Jan 22 13:02:36 localhost kernel: Linux version 5.14.0-661.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-14), GNU ld version 2.35.2-69.el9) #1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026 Jan 22 13:02:36 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Jan 22 13:02:36 localhost kernel: Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 root=UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Jan 22 13:02:36 localhost kernel: BIOS-provided physical RAM map: Jan 22 13:02:36 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jan 22 13:02:36 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jan 22 13:02:36 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jan 22 13:02:36 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Jan 22 13:02:36 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Jan 22 13:02:36 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jan 22 13:02:36 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jan 22 13:02:36 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable Jan 22 13:02:36 localhost kernel: NX (Execute Disable) protection: active Jan 22 13:02:36 localhost kernel: APIC: Static calls initialized Jan 22 13:02:36 localhost kernel: SMBIOS 2.8 present. Jan 22 13:02:36 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Jan 22 13:02:36 localhost kernel: Hypervisor detected: KVM Jan 22 13:02:36 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jan 22 13:02:36 localhost kernel: kvm-clock: using sched offset of 3498519858 cycles Jan 22 13:02:36 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jan 22 13:02:36 localhost kernel: tsc: Detected 2799.998 MHz processor Jan 22 13:02:36 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jan 22 13:02:36 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jan 22 13:02:36 localhost kernel: last_pfn = 0x240000 max_arch_pfn = 0x400000000 Jan 22 13:02:36 localhost kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Jan 22 13:02:36 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jan 22 13:02:36 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Jan 22 13:02:36 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Jan 22 13:02:36 localhost kernel: Using GB pages for direct mapping Jan 22 13:02:36 localhost kernel: RAMDISK: [mem 0x2d426000-0x32a0afff] Jan 22 13:02:36 localhost kernel: ACPI: Early table checksum verification disabled Jan 22 13:02:36 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Jan 22 13:02:36 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 13:02:36 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 13:02:36 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 13:02:36 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Jan 22 13:02:36 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 13:02:36 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 13:02:36 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Jan 22 13:02:36 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Jan 22 13:02:36 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Jan 22 13:02:36 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Jan 22 13:02:36 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Jan 22 13:02:36 localhost kernel: No NUMA configuration found Jan 22 13:02:36 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000023fffffff] Jan 22 13:02:36 localhost kernel: NODE_DATA(0) allocated [mem 0x23ffd5000-0x23fffffff] Jan 22 13:02:36 localhost kernel: crashkernel reserved: 0x00000000af000000 - 0x00000000bf000000 (256 MB) Jan 22 13:02:36 localhost kernel: Zone ranges: Jan 22 13:02:36 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jan 22 13:02:36 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jan 22 13:02:36 localhost kernel: Normal [mem 0x0000000100000000-0x000000023fffffff] Jan 22 13:02:36 localhost kernel: Device empty Jan 22 13:02:36 localhost kernel: Movable zone start for each node Jan 22 13:02:36 localhost kernel: Early memory node ranges Jan 22 13:02:36 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jan 22 13:02:36 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Jan 22 13:02:36 localhost kernel: node 0: [mem 0x0000000100000000-0x000000023fffffff] Jan 22 13:02:36 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000023fffffff] Jan 22 13:02:36 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jan 22 13:02:36 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jan 22 13:02:36 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Jan 22 13:02:36 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Jan 22 13:02:36 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jan 22 13:02:36 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jan 22 13:02:36 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jan 22 13:02:36 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jan 22 13:02:36 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jan 22 13:02:36 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jan 22 13:02:36 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jan 22 13:02:36 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jan 22 13:02:36 localhost kernel: TSC deadline timer available Jan 22 13:02:36 localhost kernel: CPU topo: Max. logical packages: 8 Jan 22 13:02:36 localhost kernel: CPU topo: Max. logical dies: 8 Jan 22 13:02:36 localhost kernel: CPU topo: Max. dies per package: 1 Jan 22 13:02:36 localhost kernel: CPU topo: Max. threads per core: 1 Jan 22 13:02:36 localhost kernel: CPU topo: Num. cores per package: 1 Jan 22 13:02:36 localhost kernel: CPU topo: Num. threads per package: 1 Jan 22 13:02:36 localhost kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Jan 22 13:02:36 localhost kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Jan 22 13:02:36 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Jan 22 13:02:36 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Jan 22 13:02:36 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Jan 22 13:02:36 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Jan 22 13:02:36 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Jan 22 13:02:36 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Jan 22 13:02:36 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Jan 22 13:02:36 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Jan 22 13:02:36 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Jan 22 13:02:36 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Jan 22 13:02:36 localhost kernel: Booting paravirtualized kernel on KVM Jan 22 13:02:36 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jan 22 13:02:36 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Jan 22 13:02:36 localhost kernel: percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 Jan 22 13:02:36 localhost kernel: pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 Jan 22 13:02:36 localhost kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Jan 22 13:02:36 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Jan 22 13:02:36 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 root=UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Jan 22 13:02:36 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64", will be passed to user space. Jan 22 13:02:36 localhost kernel: random: crng init done Jan 22 13:02:36 localhost kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Jan 22 13:02:36 localhost kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jan 22 13:02:36 localhost kernel: Fallback order for Node 0: 0 Jan 22 13:02:36 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 2064091 Jan 22 13:02:36 localhost kernel: Policy zone: Normal Jan 22 13:02:36 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jan 22 13:02:36 localhost kernel: software IO TLB: area num 8. Jan 22 13:02:36 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Jan 22 13:02:36 localhost kernel: ftrace: allocating 49417 entries in 194 pages Jan 22 13:02:36 localhost kernel: ftrace: allocated 194 pages with 3 groups Jan 22 13:02:36 localhost kernel: Dynamic Preempt: voluntary Jan 22 13:02:36 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Jan 22 13:02:36 localhost kernel: rcu: RCU event tracing is enabled. Jan 22 13:02:36 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Jan 22 13:02:36 localhost kernel: Trampoline variant of Tasks RCU enabled. Jan 22 13:02:36 localhost kernel: Rude variant of Tasks RCU enabled. Jan 22 13:02:36 localhost kernel: Tracing variant of Tasks RCU enabled. Jan 22 13:02:36 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jan 22 13:02:36 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Jan 22 13:02:36 localhost kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Jan 22 13:02:36 localhost kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Jan 22 13:02:36 localhost kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Jan 22 13:02:36 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Jan 22 13:02:36 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Jan 22 13:02:36 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Jan 22 13:02:36 localhost kernel: Console: colour VGA+ 80x25 Jan 22 13:02:36 localhost kernel: printk: console [ttyS0] enabled Jan 22 13:02:36 localhost kernel: ACPI: Core revision 20230331 Jan 22 13:02:36 localhost kernel: APIC: Switch to symmetric I/O mode setup Jan 22 13:02:36 localhost kernel: x2apic enabled Jan 22 13:02:36 localhost kernel: APIC: Switched APIC routing to: physical x2apic Jan 22 13:02:36 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jan 22 13:02:36 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Jan 22 13:02:36 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jan 22 13:02:36 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jan 22 13:02:36 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jan 22 13:02:36 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jan 22 13:02:36 localhost kernel: Spectre V2 : Mitigation: Retpolines Jan 22 13:02:36 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Jan 22 13:02:36 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Jan 22 13:02:36 localhost kernel: RETBleed: Mitigation: untrained