]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102796]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102799]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102799]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102799]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102802]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102802]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102802]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102805]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102805]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102805]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102808]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102808]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102811]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102811]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102811]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102814]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102814]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102814]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102817]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102817]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102820]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102820]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102820]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:58 np0005544966.novalocal sudo[102823]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs.txt Dec 03 22:45:58 np0005544966.novalocal sudo[102823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:58 np0005544966.novalocal sudo[102823]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102826]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102826]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102829]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102829]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102829]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102832]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102832]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102835]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102835]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102838]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102838]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102841]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102841]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102844]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102844]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102847]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102847]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102850]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102850]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102850]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102853]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102853]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102856]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102856]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102856]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102859]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102859]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102859]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102862]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102862]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102862]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102865]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102865]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102865]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102868]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102868]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102868]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102871]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102871]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102871]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102874]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102874]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102874]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102877]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/api-paste.ini /var/log/weirdo-project/logs/etc/cinder/api-paste.ini.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102877]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102877]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102880]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/cinder.conf /var/log/weirdo-project/logs/etc/cinder/cinder.conf.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102880]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102880]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102883]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/resource_filters.json /var/log/weirdo-project/logs/etc/cinder/resource_filters.json.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102883]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102883]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102886]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102886]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102886]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102889]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005544966.novalocal.pem /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005544966.novalocal.pem.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102889]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:45:59 np0005544966.novalocal sudo[102889]: pam_unix(sudo:session): session closed for user root Dec 03 22:45:59 np0005544966.novalocal sudo[102892]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/policy.yaml /var/log/weirdo-project/logs/etc/cinder/policy.yaml.txt Dec 03 22:45:59 np0005544966.novalocal sudo[102892]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102892]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal systemd[1]: Starting system activity accounting tool... Dec 03 22:46:00 np0005544966.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 03 22:46:00 np0005544966.novalocal systemd[1]: Finished system activity accounting tool. Dec 03 22:46:00 np0005544966.novalocal sudo[102895]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005544966.novalocal.pem /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005544966.novalocal.pem.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102895]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102895]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102899]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102899]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102902]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api.conf /var/log/weirdo-project/logs/etc/glance/glance-api.conf.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102902]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102905]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-cache.conf /var/log/weirdo-project/logs/etc/glance/glance-cache.conf.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102905]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102908]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102908]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102912]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102912]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102916]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-swift.conf /var/log/weirdo-project/logs/etc/glance/glance-swift.conf.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102916]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102916]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102919]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/rootwrap.conf /var/log/weirdo-project/logs/etc/glance/rootwrap.conf.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102919]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102919]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102922]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/schema-image.json /var/log/weirdo-project/logs/etc/glance/schema-image.json.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102922]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102922]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102925]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/policy.yaml /var/log/weirdo-project/logs/etc/glance/policy.yaml.