return thunk Jan 22 13:02:36 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jan 22 13:02:36 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Jan 22 13:02:36 localhost kernel: Speculative Return Stack Overflow: IBPB-extending microcode not applied! Jan 22 13:02:36 localhost kernel: Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options. Jan 22 13:02:36 localhost kernel: x86/bugs: return thunk changed Jan 22 13:02:36 localhost kernel: Speculative Return Stack Overflow: Vulnerable: Safe RET, no microcode Jan 22 13:02:36 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jan 22 13:02:36 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jan 22 13:02:36 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jan 22 13:02:36 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jan 22 13:02:36 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Jan 22 13:02:36 localhost kernel: Freeing SMP alternatives memory: 40K Jan 22 13:02:36 localhost kernel: pid_max: default: 32768 minimum: 301 Jan 22 13:02:36 localhost kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf Jan 22 13:02:36 localhost kernel: landlock: Up and running. Jan 22 13:02:36 localhost kernel: Yama: becoming mindful. Jan 22 13:02:36 localhost kernel: SELinux: Initializing. Jan 22 13:02:36 localhost kernel: LSM support for eBPF active Jan 22 13:02:36 localhost kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jan 22 13:02:36 localhost kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jan 22 13:02:36 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Jan 22 13:02:36 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Jan 22 13:02:36 localhost kernel: ... version: 0 Jan 22 13:02:36 localhost kernel: ... bit width: 48 Jan 22 13:02:36 localhost kernel: ... generic registers: 6 Jan 22 13:02:36 localhost kernel: ... value mask: 0000ffffffffffff Jan 22 13:02:36 localhost kernel: ... max period: 00007fffffffffff Jan 22 13:02:36 localhost kernel: ... fixed-purpose events: 0 Jan 22 13:02:36 localhost kernel: ... event mask: 000000000000003f Jan 22 13:02:36 localhost kernel: signal: max sigframe size: 1776 Jan 22 13:02:36 localhost kernel: rcu: Hierarchical SRCU implementation. Jan 22 13:02:36 localhost kernel: rcu: Max phase no-delay instances is 400. Jan 22 13:02:36 localhost kernel: smp: Bringing up secondary CPUs ... Jan 22 13:02:36 localhost kernel: smpboot: x86: Booting SMP configuration: Jan 22 13:02:36 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Jan 22 13:02:36 localhost kernel: smp: Brought up 1 node, 8 CPUs Jan 22 13:02:36 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Jan 22 13:02:36 localhost kernel: node 0 deferred pages initialised in 11ms Jan 22 13:02:36 localhost kernel: Memory: 7763820K/8388068K available (16384K kernel code, 5797K rwdata, 13916K rodata, 4200K init, 7192K bss, 618364K reserved, 0K cma-reserved) Jan 22 13:02:36 localhost kernel: devtmpfs: initialized Jan 22 13:02:36 localhost kernel: x86/mm: Memory block size: 128MB Jan 22 13:02:36 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jan 22 13:02:36 localhost kernel: futex hash table entries: 2048 (131072 bytes on 1 NUMA nodes, total 128 KiB, linear). Jan 22 13:02:36 localhost kernel: pinctrl core: initialized pinctrl subsystem Jan 22 13:02:36 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jan 22 13:02:36 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations Jan 22 13:02:36 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jan 22 13:02:36 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jan 22 13:02:36 localhost kernel: audit: initializing netlink subsys (disabled) Jan 22 13:02:36 localhost kernel: audit: type=2000 audit(1769104954.579:1): state=initialized audit_enabled=0 res=1 Jan 22 13:02:36 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Jan 22 13:02:36 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Jan 22 13:02:36 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Jan 22 13:02:36 localhost kernel: cpuidle: using governor menu Jan 22 13:02:36 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jan 22 13:02:36 localhost kernel: PCI: Using configuration type 1 for base access Jan 22 13:02:36 localhost kernel: PCI: Using configuration type 1 for extended access Jan 22 13:02:36 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jan 22 13:02:36 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Jan 22 13:02:36 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Jan 22 13:02:36 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Jan 22 13:02:36 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Jan 22 13:02:36 localhost kernel: Demotion targets for Node 0: null Jan 22 13:02:36 localhost kernel: cryptd: max_cpu_qlen set to 1000 Jan 22 13:02:36 localhost kernel: ACPI: Added _OSI(Module Device) Jan 22 13:02:36 localhost kernel: ACPI: Added _OSI(Processor Device) Jan 22 13:02:36 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Jan 22 13:02:36 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jan 22 13:02:36 localhost kernel: ACPI: Interpreter enabled Jan 22 13:02:36 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Jan 22 13:02:36 localhost kernel: ACPI: Using IOAPIC for interrupt routing Jan 22 13:02:36 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jan 22 13:02:36 localhost kernel: PCI: Using E820 reservations for host bridge windows Jan 22 13:02:36 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Jan 22 13:02:36 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jan 22 13:02:36 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Jan 22 13:02:36 localhost kernel: acpiphp: Slot [3] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [4] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [5] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [6] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [7] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [8] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [9] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [10] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [11] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [12] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [13] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [14] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [15] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [16] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [17] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [18] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [19] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [20] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [21] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [22] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [23] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [24] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [25] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [26] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [27] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [28] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [29] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [30] registered Jan 22 13:02:36 localhost kernel: acpiphp: Slot [31] registered Jan 22 13:02:36 localhost kernel: PCI host bridge to bus 0000:00 Jan 22 13:02:36 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jan 22 13:02:36 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jan 22 13:02:36 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jan 22 13:02:36 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jan 22 13:02:36 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x240000000-0x2bfffffff window] Jan 22 13:02:36 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jan 22 13:02:36 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Jan 22 13:02:36 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Jan 22 13:02:36 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Jan 22 13:02:36 localhost kernel: pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] Jan 22 13:02:36 localhost kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Jan 22 13:02:36 localhost kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Jan 22 13:02:36 localhost kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Jan 22 13:02:36 localhost kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Jan 22 13:02:36 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Jan 22 13:02:36 localhost kernel: pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] Jan 22 13:02:36 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Jan 22 13:02:36 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Jan 22 13:02:36 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Jan 22 13:02:36 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Jan 22 13:02:36 localhost kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Jan 22 13:02:36 localhost kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Jan 22 13:02:36 localhost kernel: pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] Jan 22 13:02:36 localhost kernel: pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] Jan 22 13:02:36 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jan 22 13:02:36 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Jan 22 13:02:36 localhost kernel: pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] Jan 22 13:02:36 localhost kernel: pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] Jan 22 13:02:36 localhost kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Jan 22 13:02:36 localhost kernel: pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] Jan 22 13:02:36 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Jan 22 13:02:36 localhost kernel: pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] Jan 22 13:02:36 localhost kernel: pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] Jan 22 13:02:36 localhost kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Jan 22 13:02:36 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Jan 22 13:02:36 localhost kernel: pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] Jan 22 13:02:36 localhost kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Jan 22 13:02:36 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint Jan 22 13:02:36 localhost kernel: pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] Jan 22 13:02:36 localhost kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Jan 22 13:02:36 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jan 22 13:02:36 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jan 22 13:02:36 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jan 22 13:02:36 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jan 22 13:02:36 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jan 22 13:02:36 localhost kernel: iommu: Default domain type: Translated Jan 22 13:02:36 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jan 22 13:02:36 localhost kernel: SCSI subsystem initialized Jan 22 13:02:36 localhost kernel: ACPI: bus type USB registered Jan 22 13:02:36 localhost kernel: usbcore: registered new interface driver usbfs Jan 22 13:02:36 localhost kernel: usbcore: registered new interface driver hub Jan 22 13:02:36 localhost kernel: usbcore: registered new device driver usb Jan 22 13:02:36 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Jan 22 13:02:36 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jan 22 13:02:36 localhost kernel: PTP clock support registered Jan 22 13:02:36 localhost kernel: EDAC MC: Ver: 3.0.0 Jan 22 13:02:36 localhost kernel: NetLabel: Initializing Jan 22 13:02:36 localhost kernel: NetLabel: domain hash size = 128 Jan 22 13:02:36 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Jan 22 13:02:36 localhost kernel: NetLabel: unlabeled traffic allowed by default Jan 22 13:02:36 localhost kernel: PCI: Using ACPI for IRQ routing Jan 22 13:02:36 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Jan 22 13:02:36 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jan 22 13:02:36 localhost kernel: e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] Jan 22 13:02:36 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Jan 22 13:02:36 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Jan 22 13:02:36 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jan 22 13:02:36 localhost kernel: vgaarb: loaded Jan 22 13:02:36 localhost kernel: clocksource: Switched to clocksource kvm-clock Jan 22 13:02:36 localhost kernel: VFS: Disk quotas dquot_6.6.0 Jan 22 13:02:36 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jan 22 13:02:36 localhost kernel: pnp: PnP ACPI init Jan 22 13:02:36 localhost kernel: pnp 00:03: [dma 2] Jan 22 13:02:36 localhost kernel: pnp: PnP ACPI: found 5 devices Jan 22 13:02:36 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jan 22 13:02:36 localhost kernel: NET: Registered PF_INET protocol family Jan 22 13:02:36 localhost kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jan 22 13:02:36 localhost kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Jan 22 13:02:36 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jan 22 13:02:36 localhost kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Jan 22 13:02:36 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Jan 22 13:02:36 localhost kernel: TCP: Hash tables configured (established 65536 bind 65536) Jan 22 13:02:36 localhost kernel: MPTCP token hash table entries: 8192 (order: 5, 196608 bytes, linear) Jan 22 13:02:36 localhost kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Jan 22 13:02:36 localhost kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Jan 22 13:02:36 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jan 22 13:02:36 localhost kernel: NET: Registered PF_XDP protocol family Jan 22 13:02:36 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jan 22 13:02:36 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jan 22 13:02:36 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jan 22 13:02:36 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Jan 22 13:02:36 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x240000000-0x2bfffffff window] Jan 22 13:02:36 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Jan 22 13:02:36 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jan 22 13:02:36 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Jan 22 13:02:36 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x160 took 79100 usecs Jan 22 13:02:36 localhost kernel: PCI: CLS 0 bytes, default 64 Jan 22 13:02:36 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jan 22 13:02:36 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Jan 22 13:02:36 localhost kernel: ACPI: bus type thunderbolt registered Jan 22 13:02:36 localhost kernel: Trying to unpack rootfs image as initramfs... Jan 22 13:02:36 localhost kernel: Initialise system trusted keyrings Jan 22 13:02:36 localhost kernel: Key type blacklist registered Jan 22 13:02:36 localhost kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 Jan 22 13:02:36 localhost kernel: zbud: loaded Jan 22 13:02:36 localhost kernel: integrity: Platform Keyring initialized Jan 22 13:02:36 localhost kernel: integrity: Machine keyring initialized Jan 22 13:02:36 localhost kernel: Freeing initrd memory: 87956K Jan 22 13:02:36 localhost kernel: NET: Registered PF_ALG protocol family Jan 22 13:02:36 localhost kernel: xor: automatically using best checksumming function avx Jan 22 13:02:36 localhost kernel: Key type asymmetric registered Jan 22 13:02:36 localhost kernel: Asymmetric key parser 'x509' registered Jan 22 13:02:36 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Jan 22 13:02:36 localhost kernel: io scheduler mq-deadline registered Jan 22 13:02:36 localhost kernel: io scheduler kyber registered Jan 22 13:02:36 localhost kernel: io scheduler bfq registered Jan 22 13:02:36 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Jan 22 13:02:36 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Jan 22 13:02:36 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Jan 22 13:02:36 localhost kernel: ACPI: button: Power Button [PWRF] Jan 22 13:02:36 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Jan 22 13:02:36 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jan 22 13:02:36 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jan 22 13:02:36 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jan 22 13:02:36 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jan 22 13:02:36 localhost kernel: Non-volatile memory driver v1.3 Jan 22 13:02:36 localhost kernel: rdac: device handler registered Jan 22 13:02:36 localhost kernel: hp_sw: device handler registered Jan 22 13:02:36 localhost kernel: emc: device handler registered Jan 22 13:02:36 localhost kernel: alua: device handler registered Jan 22 13:02:36 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Jan 22 13:02:36 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Jan 22 13:02:36 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Jan 22 13:02:36 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Jan 22 13:02:36 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Jan 22 13:02:36 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Jan 22 13:02:36 localhost kernel: usb usb1: Product: UHCI Host Controller Jan 22 13:02:36 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-661.el9.x86_64 uhci_hcd Jan 22 13:02:36 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Jan 22 13:02:36 localhost kernel: hub 1-0:1.0: USB hub found Jan 22 13:02:36 localhost kernel: hub 1-0:1.0: 2 ports detected Jan 22 13:02:36 localhost kernel: usbcore: registered new interface driver usbserial_generic Jan 22 13:02:36 localhost kernel: usbserial: USB Serial support registered for generic Jan 22 13:02:36 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jan 22 13:02:36 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jan 22 13:02:36 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jan 22 13:02:36 localhost kernel: mousedev: PS/2 mouse device common for all mice Jan 22 13:02:36 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Jan 22 13:02:36 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Jan 22 13:02:36 localhost kernel: rtc_cmos 00:04: registered as rtc0 Jan 22 13:02:36 localhost kernel: rtc_cmos 00:04: setting system clock to 2026-01-22T18:02:35 UTC (1769104955) Jan 22 13:02:36 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Jan 22 13:02:36 localhost kernel: amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled Jan 22 13:02:36 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Jan 22 13:02:36 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Jan 22 13:02:36 localhost kernel: usbcore: registered new interface driver usbhid Jan 22 13:02:36 localhost kernel: usbhid: USB HID core driver Jan 22 13:02:36 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Jan 22 13:02:36 localhost kernel: drop_monitor: Initializing network drop monitor service Jan 22 13:02:36 localhost kernel: Initializing XFRM netlink socket Jan 22 13:02:36 localhost kernel: NET: Registered PF_INET6 protocol family Jan 22 13:02:36 localhost kernel: Segment Routing with IPv6 Jan 22 13:02:36 localhost kernel: NET: Registered PF_PACKET protocol family Jan 22 13:02:36 localhost kernel: mpls_gso: MPLS GSO support Jan 22 13:02:36 localhost kernel: IPI shorthand broadcast: enabled Jan 22 13:02:36 localhost kernel: AVX2 version of gcm_enc/dec engaged. Jan 22 13:02:36 localhost kernel: AES CTR mode by8 optimization enabled Jan 22 13:02:36 localhost kernel: sched_clock: Marking stable (1263001355, 146241272)->(1528957656, -119715029) Jan 22 13:02:36 localhost kernel: registered taskstats version 1 Jan 22 13:02:36 localhost kernel: Loading compiled-in X.509 certificates Jan 22 13:02:36 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 04453f216699002fd63185eeab832de990bee6d7' Jan 22 13:02:36 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Jan 22 13:02:36 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Jan 22 13:02:36 localhost kernel: Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' Jan 22 13:02:36 localhost kernel: Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' Jan 22 13:02:36 localhost kernel: Demotion targets for Node 0: null Jan 22 13:02:36 