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102925]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102925]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102928]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102928]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102928]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102931]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102931]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102931]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102934]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102934]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102934]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102937]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102937]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102937]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102940]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102940]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102940]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102943]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102943]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102943]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102946]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102946]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102946]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102949]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102949]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102949]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102952]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102952]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102952]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102955]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102955]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102955]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102958]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102958]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102958]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sshd-session[102910]: Invalid user blue from 189.169.67.183 port 44354 Dec 03 22:46:00 np0005544966.novalocal sudo[102961]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102961]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102961]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102964]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102964]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102964]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:00 np0005544966.novalocal sudo[102967]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json.txt Dec 03 22:46:00 np0005544966.novalocal sudo[102967]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:00 np0005544966.novalocal sudo[102967]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sshd-session[102910]: Received disconnect from 189.169.67.183 port 44354:11: Bye Bye [preauth] Dec 03 22:46:01 np0005544966.novalocal sshd-session[102910]: Disconnected from invalid user blue 189.169.67.183 port 44354 [preauth] Dec 03 22:46:01 np0005544966.novalocal sudo[102970]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[102970]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[102970]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[102973]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[102973]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[102973]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[102976]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[102976]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[102976]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[102979]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[102979]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[102979]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[102982]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[102982]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[102982]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[102985]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[102985]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[102985]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[102988]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[102988]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[102988]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[102991]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[102991]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[102991]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[102994]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[102994]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[102994]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[102997]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[102997]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[102997]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[103000]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[103000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[103000]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[103003]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[103003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[103003]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[103006]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[103006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[103006]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[103009]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[103009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[103009]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[103012]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[103012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[103012]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[103015]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[103015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[103015]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[103018]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[103018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[103018]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[103021]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[103021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[103021]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[103024]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json.txt Dec 03 22:46:01 np0005544966.novalocal sudo[103024]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[103024]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[103027]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0.txt Dec 03 22:46:01 np0005544966.novalocal sudo[103027]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[103027]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[103030]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1.txt Dec 03 22:46:01 np0005544966.novalocal sudo[103030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[103030]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[103033]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2.txt Dec 03 22:46:01 np0005544966.novalocal sudo[103033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[103033]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[103036]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/1 /var/log/weirdo-project/logs/etc/keystone/credential-keys/1.txt Dec 03 22:46:01 np0005544966.novalocal sudo[103036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:01 np0005544966.novalocal sudo[103036]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:01 np0005544966.novalocal sudo[103040]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/0 /var/log/weirdo-project/logs/etc/keystone/credential-keys/0.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103039]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 03 22:46:02 np0005544966.novalocal sudo[103040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103040]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal systemd[1]: Started Session c310 of User root. Dec 03 22:46:02 np0005544966.novalocal sudo[103039]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:46:02 np0005544966.novalocal sudo[103044]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005544966.novalocal.pem /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005544966.novalocal.pem.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103044]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103048]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103048]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103051]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/keystone.conf /var/log/weirdo-project/logs/etc/keystone/keystone.conf.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103051]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103054]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/logging.conf /var/log/weirdo-project/logs/etc/keystone/logging.conf.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103054]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103057]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103057]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103060]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.yaml /var/log/weirdo-project/logs/etc/keystone/policy.yaml.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103060]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103063]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/policy.yaml /var/log/weirdo-project/logs/etc/manila/policy.yaml.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103063]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103067]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/api-paste.ini /var/log/weirdo-project/logs/etc/manila/api-paste.ini.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103067]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103067]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103070]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/manila.conf /var/log/weirdo-project/logs/etc/manila/manila.conf.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103070]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103073]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/rootwrap.conf /var/log/weirdo-project/logs/etc/manila/rootwrap.conf.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103073]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103076]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005544966.novalocal.pem /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005544966.novalocal.pem.