localhost kernel: page_owner is disabled Jan 22 13:02:36 localhost kernel: Key type .fscrypt registered Jan 22 13:02:36 localhost kernel: Key type fscrypt-provisioning registered Jan 22 13:02:36 localhost kernel: Key type big_key registered Jan 22 13:02:36 localhost kernel: Key type encrypted registered Jan 22 13:02:36 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Jan 22 13:02:36 localhost kernel: Loading compiled-in module X.509 certificates Jan 22 13:02:36 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 04453f216699002fd63185eeab832de990bee6d7' Jan 22 13:02:36 localhost kernel: ima: Allocated hash algorithm: sha256 Jan 22 13:02:36 localhost kernel: ima: No architecture policies found Jan 22 13:02:36 localhost kernel: evm: Initialising EVM extended attributes: Jan 22 13:02:36 localhost kernel: evm: security.selinux Jan 22 13:02:36 localhost kernel: evm: security.SMACK64 (disabled) Jan 22 13:02:36 localhost kernel: evm: security.SMACK64EXEC (disabled) Jan 22 13:02:36 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Jan 22 13:02:36 localhost kernel: evm: security.SMACK64MMAP (disabled) Jan 22 13:02:36 localhost kernel: evm: security.apparmor (disabled) Jan 22 13:02:36 localhost kernel: evm: security.ima Jan 22 13:02:36 localhost kernel: evm: security.capability Jan 22 13:02:36 localhost kernel: evm: HMAC attrs: 0x1 Jan 22 13:02:36 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Jan 22 13:02:36 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Jan 22 13:02:36 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Jan 22 13:02:36 localhost kernel: usb 1-1: Product: QEMU USB Tablet Jan 22 13:02:36 localhost kernel: usb 1-1: Manufacturer: QEMU Jan 22 13:02:36 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Jan 22 13:02:36 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Jan 22 13:02:36 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Jan 22 13:02:36 localhost kernel: Running certificate verification RSA selftest Jan 22 13:02:36 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Jan 22 13:02:36 localhost kernel: Running certificate verification ECDSA selftest Jan 22 13:02:36 localhost kernel: Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' Jan 22 13:02:36 localhost kernel: clk: Disabling unused clocks Jan 22 13:02:36 localhost kernel: Freeing unused decrypted memory: 2028K Jan 22 13:02:36 localhost kernel: Freeing unused kernel image (initmem) memory: 4200K Jan 22 13:02:36 localhost kernel: Write protecting the kernel read-only data: 30720k Jan 22 13:02:36 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 420K Jan 22 13:02:36 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Jan 22 13:02:36 localhost kernel: Run /init as init process Jan 22 13:02:36 localhost kernel: with arguments: Jan 22 13:02:36 localhost kernel: /init Jan 22 13:02:36 localhost kernel: with environment: Jan 22 13:02:36 localhost kernel: HOME=/ Jan 22 13:02:36 localhost kernel: TERM=linux Jan 22 13:02:36 localhost kernel: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 Jan 22 13:02:36 localhost systemd[1]: systemd 252-64.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 22 13:02:36 localhost systemd[1]: Detected virtualization kvm. Jan 22 13:02:36 localhost systemd[1]: Detected architecture x86-64. Jan 22 13:02:36 localhost systemd[1]: Running in initrd. Jan 22 13:02:36 localhost systemd[1]: No hostname configured, using default hostname. Jan 22 13:02:36 localhost systemd[1]: Hostname set to . Jan 22 13:02:36 localhost systemd[1]: Initializing machine ID from VM UUID. Jan 22 13:02:36 localhost systemd[1]: Queued start job for default target Initrd Default Target. Jan 22 13:02:36 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 22 13:02:36 localhost systemd[1]: Reached target Local Encrypted Volumes. Jan 22 13:02:36 localhost systemd[1]: Reached target Initrd /usr File System. Jan 22 13:02:36 localhost systemd[1]: Reached target Local File Systems. Jan 22 13:02:36 localhost systemd[1]: Reached target Path Units. Jan 22 13:02:36 localhost systemd[1]: Reached target Slice Units. Jan 22 13:02:36 localhost systemd[1]: Reached target Swaps. Jan 22 13:02:36 localhost systemd[1]: Reached target Timer Units. Jan 22 13:02:36 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Jan 22 13:02:36 localhost systemd[1]: Listening on Journal Socket (/dev/log). Jan 22 13:02:36 localhost systemd[1]: Listening on Journal Socket. Jan 22 13:02:36 localhost systemd[1]: Listening on udev Control Socket. Jan 22 13:02:36 localhost systemd[1]: Listening on udev Kernel Socket. Jan 22 13:02:36 localhost systemd[1]: Reached target Socket Units. Jan 22 13:02:36 localhost systemd[1]: Starting Create List of Static Device Nodes... Jan 22 13:02:36 localhost systemd[1]: Starting Journal Service... Jan 22 13:02:36 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Jan 22 13:02:36 localhost systemd[1]: Starting Apply Kernel Variables... Jan 22 13:02:36 localhost systemd[1]: Starting Create System Users... Jan 22 13:02:36 localhost systemd[1]: Starting Setup Virtual Console... Jan 22 13:02:36 localhost systemd[1]: Finished Create List of Static Device Nodes. Jan 22 13:02:36 localhost systemd[1]: Finished Apply Kernel Variables. Jan 22 13:02:36 localhost systemd-journald[303]: Journal started Jan 22 13:02:36 localhost systemd-journald[303]: Runtime Journal (/run/log/journal/05009ee3308f410dad53425a8ffe0a2c) is 8.0M, max 153.6M, 145.6M free. Jan 22 13:02:36 localhost systemd-sysusers[307]: Creating group 'users' with GID 100. Jan 22 13:02:36 localhost systemd[1]: Started Journal Service. Jan 22 13:02:36 localhost systemd-sysusers[307]: Creating group 'dbus' with GID 81. Jan 22 13:02:36 localhost systemd-sysusers[307]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Jan 22 13:02:36 localhost systemd[1]: Finished Create System Users. Jan 22 13:02:36 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Jan 22 13:02:36 localhost systemd[1]: Starting Create Volatile Files and Directories... Jan 22 13:02:36 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Jan 22 13:02:36 localhost systemd[1]: Finished Create Volatile Files and Directories. Jan 22 13:02:36 localhost systemd[1]: Finished Setup Virtual Console. Jan 22 13:02:36 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Jan 22 13:02:36 localhost systemd[1]: Starting dracut cmdline hook... Jan 22 13:02:36 localhost dracut-cmdline[322]: dracut-9 dracut-057-102.git20250818.el9 Jan 22 13:02:36 localhost dracut-cmdline[322]: Using kernel command line parameters: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 root=UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Jan 22 13:02:36 localhost systemd[1]: Finished dracut cmdline hook. Jan 22 13:02:36 localhost systemd[1]: Starting dracut pre-udev hook... Jan 22 13:02:36 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jan 22 13:02:36 localhost kernel: device-mapper: uevent: version 1.0.3 Jan 22 13:02:36 localhost kernel: device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev Jan 22 13:02:36 localhost kernel: RPC: Registered named UNIX socket transport module. Jan 22 13:02:36 localhost kernel: RPC: Registered udp transport module. Jan 22 13:02:36 localhost kernel: RPC: Registered tcp transport module. Jan 22 13:02:36 localhost kernel: RPC: Registered tcp-with-tls transport module. Jan 22 13:02:36 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jan 22 13:02:37 localhost rpc.statd[439]: Version 2.5.4 starting Jan 22 13:02:37 localhost rpc.statd[439]: Initializing NSM state Jan 22 13:02:37 localhost rpc.idmapd[444]: Setting log level to 0 Jan 22 13:02:37 localhost systemd[1]: Finished dracut pre-udev hook. Jan 22 13:02:37 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 22 13:02:37 localhost systemd-udevd[457]: Using default interface naming scheme 'rhel-9.0'. Jan 22 13:02:37 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 22 13:02:37 localhost systemd[1]: Starting dracut pre-trigger hook... Jan 22 13:02:37 localhost systemd[1]: Finished dracut pre-trigger hook. Jan 22 13:02:37 localhost systemd[1]: Starting Coldplug All udev Devices... Jan 22 13:02:37 localhost systemd[1]: Created slice Slice /system/modprobe. Jan 22 13:02:37 localhost systemd[1]: Starting Load Kernel Module configfs... Jan 22 13:02:37 localhost systemd[1]: Finished Coldplug All udev Devices. Jan 22 13:02:37 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 22 13:02:37 localhost systemd[1]: Finished Load Kernel Module configfs. Jan 22 13:02:37 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Jan 22 13:02:37 localhost systemd[1]: Reached target Network. Jan 22 13:02:37 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Jan 22 13:02:37 localhost systemd[1]: Starting dracut initqueue hook... Jan 22 13:02:37 localhost systemd[1]: Mounting Kernel Configuration File System... Jan 22 13:02:37 localhost systemd[1]: Mounted Kernel Configuration File System. Jan 22 13:02:37 localhost systemd[1]: Reached target System Initialization. Jan 22 13:02:37 localhost systemd[1]: Reached target Basic System. Jan 22 13:02:37 localhost kernel: virtio_blk virtio2: 8/0/0 default/read/poll queues Jan 22 13:02:37 localhost kernel: virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) Jan 22 13:02:37 localhost kernel: vda: vda1 Jan 22 13:02:37 localhost systemd-udevd[473]: Network interface NamePolicy= disabled on kernel command line. Jan 22 13:02:37 localhost kernel: libata version 3.00 loaded. Jan 22 13:02:37 localhost kernel: ata_piix 0000:00:01.1: version 2.13 Jan 22 13:02:37 localhost kernel: scsi host0: ata_piix Jan 22 13:02:37 localhost kernel: scsi host1: ata_piix Jan 22 13:02:37 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 Jan 22 13:02:37 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 Jan 22 13:02:37 localhost systemd[1]: Found device /dev/disk/by-uuid/22ac9141-3960-4912-b20e-19fc8a328d40. Jan 22 13:02:37 localhost systemd[1]: Reached target Initrd Root Device. Jan 22 13:02:37 localhost kernel: ata1: found unknown device (class 0) Jan 22 13:02:37 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jan 22 13:02:37 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jan 22 13:02:37 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Jan 22 13:02:37 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jan 22 13:02:37 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jan 22 13:02:37 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 Jan 22 13:02:37 localhost systemd[1]: Finished dracut initqueue hook. Jan 22 13:02:37 localhost systemd[1]: Reached target Preparation for Remote File Systems. Jan 22 13:02:37 localhost systemd[1]: Reached target Remote Encrypted Volumes. Jan 22 13:02:37 localhost systemd[1]: Reached target Remote File Systems. Jan 22 13:02:37 localhost systemd[1]: Starting dracut pre-mount hook... Jan 22 13:02:37 localhost systemd[1]: Finished dracut pre-mount hook. Jan 22 13:02:37 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/22ac9141-3960-4912-b20e-19fc8a328d40... Jan 22 13:02:37 localhost systemd-fsck[554]: /usr/sbin/fsck.xfs: XFS file system. Jan 22 13:02:37 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/22ac9141-3960-4912-b20e-19fc8a328d40. Jan 22 13:02:37 localhost systemd[1]: Mounting /sysroot... Jan 22 13:02:38 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Jan 22 13:02:38 localhost kernel: XFS (vda1): Mounting V5 Filesystem 22ac9141-3960-4912-b20e-19fc8a328d40 Jan 22 13:02:38 localhost kernel: XFS (vda1): Ending clean mount Jan 22 13:02:38 localhost systemd[1]: Mounted /sysroot. Jan 22 13:02:38 localhost systemd[1]: Reached target Initrd Root File System. Jan 22 13:02:38 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Jan 22 13:02:38 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Jan 22 13:02:38 localhost systemd[1]: Reached target Initrd File Systems. Jan 22 13:02:38 localhost systemd[1]: Reached target Initrd Default Target. Jan 22 13:02:38 localhost systemd[1]: Starting dracut mount hook... Jan 22 13:02:38 localhost systemd[1]: Finished dracut mount hook. Jan 22 13:02:38 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Jan 22 13:02:38 localhost rpc.idmapd[444]: exiting on signal 15 Jan 22 13:02:38 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Jan 22 13:02:38 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Jan 22 13:02:38 localhost systemd[1]: Stopped target Network. Jan 22 13:02:38 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Jan 22 13:02:38 localhost systemd[1]: Stopped target Timer Units. Jan 22 13:02:38 localhost systemd[1]: dbus.socket: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Jan 22 13:02:38 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Jan 22 13:02:38 localhost systemd[1]: Stopped target Initrd Default Target. Jan 22 13:02:38 localhost systemd[1]: Stopped target Basic System. Jan 22 13:02:38 localhost systemd[1]: Stopped target Initrd Root Device. Jan 22 13:02:38 localhost systemd[1]: Stopped target Initrd /usr File System. Jan 22 13:02:38 localhost systemd[1]: Stopped target Path Units. Jan 22 13:02:38 localhost systemd[1]: Stopped target Remote File Systems. Jan 22 13:02:38 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Jan 22 13:02:38 localhost systemd[1]: Stopped target Slice Units. Jan 22 13:02:38 localhost systemd[1]: Stopped target Socket Units. Jan 22 13:02:38 localhost systemd[1]: Stopped target System Initialization. Jan 22 13:02:38 localhost systemd[1]: Stopped target Local File Systems. Jan 22 13:02:38 localhost systemd[1]: Stopped target Swaps. Jan 22 13:02:38 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped dracut mount hook. Jan 22 13:02:38 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped dracut pre-mount hook. Jan 22 13:02:38 localhost systemd[1]: Stopped target Local Encrypted Volumes. Jan 22 13:02:38 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Jan 22 13:02:38 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped dracut initqueue hook. Jan 22 13:02:38 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped Apply Kernel Variables. Jan 22 13:02:38 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped Create Volatile Files and Directories. Jan 22 13:02:38 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped Coldplug All udev Devices. Jan 22 13:02:38 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped dracut pre-trigger hook. Jan 22 13:02:38 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Jan 22 13:02:38 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped Setup Virtual Console. Jan 22 13:02:38 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Jan 22 13:02:38 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Closed udev Control Socket. Jan 22 13:02:38 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Closed udev Kernel Socket. Jan 22 13:02:38 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped dracut pre-udev hook. Jan 22 13:02:38 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped dracut cmdline hook. Jan 22 13:02:38 localhost systemd[1]: Starting Cleanup udev Database... Jan 22 13:02:38 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Jan 22 13:02:38 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped Create List of Static Device Nodes. Jan 22 13:02:38 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Stopped Create System Users. Jan 22 13:02:38 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Jan 22 13:02:38 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jan 22 13:02:38 localhost systemd[1]: Finished Cleanup udev Database. Jan 22 13:02:38 localhost systemd[1]: Reached target Switch Root. Jan 22 13:02:38 localhost systemd[1]: Starting Switch Root... Jan 22 13:02:38 localhost systemd[1]: Switching root. Jan 22 13:02:38 localhost systemd-journald[303]: Journal stopped Jan 22 13:02:39 localhost systemd-journald[303]: Received SIGTERM from PID 1 (systemd). Jan 22 13:02:39 localhost kernel: audit: type=1404 audit(1769104958.896:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Jan 22 13:02:39 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 22 13:02:39 localhost kernel: SELinux: policy capability open_perms=1 Jan 22 13:02:39 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 22 13:02:39 localhost kernel: SELinux: policy capability always_check_network=0 Jan 22 13:02:39 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 13:02:39 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 13:02:39 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 13:02:39 localhost kernel: audit: type=1403 audit(1769104959.019:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Jan 22 13:02:39 localhost systemd[1]: Successfully loaded SELinux policy in 125.489ms. Jan 22 13:02:39 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 25.825ms. Jan 22 13:02:39 localhost systemd[1]: systemd 252-64.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 22 13:02:39 localhost systemd[1]: Detected virtualization kvm. Jan 22 13:02:39 localhost systemd[1]: Detected architecture x86-64. Jan 22 13:02:39 localhost systemd-rc-local-generator[634]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:02:39 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Jan 22 13:02:39 localhost systemd[1]: Stopped Switch Root. Jan 22 13:02:39 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jan 22 13:02:39 localhost systemd[1]: Created slice Slice /system/getty. Jan 22 13:02:39 localhost systemd[1]: Created slice Slice /system/serial-getty. Jan 22 13:02:39 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Jan 22 13:02:39 localhost systemd[1]: Created slice User and Session Slice. Jan 22 13:02:39 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 22 13:02:39 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Jan 22 13:02:39 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Jan 22 13:02:39 localhost systemd[1]: Reached target Local Encrypted Volumes. Jan 22 13:02:39 localhost systemd[1]: Stopped target Switch Root. Jan 22 13:02:39 localhost systemd[1]: Stopped target Initrd File Systems. Jan 22 13:02:39 localhost systemd[1]: Stopped target Initrd Root File System. Jan 22 13:02:39 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Jan 22 13:02:39 localhost systemd[1]: Reached target Path Units. Jan 22 13:02:39 localhost systemd[1]: Reached target rpc_pipefs.target. Jan 22 13:02:39 localhost systemd[1]: Reached target Slice Units. Jan 22 13:02:39 localhost systemd[1]: Reached target Swaps. Jan 22 13:02:39 localhost systemd[1]: Reached target Local Verity Protected Volumes. Jan 22 13:02:39 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Jan 22 13:02:39 localhost systemd[1]: Reached target RPC Port Mapper. Jan 22 13:02:39 localhost systemd[1]: Listening on Process Core Dump Socket. Jan 22 13:02:39 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Jan 22 13:02:39 localhost systemd[1]: Listening on udev Control Socket. Jan 22 13:02:39 localhost systemd[1]: Listening on udev Kernel Socket. Jan 22 13:02:39 localhost systemd[1]: Mounting Huge Pages File System... Jan 22 13:02:39 localhost systemd[1]: Mounting POSIX Message Queue File System... Jan 22 13:02:39 localhost systemd[1]: Mounting Kernel Debug File System... Jan 22 13:02:39 localhost systemd[1]: Mounting Kernel Trace File System... Jan 22 13:02:39 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Jan 22 13:02:39 localhost systemd[1]: Starting Create List of Static Device Nodes... Jan 22 13:02:39 localhost systemd[1]: Starting Load Kernel Module configfs... Jan 22 13:02:39 localhost systemd[1]: Starting Load Kernel Module drm... Jan 22 13:02:39 localhost systemd[1]: Starting Load Kernel Module efi_pstore... Jan 22 13:02:39 localhost systemd[1]: Starting Load Kernel Module fuse... Jan 22 13:02:39 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Jan 22 13:02:39 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jan 22 13:02:39 localhost systemd[1]: Stopped File System Check on Root Device. Jan 22 13:02:39 localhost systemd[1]: Stopped Journal Service. Jan 22 13:02:39 localhost systemd[1]: Starting Journal Service... Jan 22 13:02:39 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Jan 22 13:02:39 localhost systemd[1]: Starting Generate network units from Kernel command line... Jan 22 13:02:39 