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103076]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103039]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal systemd[1]: session-c310.scope: Deactivated successfully. Dec 03 22:46:02 np0005544966.novalocal sudo[103079]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005544966.novalocal.pem /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005544966.novalocal.pem.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103079]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103082]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:46:02 np0005544966.novalocal sudo[103083]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron.conf /var/log/weirdo-project/logs/etc/neutron/neutron.conf.txt Dec 03 22:46:02 np0005544966.novalocal systemd[1]: Started Session c311 of User root. Dec 03 22:46:02 np0005544966.novalocal sudo[103082]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:46:02 np0005544966.novalocal sudo[103083]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103083]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103088]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103088]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103091]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/api-paste.ini /var/log/weirdo-project/logs/etc/neutron/api-paste.ini.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103091]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103094]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103094]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103097]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103097]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103100]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103100]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103103]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103103]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103106]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103106]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103110]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103110]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103110]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103113]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/policy.yaml /var/log/weirdo-project/logs/etc/neutron/policy.yaml.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103082]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal systemd[1]: session-c311.scope: Deactivated successfully. Dec 03 22:46:02 np0005544966.novalocal sudo[103113]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103113]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103116]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 03 22:46:02 np0005544966.novalocal systemd[1]: Started Session c312 of User root. Dec 03 22:46:02 np0005544966.novalocal sudo[103117]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103116]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:46:02 np0005544966.novalocal sudo[103117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103117]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103122]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103122]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103122]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103125]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103125]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103125]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:02 np0005544966.novalocal sudo[103128]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem.txt Dec 03 22:46:02 np0005544966.novalocal sudo[103128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:02 np0005544966.novalocal sudo[103128]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103131]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103131]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103131]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103134]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/conf.d/README /var/log/weirdo-project/logs/etc/neutron/conf.d/README.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103134]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103137]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103137]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103137]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103141]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103141]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103144]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103144]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103147]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/api-paste.ini /var/log/weirdo-project/logs/etc/nova/api-paste.ini.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103116]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal systemd[1]: session-c312.scope: Deactivated successfully. Dec 03 22:46:03 np0005544966.novalocal sudo[103147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103147]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103149]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 03 22:46:03 np0005544966.novalocal sudo[103151]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova.conf /var/log/weirdo-project/logs/etc/nova/nova.conf.txt Dec 03 22:46:03 np0005544966.novalocal systemd[1]: Started Session c313 of User root. Dec 03 22:46:03 np0005544966.novalocal sudo[103149]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 03 22:46:03 np0005544966.novalocal sudo[103151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103151]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103156]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/release /var/log/weirdo-project/logs/etc/nova/release.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103156]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103156]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103159]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/rootwrap.conf /var/log/weirdo-project/logs/etc/nova/rootwrap.conf.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103159]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103159]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103162]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova-compute.conf /var/log/weirdo-project/logs/etc/nova/nova-compute.conf.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103162]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103162]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103165]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.yaml /var/log/weirdo-project/logs/etc/nova/policy.yaml.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103165]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103168]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005544966.novalocal.pem /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005544966.novalocal.pem.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103168]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103168]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103171]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/octavia.conf /var/log/weirdo-project/logs/etc/octavia/octavia.conf.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103171]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103174]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/policy.yaml /var/log/weirdo-project/logs/etc/octavia/policy.yaml.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103174]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103178]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103178]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103181]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103181]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103184]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103184]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103149]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal systemd[1]: session-c313.scope: Deactivated successfully. Dec 03 22:46:03 np0005544966.novalocal sudo[103187]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103187]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103190]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103190]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103193]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103193]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103196]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103196]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103199]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103199]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103202]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103202]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103205]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005544966.novalocal.pem /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005544966.novalocal.pem.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103205]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103208]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/placement.conf /var/log/weirdo-project/logs/etc/placement/placement.conf.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103208]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103211]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.yaml /var/log/weirdo-project/logs/etc/placement/policy.yaml.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103211]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103214]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005544966.novalocal.pem /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005544966.novalocal.pem.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103214]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103217]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103217]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103220]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103220]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103223]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample.txt Dec 03 22:46:03 np0005544966.novalocal sudo[103223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:03 np0005544966.novalocal sudo[103223]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:03 np0005544966.novalocal sudo[103226]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103226]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103229]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/tempest.conf /var/log/weirdo-project/logs/etc/tempest/tempest.conf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103229]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103232]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103232]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103237]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.conf /var/log/weirdo-project/logs/etc/rsyslog.conf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103237]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103240]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005544966.novalocal.pem /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005544966.novalocal.pem.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103240]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103243]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103243]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103246]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103246]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103249]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103249]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103252]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/inetrc /var/log/weirdo-project/logs/etc/rabbitmq/inetrc.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103252]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103255]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103255]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103258]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103258]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103261]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf /var/log/weirdo-project/logs/etc/my.cnf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103261]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103264]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103264]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103267]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103267]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103270]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103270]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103273]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103273]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103276]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103276]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103276]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103279]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103279]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103282]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103282]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103285]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/np0005544966.novalocal.pem /var/log/weirdo-project/logs/etc/my.cnf.d/np0005544966.novalocal.pem.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103285]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103288]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103288]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103291]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103291]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103294]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103294]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103297]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103297]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103300]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu.conf /var/log/weirdo-project/logs/etc/libvirt/qemu.conf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103300]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103303]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103303]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103303]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103306]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103306]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103306]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103309]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:04 np0005544966.novalocal sudo[103309]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:04 np0005544966.novalocal sudo[103312]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf.txt Dec 03 22:46:04 np0005544966.novalocal sudo[103312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103312]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103315]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103315]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103315]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103318]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103318]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103318]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103321]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103321]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103321]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103324]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103324]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103324]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103327]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103327]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103327]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103330]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103330]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103330]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103333]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/network.conf /var/log/weirdo-project/logs/etc/libvirt/network.conf.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103333]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103333]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103336]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103336]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103336]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103339]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103339]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103339]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103342]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103342]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103342]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103345]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103345]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103348]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103348]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103351]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103351]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103351]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103354]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/default.conf /var/log/weirdo-project/logs/etc/openvswitch/default.conf.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103354]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103354]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103357]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~ /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103357]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103357]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103360]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/conf.db /var/log/weirdo-project/logs/etc/openvswitch/conf.db.