localhost systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jan 22 13:02:39 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Jan 22 13:02:39 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Jan 22 13:02:39 localhost systemd[1]: Starting Apply Kernel Variables... Jan 22 13:02:39 localhost kernel: fuse: init (API version 7.37) Jan 22 13:02:39 localhost systemd[1]: Starting Coldplug All udev Devices... Jan 22 13:02:39 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Jan 22 13:02:39 localhost systemd[1]: Mounted Huge Pages File System. Jan 22 13:02:39 localhost systemd-journald[675]: Journal started Jan 22 13:02:39 localhost systemd-journald[675]: Runtime Journal (/run/log/journal/85ac68c10a6e7ae08ceb898dbdca0cb5) is 8.0M, max 153.6M, 145.6M free. Jan 22 13:02:39 localhost systemd[1]: Queued start job for default target Multi-User System. Jan 22 13:02:39 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Jan 22 13:02:39 localhost systemd[1]: Started Journal Service. Jan 22 13:02:39 localhost systemd[1]: Mounted POSIX Message Queue File System. Jan 22 13:02:39 localhost systemd[1]: Mounted Kernel Debug File System. Jan 22 13:02:39 localhost systemd[1]: Mounted Kernel Trace File System. Jan 22 13:02:39 localhost systemd[1]: Finished Create List of Static Device Nodes. Jan 22 13:02:39 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 22 13:02:39 localhost systemd[1]: Finished Load Kernel Module configfs. Jan 22 13:02:39 localhost systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jan 22 13:02:39 localhost systemd[1]: Finished Load Kernel Module efi_pstore. Jan 22 13:02:39 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Jan 22 13:02:39 localhost systemd[1]: Finished Load Kernel Module fuse. Jan 22 13:02:39 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Jan 22 13:02:39 localhost systemd[1]: Finished Generate network units from Kernel command line. Jan 22 13:02:39 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Jan 22 13:02:39 localhost systemd[1]: Finished Apply Kernel Variables. Jan 22 13:02:39 localhost kernel: ACPI: bus type drm_connector registered Jan 22 13:02:39 localhost systemd[1]: Mounting FUSE Control File System... Jan 22 13:02:39 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Jan 22 13:02:39 localhost systemd[1]: Starting Rebuild Hardware Database... Jan 22 13:02:39 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Jan 22 13:02:39 localhost systemd[1]: Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jan 22 13:02:39 localhost systemd[1]: Starting Load/Save OS Random Seed... Jan 22 13:02:39 localhost systemd[1]: Starting Create System Users... Jan 22 13:02:39 localhost systemd-journald[675]: Runtime Journal (/run/log/journal/85ac68c10a6e7ae08ceb898dbdca0cb5) is 8.0M, max 153.6M, 145.6M free. Jan 22 13:02:39 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 22 13:02:39 localhost systemd[1]: Finished Load Kernel Module drm. Jan 22 13:02:39 localhost systemd[1]: Mounted FUSE Control File System. Jan 22 13:02:39 localhost systemd-journald[675]: Received client request to flush runtime journal. Jan 22 13:02:39 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Jan 22 13:02:39 localhost systemd[1]: Finished Coldplug All udev Devices. Jan 22 13:02:39 localhost systemd[1]: Finished Load/Save OS Random Seed. Jan 22 13:02:39 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Jan 22 13:02:39 localhost systemd[1]: Finished Create System Users. Jan 22 13:02:39 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Jan 22 13:02:39 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Jan 22 13:02:39 localhost systemd[1]: Reached target Preparation for Local File Systems. Jan 22 13:02:39 localhost systemd[1]: Reached target Local File Systems. Jan 22 13:02:39 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Jan 22 13:02:39 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Jan 22 13:02:39 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jan 22 13:02:39 localhost systemd[1]: Update Boot Loader Random Seed was skipped because no trigger condition checks were met. Jan 22 13:02:39 localhost systemd[1]: Starting Automatic Boot Loader Update... Jan 22 13:02:39 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Jan 22 13:02:39 localhost systemd[1]: Starting Create Volatile Files and Directories... Jan 22 13:02:39 localhost bootctl[694]: Couldn't find EFI system partition, skipping. Jan 22 13:02:39 localhost systemd[1]: Finished Automatic Boot Loader Update. Jan 22 13:02:39 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Jan 22 13:02:39 localhost systemd[1]: Finished Create Volatile Files and Directories. Jan 22 13:02:39 localhost systemd[1]: Starting Security Auditing Service... Jan 22 13:02:39 localhost systemd[1]: Starting RPC Bind... Jan 22 13:02:39 localhost systemd[1]: Starting Rebuild Journal Catalog... Jan 22 13:02:39 localhost auditd[700]: audit dispatcher initialized with q_depth=2000 and 1 active plugins Jan 22 13:02:39 localhost auditd[700]: Init complete, auditd 3.1.5 listening for events (startup state enable) Jan 22 13:02:40 localhost systemd[1]: Finished Rebuild Journal Catalog. Jan 22 13:02:40 localhost systemd[1]: Started RPC Bind. Jan 22 13:02:40 localhost augenrules[705]: /sbin/augenrules: No change Jan 22 13:02:40 localhost augenrules[720]: No rules Jan 22 13:02:40 localhost augenrules[720]: enabled 1 Jan 22 13:02:40 localhost augenrules[720]: failure 1 Jan 22 13:02:40 localhost augenrules[720]: pid 700 Jan 22 13:02:40 localhost augenrules[720]: rate_limit 0 Jan 22 13:02:40 localhost augenrules[720]: backlog_limit 8192 Jan 22 13:02:40 localhost augenrules[720]: lost 0 Jan 22 13:02:40 localhost augenrules[720]: backlog 0 Jan 22 13:02:40 localhost augenrules[720]: backlog_wait_time 60000 Jan 22 13:02:40 localhost augenrules[720]: backlog_wait_time_actual 0 Jan 22 13:02:40 localhost augenrules[720]: enabled 1 Jan 22 13:02:40 localhost augenrules[720]: failure 1 Jan 22 13:02:40 localhost augenrules[720]: pid 700 Jan 22 13:02:40 localhost augenrules[720]: rate_limit 0 Jan 22 13:02:40 localhost augenrules[720]: backlog_limit 8192 Jan 22 13:02:40 localhost augenrules[720]: lost 0 Jan 22 13:02:40 localhost augenrules[720]: backlog 2 Jan 22 13:02:40 localhost augenrules[720]: backlog_wait_time 60000 Jan 22 13:02:40 localhost augenrules[720]: backlog_wait_time_actual 0 Jan 22 13:02:40 localhost augenrules[720]: enabled 1 Jan 22 13:02:40 localhost augenrules[720]: failure 1 Jan 22 13:02:40 localhost augenrules[720]: pid 700 Jan 22 13:02:40 localhost augenrules[720]: rate_limit 0 Jan 22 13:02:40 localhost augenrules[720]: backlog_limit 8192 Jan 22 13:02:40 localhost augenrules[720]: lost 0 Jan 22 13:02:40 localhost augenrules[720]: backlog 0 Jan 22 13:02:40 localhost augenrules[720]: backlog_wait_time 60000 Jan 22 13:02:40 localhost augenrules[720]: backlog_wait_time_actual 0 Jan 22 13:02:40 localhost systemd[1]: Started Security Auditing Service. Jan 22 13:02:40 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Jan 22 13:02:40 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Jan 22 13:02:40 localhost systemd[1]: Finished Rebuild Hardware Database. Jan 22 13:02:40 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 22 13:02:40 localhost systemd[1]: Starting Update is Completed... Jan 22 13:02:40 localhost systemd[1]: Finished Update is Completed. Jan 22 13:02:40 localhost systemd-udevd[728]: Using default interface naming scheme 'rhel-9.0'. Jan 22 13:02:40 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 22 13:02:40 localhost systemd[1]: Reached target System Initialization. Jan 22 13:02:40 localhost systemd[1]: Started dnf makecache --timer. Jan 22 13:02:40 localhost systemd[1]: Started Daily rotation of log files. Jan 22 13:02:40 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Jan 22 13:02:40 localhost systemd[1]: Reached target Timer Units. Jan 22 13:02:40 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Jan 22 13:02:40 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Jan 22 13:02:40 localhost systemd[1]: Reached target Socket Units. Jan 22 13:02:40 localhost systemd[1]: Starting D-Bus System Message Bus... Jan 22 13:02:40 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jan 22 13:02:40 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Jan 22 13:02:40 localhost systemd[1]: Starting Load Kernel Module configfs... Jan 22 13:02:40 localhost systemd-udevd[736]: Network interface NamePolicy= disabled on kernel command line. Jan 22 13:02:40 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 22 13:02:40 localhost systemd[1]: Finished Load Kernel Module configfs. Jan 22 13:02:40 localhost systemd[1]: Started D-Bus System Message Bus. Jan 22 13:02:40 localhost systemd[1]: Reached target Basic System. Jan 22 13:02:40 localhost dbus-broker-lau[764]: Ready Jan 22 13:02:40 localhost systemd[1]: Starting NTP client/server... Jan 22 13:02:40 localhost systemd[1]: Starting Cloud-init: Local Stage (pre-network)... Jan 22 13:02:40 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Jan 22 13:02:40 localhost systemd[1]: Starting IPv4 firewall with iptables... Jan 22 13:02:40 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Jan 22 13:02:40 localhost kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jan 22 13:02:40 localhost kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jan 22 13:02:40 localhost chronyd[787]: chronyd version 4.8 starting (+CMDMON +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +NTS +SECHASH +IPV6 +DEBUG) Jan 22 13:02:40 localhost chronyd[787]: Loaded 0 symmetric keys Jan 22 13:02:40 localhost chronyd[787]: Using right/UTC timezone to obtain leap second data Jan 22 13:02:40 localhost chronyd[787]: Loaded seccomp filter (level 2) Jan 22 13:02:40 localhost systemd[1]: Started irqbalance daemon. Jan 22 13:02:40 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Jan 22 13:02:40 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 22 13:02:40 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 22 13:02:40 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 22 13:02:40 localhost systemd[1]: Reached target