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103360]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103360]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103363]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103363]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103363]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103366]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103366]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103366]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103369]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103369]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103369]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103372]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103372]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103372]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103375]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103375]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103378]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103378]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103378]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103381]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103381]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103381]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103384]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103384]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:05 np0005544966.novalocal sudo[103384]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:05 np0005544966.novalocal sudo[103387]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/magic /var/log/weirdo-project/logs/etc/httpd/conf/magic.txt Dec 03 22:46:05 np0005544966.novalocal sudo[103387]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103387]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103390]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103390]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103390]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103393]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103393]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103393]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103396]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103396]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103396]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103399]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103399]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103399]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103402]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103402]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103402]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103405]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103405]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103405]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103408]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103408]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103408]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103411]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103411]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103411]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103414]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103414]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103414]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103417]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103417]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103417]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103420]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103420]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103420]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103423]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103423]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103426]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103426]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103429]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103429]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103432]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103432]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103435]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103435]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103438]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103438]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103441]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103441]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103444]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103444]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103447]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103447]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103450]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103450]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103453]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103453]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103456]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103456]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103459]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103459]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103462]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103462]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103465]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103465]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:06 np0005544966.novalocal sudo[103468]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load.txt Dec 03 22:46:06 np0005544966.novalocal sudo[103468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:06 np0005544966.novalocal sudo[103468]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103471]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103471]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103474]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103474]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103477]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103477]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103480]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103480]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103483]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf /var/log/weirdo-project/logs/etc/redis/redis.conf.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103483]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103486]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103486]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103489]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103489]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103492]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf /var/log/weirdo-project/logs/etc/redis/sentinel.conf.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103492]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103495]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005544966.novalocal.pem /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005544966.novalocal.pem.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103495]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103498]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103498]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103501]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103501]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103504]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103504]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103507]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103507]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103510]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103510]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103510]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103513]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103513]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103513]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103516]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103516]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103516]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103519]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103519]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103522]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103522]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103525]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103525]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103528]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103528]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103531]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103531]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103534]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103534]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103537]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103537]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103540]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103540]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103543]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103543]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103546]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103546]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103549]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:07 np0005544966.novalocal sudo[103549]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:07 np0005544966.novalocal sudo[103552]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt.txt Dec 03 22:46:07 np0005544966.novalocal sudo[103552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:08 np0005544966.novalocal sudo[103552]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[103555]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt.txt Dec 03 22:46:08 np0005544966.novalocal sudo[103555]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:08 np0005544966.novalocal sudo[103555]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[103558]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml.txt Dec 03 22:46:08 np0005544966.novalocal sudo[103558]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:08 np0005544966.novalocal sudo[103558]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[103561]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt.txt Dec 03 22:46:08 np0005544966.novalocal sudo[103561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:08 np0005544966.novalocal sudo[103561]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[103564]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005544966.novalocal.pem /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005544966.novalocal.pem.txt Dec 03 22:46:08 np0005544966.novalocal sudo[103564]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:08 np0005544966.novalocal sudo[103564]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[103567]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf.txt Dec 03 22:46:08 np0005544966.novalocal sudo[103567]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:08 np0005544966.novalocal sudo[103567]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[103570]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo.txt Dec 03 22:46:08 np0005544966.novalocal sudo[103570]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:08 np0005544966.novalocal sudo[103570]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[103573]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo.txt Dec 03 22:46:08 np0005544966.novalocal sudo[103573]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:08 np0005544966.novalocal sudo[103573]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[103576]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo.txt Dec 03 22:46:08 np0005544966.novalocal sudo[103576]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:08 np0005544966.novalocal sudo[103576]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[103579]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo.txt Dec 03 22:46:08 np0005544966.novalocal sudo[103579]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:08 np0005544966.novalocal sudo[103579]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[103583]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo.txt Dec 03 22:46:08 np0005544966.novalocal sudo[103583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:08 np0005544966.novalocal sudo[103583]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[103593]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/passwd /var/log/weirdo-project/logs/etc/passwd.txt Dec 03 22:46:08 np0005544966.novalocal sudo[103593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:08 np0005544966.novalocal sudo[103593]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[103624]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/group /var/log/weirdo-project/logs/etc/group.txt Dec 03 22:46:08 np0005544966.novalocal sudo[103624]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:08 np0005544966.novalocal sudo[103624]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[103627]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml.txt Dec 03 22:46:08 np0005544966.novalocal sudo[103627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:08 np0005544966.novalocal sudo[103627]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[103630]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/fstab /var/log/weirdo-project/logs/etc/fstab.txt Dec 03 22:46:08 np0005544966.novalocal sudo[103630]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 03 22:46:08 np0005544966.novalocal sudo[103630]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[100317]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:08 np0005544966.novalocal sudo[103740]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hiyoaijajhpagvhxgfvjyzvtstyfqvuy ; /usr/bin/python3' Dec 03 22:46:08 np0005544966.novalocal sudo[103740]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:46:08 np0005544966.novalocal python3[103742]: ansible-command Invoked with creates=/var/log/weirdo/cpuinfo.txt _raw_params=cat /proc/cpuinfo >/var/log/weirdo/cpuinfo.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 03 22:46:08 np0005544966.novalocal sudo[103740]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:09 np0005544966.novalocal sudo[103748]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hgrovgjpweayftuuamqbxwnzpjudszti ; /usr/bin/python3' Dec 03 22:46:09 np0005544966.novalocal sudo[103748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:46:09 np0005544966.novalocal python3[103750]: ansible-command Invoked with creates=/var/log/weirdo/df.txt _raw_params=df -h >/var/log/weirdo/df.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 03 22:46:09 np0005544966.novalocal sudo[103748]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:09 np0005544966.novalocal sudo[103755]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ccqldnjlhyprxsgkwffdnrbzcjbjvgmz ; /usr/bin/python3' Dec 03 22:46:09 np0005544966.novalocal sudo[103755]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:46:09 np0005544966.novalocal python3[103757]: ansible-command Invoked with creates=/var/log/weirdo/dmesg.txt _raw_params=dmesg -T >/var/log/weirdo/dmesg.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 03 22:46:09 np0005544966.novalocal sudo[103755]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:09 np0005544966.novalocal sudo[103762]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mkawivhwwlhpzsxyyivdzbadtuhjgskp ; /usr/bin/python3' Dec 03 22:46:09 np0005544966.novalocal sudo[103762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:46:09 np0005544966.novalocal python3[103764]: ansible-command Invoked with creates=/var/log/weirdo/fdisk.txt _raw_params=fdisk -l >/var/log/weirdo/fdisk.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 03 22:46:09 np0005544966.novalocal sudo[103762]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:09 np0005544966.novalocal sudo[103769]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-caancanjzbsoagixnbmtrtwkabsoxmad ; /usr/bin/python3' Dec 03 22:46:09 np0005544966.novalocal sudo[103769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:46:09 np0005544966.novalocal python3[103771]: ansible-command Invoked with creates=/var/log/weirdo/getenforce.txt _raw_params=getenforce >/var/log/weirdo/getenforce.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 03 22:46:09 np0005544966.novalocal sudo[103769]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:10 np0005544966.novalocal sudo[103776]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vjyfjfjepafzbbvpzthfrjzogttgfptq ; /usr/bin/python3' Dec 03 22:46:10 np0005544966.novalocal sudo[103776]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:46:10 np0005544966.novalocal python3[103778]: ansible-command Invoked with creates=/var/log/weirdo/hosts.txt _raw_params=cat /etc/hosts >/var/log/weirdo/hosts.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 03 22:46:10 np0005544966.novalocal sudo[103776]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:10 np0005544966.novalocal sudo[103783]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-quaxjluhkrrgoipatbjohkuuecylkqmi ; /usr/bin/python3' Dec 03 22:46:10 np0005544966.novalocal sudo[103783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:46:10 np0005544966.novalocal python3[103785]: ansible-command Invoked with creates=/var/log/weirdo/ip.txt _raw_params=ip a >/var/log/weirdo/ip.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 03 22:46:10 np0005544966.novalocal sudo[103783]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:10 np0005544966.novalocal sudo[103790]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xmmygjjswwsnihzjixlistlaxvcrqpeb ; /usr/bin/python3' Dec 03 22:46:10 np0005544966.novalocal sudo[103790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:46:10 np0005544966.novalocal python3[103792]: ansible-command Invoked with creates=/var/log/weirdo/iptables.txt _raw_params=iptables -vnL >/var/log/weirdo/iptables.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 03 22:46:10 np0005544966.novalocal sudo[103790]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:10 np0005544966.novalocal sudo[103797]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lokernaxvmqfbvxxhvsvxwruamrbobdi ; /usr/bin/python3' Dec 03 22:46:10 np0005544966.novalocal sudo[103797]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:46:11 np0005544966.novalocal python3[103799]: ansible-command Invoked with creates=/var/log/weirdo/iptables_nat.txt _raw_params=iptables -vnL -t nat >/var/log/weirdo/iptables_nat.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 03 22:46:11 np0005544966.novalocal sudo[103797]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:11 np0005544966.novalocal sudo[103804]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-peukswwvjsdyisttvhfdxwpyqcynkmhb ; /usr/bin/python3' Dec 03 22:46:11 np0005544966.novalocal sudo[103804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:46:11 np0005544966.novalocal python3[103806]: ansible-command Invoked with creates=/var/log/weirdo/iptables_mangle.txt _raw_params=iptables -vnL -t mangle >/var/log/weirdo/iptables_mangle.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 03 22:46:11 np0005544966.novalocal sudo[103804]: pam_unix(sudo:session): session closed for user root Dec 03 22:46:11 np0005544966.novalocal sudo[103811]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uedmegkfsunnspajydjapvaxgmomygjl ; /usr/bin/python3' Dec 03 22:46:11 np0005544966.novalocal sudo[103811]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 03 22:46:11 np0005544966.novalocal python3[103813]: ansible-command Invoked with creates=/var/log/weirdo/journalctl.txt _raw_params=journalctl --no-pager >/var/log/weirdo/journalctl.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None