sshd-keygen.target. Jan 22 13:02:40 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Jan 22 13:02:40 localhost systemd[1]: Reached target User and Group Name Lookups. Jan 22 13:02:40 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Jan 22 13:02:40 localhost systemd[1]: Starting User Login Management... Jan 22 13:02:40 localhost systemd[1]: Started NTP client/server. Jan 22 13:02:40 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Jan 22 13:02:40 localhost kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Jan 22 13:02:40 localhost kernel: Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled Jan 22 13:02:40 localhost systemd-logind[792]: Watching system buttons on /dev/input/event0 (Power Button) Jan 22 13:02:40 localhost systemd-logind[792]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Jan 22 13:02:40 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Jan 22 13:02:40 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Jan 22 13:02:40 localhost kernel: kvm_amd: TSC scaling supported Jan 22 13:02:40 localhost kernel: kvm_amd: Nested Virtualization enabled Jan 22 13:02:40 localhost kernel: kvm_amd: Nested Paging enabled Jan 22 13:02:40 localhost kernel: kvm_amd: LBR virtualization supported Jan 22 13:02:40 localhost systemd-logind[792]: New seat seat0. Jan 22 13:02:40 localhost systemd[1]: Started User Login Management. Jan 22 13:02:40 localhost kernel: Console: switching to colour dummy device 80x25 Jan 22 13:02:40 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Jan 22 13:02:40 localhost kernel: [drm] features: -context_init Jan 22 13:02:40 localhost kernel: [drm] number of scanouts: 1 Jan 22 13:02:40 localhost kernel: [drm] number of cap sets: 0 Jan 22 13:02:40 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Jan 22 13:02:40 localhost kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Jan 22 13:02:40 localhost kernel: Console: switching to colour frame buffer device 128x48 Jan 22 13:02:40 localhost kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Jan 22 13:02:40 localhost iptables.init[775]: iptables: Applying firewall rules: [ OK ] Jan 22 13:02:40 localhost systemd[1]: Finished IPv4 firewall with iptables. Jan 22 13:02:41 localhost cloud-init[837]: Cloud-init v. 24.4-8.el9 running 'init-local' at Thu, 22 Jan 2026 18:02:40 +0000. Up 6.70 seconds. Jan 22 13:02:41 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3 Jan 22 13:02:41 localhost kernel: ISO 9660 Extensions: RRIP_1991A Jan 22 13:02:41 localhost systemd[1]: run-cloud\x2dinit-tmp-tmps_zn8kqn.mount: Deactivated successfully. Jan 22 13:02:41 localhost systemd[1]: Starting Hostname Service... Jan 22 13:02:41 localhost systemd[1]: Started Hostname Service. Jan 22 13:02:41 np0005592561.novalocal systemd-hostnamed[852]: Hostname set to (static) Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Finished Cloud-init: Local Stage (pre-network). Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Reached target Preparation for Network. Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Starting Network Manager... Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.5739] NetworkManager (version 1.54.3-2.el9) is starting... (boot:1b550e42-cccd-4407-a7cb-82255fd933c8) Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.5744] Read config: /etc/NetworkManager/NetworkManager.conf, /run/NetworkManager/conf.d/15-carrier-timeout.conf Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.5815] manager[0x562a5234e000]: monitoring kernel firmware directory '/lib/firmware'. Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.5859] hostname: hostname: using hostnamed Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.5859] hostname: static hostname changed from (none) to "np0005592561.novalocal" Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.5863] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6045] manager[0x562a5234e000]: rfkill: Wi-Fi hardware radio set enabled Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6046] manager[0x562a5234e000]: rfkill: WWAN hardware radio set enabled Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6095] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-device-plugin-team.so) Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6096] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6097] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6097] manager: Networking is enabled by state file Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6100] settings: Loaded settings plugin: keyfile (internal) Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6110] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-settings-plugin-ifcfg-rh.so") Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6137] Warning: the ifcfg-rh plugin is deprecated, please migrate connections to the keyfile format using "nmcli connection migrate" Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6150] dhcp: init: Using DHCP client 'internal' Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6153] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6191] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6200] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', managed-type: 'external') Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6210] device (lo): Activation: starting connection 'lo' (b7f34daf-83a7-406e-93ed-2b945cc48622) Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6220] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6224] device (eth0): state change: unmanaged -> unavailable (reason 'managed', managed-type: 'external') Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6263] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6267] device (lo): state change: disconnected -> prepare (reason 'none', managed-type: 'external') Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6270] device (lo): state change: prepare -> config (reason 'none', managed-type: 'external') Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6272] device (lo): state change: config -> ip-config (reason 'none', managed-type: 'external') Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6275] device (eth0): carrier: link connected Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6278] device (lo): state change: ip-config -> ip-check (reason 'none', managed-type: 'external') Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6285] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', managed-type: 'full') Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6293] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6298] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6299] device (eth0): state change: disconnected -> prepare (reason 'none', managed-type: 'full') Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6301] manager: NetworkManager state is now CONNECTING Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6302] device (eth0): state change: prepare -> config (reason 'none', managed-type: 'full') Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6311] device (eth0): state change: config -> ip-config (reason 'none', managed-type: 'full') Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6315] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6355] dhcp4 (eth0): state changed new lease, address=38.129.56.234 Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6364] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6385] device (eth0): state change: ip-config -> ip-check (reason 'none', managed-type: 'full') Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Started Network Manager. Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Reached target Network. Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Starting Network Manager Wait Online... Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Started Network Manager Script Dispatcher Service. Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6675] device (lo): state change: ip-check -> secondaries (reason 'none', managed-type: 'external') Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6679] device (lo): state change: secondaries -> activated (reason 'none', managed-type: 'external') Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6685] device (lo): Activation: successful, device activated. Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6694] device (eth0): state change: ip-check -> secondaries (reason 'none', managed-type: 'full') Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6710] device (eth0): state change: secondaries -> activated (reason 'none', managed-type: 'full') Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6714] manager: NetworkManager state is now CONNECTED_SITE Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6717] device (eth0): Activation: successful, device activated. Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6722] manager: NetworkManager state is now CONNECTED_GLOBAL Jan 22 13:02:41 np0005592561.novalocal NetworkManager[856]: [1769104961.6726] manager: startup complete Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Jan 22 13:02:41 np0005592561.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Reached target NFS client services. Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Reached target Preparation for Remote File Systems. Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Reached target Remote File Systems. Jan 22 13:02:41 np0005592561.novalocal systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Finished Network Manager Wait Online. Jan 22 13:02:41 np0005592561.novalocal systemd[1]: Starting Cloud-init: Network Stage... Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: Cloud-init v. 24.4-8.el9 running 'init' at Thu, 22 Jan 2026 18:02:42 +0000. Up 7.71 seconds. Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: | eth0 | True | 38.129.56.234 | 255.255.255.0 | global | fa:16:3e:91:53:74 | Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: | eth0 | True | fe80::f816:3eff:fe91:5374/64 | . | link | fa:16:3e:91:53:74 | Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: | lo | True | ::1/128 | . | host | . | Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: ++++++++++++++++++++++++++++++++Route IPv4 info++++++++++++++++++++++++++++++++ Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: +-------+-----------------+-------------+-----------------+-----------+-------+ Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: +-------+-----------------+-------------+-----------------+-----------+-------+ Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: | 0 | 0.0.0.0 | 38.129.56.1 | 0.0.0.0 | eth0 | UG | Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: | 1 | 38.129.56.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: | 2 | 169.254.169.254 | 38.129.56.5 | 255.255.255.255 | eth0 | UGH | Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: +-------+-----------------+-------------+-----------------+-----------+-------+ Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: +-------+-------------+---------+-----------+-------+ Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: | Route | Destination | Gateway | Interface | Flags | Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: +-------+-------------+---------+-----------+-------+ Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: | 3 | multicast | :: | eth0 | U | Jan 22 13:02:42 np0005592561.novalocal cloud-init[919]: ci-info: +-------+-------------+---------+-----------+-------+ Jan 22 13:02:42 np0005592561.novalocal useradd[986]: new group: name=cloud-user, GID=1001 Jan 22 13:02:42 np0005592561.novalocal useradd[986]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Jan 22 13:02:42 np0005592561.novalocal useradd[986]: add 'cloud-user' to group 'adm' Jan 22 13:02:42 np0005592561.novalocal useradd[986]: add 'cloud-user' to group 'systemd-journal' Jan 22 13:02:42 np0005592561.novalocal useradd[986]: add 'cloud-user' to shadow group 'adm' Jan 22 13:02:42 np0005592561.novalocal useradd[986]: add 'cloud-user' to shadow group 'systemd-journal' Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: Generating public/private rsa key pair. Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: The key fingerprint is: Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: SHA256:8t59v5QbpFdtvLteyGYnefH6j7+eGZ32zwBzBO4KL/s root@np0005592561.novalocal Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: The key's randomart image is: Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: +---[RSA 3072]----+ Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | . | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | . . | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | . . | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | . . ..| Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | . S + .o=| Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | o o . =o+O| Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | o o .OX*| Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | . + . o=OX| Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | o.E ..=##| Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: +----[SHA256]-----+ Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: Generating public/private ecdsa key pair. Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: The key fingerprint is: Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: SHA256:G2lTNp70IOCPpXhXUImxCUcutzRsSmxVRSu17ML29XU root@np0005592561.novalocal Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: The key's randomart image is: Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: +---[ECDSA 256]---+ Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | o.*=o++ | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | o B.+.o o | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | * % O + | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | + @ % B | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | . = S * o . E| Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | . o = o . .o| Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | . . .| Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: +----[SHA256]-----+ Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: Generating public/private ed25519 key pair. Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: The key fingerprint is: Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: SHA256:u8pfiBIMbqRuDyKV2XIxHkzS/kbi9slJBdDtlV2qyBM root@np0005592561.novalocal Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: The key's randomart image is: Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: +--[ED25519 256]--+ Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | ..oo . o .. | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | +. o . o .. | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | o.= oE. . | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | + Bo+..oo . | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: |. B.*+ .S . | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: |.o oo.+. + | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: |o+ ..=.oo . | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: |+ o o= o | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: | . ooo | Jan 22 13:02:43 np0005592561.novalocal cloud-init[919]: +----[SHA256]-----+ Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Finished Cloud-init: Network Stage. Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Reached target Cloud-config availability. Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Reached target Network is Online. Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Starting Cloud-init: Config Stage... Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Starting Crash recovery kernel arming... Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Starting Notify NFS peers of a restart... Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Starting System Logging Service... Jan 22 13:02:43 np0005592561.novalocal sm-notify[1002]: Version 2.5.4 starting Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Starting OpenSSH server daemon... Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Starting Permit User Sessions... Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Started Notify NFS peers of a restart. Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Finished Permit User Sessions. Jan 22 13:02:43 np0005592561.novalocal sshd[1004]: Server listening on 0.0.0.0 port 22. Jan 22 13:02:43 np0005592561.novalocal sshd[1004]: Server listening on :: port 22. Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Started Command Scheduler. Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Started Getty on tty1. Jan 22 13:02:43 np0005592561.novalocal crond[1007]: (CRON) STARTUP (1.5.7) Jan 22 13:02:43 np0005592561.novalocal crond[1007]: (CRON) INFO (Syslog will be used instead of sendmail.) Jan 22 13:02:43 np0005592561.novalocal crond[1007]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 55% if used.) Jan 22 13:02:43 np0005592561.novalocal crond[1007]: (CRON) INFO (running with inotify support) Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Started Serial Getty on ttyS0. Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Reached target Login Prompts. Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Started OpenSSH server daemon. Jan 22 13:02:43 np0005592561.novalocal sshd-session[1008]: Connection closed by 38.102.83.114 port 41808 [preauth] Jan 22 13:02:43 np0005592561.novalocal rsyslogd[1003]: [origin software="rsyslogd" swVersion="8.2510.0-2.el9" x-pid="1003" x-info="https://www.rsyslog.com"] start Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Started System Logging Service. Jan 22 13:02:43 np0005592561.novalocal rsyslogd[1003]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2510.0-2.el9 try https://www.rsyslog.com/e/2040 ] Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Reached target Multi-User System. Jan 22 13:02:43 np0005592561.novalocal sshd-session[1020]: Unable to negotiate with 38.102.83.114 port 41814: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Starting Record Runlevel Change in UTMP... Jan 22 13:02:43 np0005592561.novalocal systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jan 22 13:02:43 np0005592561.novalocal systemd[1]: Finished Record Runlevel Change in UTMP. Jan 22 13:02:43 np0005592561.novalocal sshd-session[1038]: Unable to negotiate with 38.102.83.114 port 41832: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Jan 22 13:02:43 np0005592561.novalocal sshd-session[1049]: Unable to negotiate with 38.102.83.114 port 41840: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Jan 22 13:02:43 np0005592561.novalocal rsyslogd[1003]: imjournal: journal files changed, reloading... [v8.2510.0-2.el9 try https://www.rsyslog.com/e/0 ] Jan 22 13:02:43 np0005592561.novalocal sshd-session[1059]: Connection reset by 38.102.83.114 port 41852 [preauth] Jan 22 13:02:43 np0005592561.novalocal sshd-session[1030]: Connection closed by 38.102.83.114 port 41828 [preauth] Jan 22 13:02:43 np0005592561.novalocal sshd-session[1076]: Unable to negotiate with 38.102.83.114 port 41870: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth] Jan 22 13:02:43 np0005592561.novalocal kdumpctl[1014]: kdump: No kdump initial ramdisk found. Jan 22 13:02:43 np0005592561.novalocal kdumpctl[1014]: kdump: Rebuilding /boot/initramfs-5.14.0-661.el9.x86_64kdump.img Jan 22 13:02:43 np0005592561.novalocal sshd-session[1082]: Unable to negotiate with 38.102.83.114 port 41886: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Jan 22 13:02:43 np0005592561.novalocal sshd-session[1072]: Connection closed by 38.102.83.114 port 41858 [preauth] Jan 22 13:02:43 np0005592561.novalocal cloud-init[1116]: Cloud-init v. 24.4-8.el9 running 'modules:config' at Thu, 22 Jan 2026 18:02:43 +0000. Up 9.60 seconds. Jan 22 13:02:44 np0005592561.novalocal systemd[1]: Finished Cloud-init: Config Stage. Jan 22 13:02:44 np0005592561.novalocal systemd[1]: Starting Cloud-init: Final Stage... Jan 22 13:02:44 np0005592561.novalocal cloud-init[1280]: Cloud-init v. 24.4-8.el9 running 'modules:final' at Thu, 22 Jan 2026 18:02:44 +0000. Up 9.99 seconds. Jan 22 13:02:44 np0005592561.novalocal dracut[1284]: dracut-057-102.git20250818.el9 Jan 22 13:02:44 np0005592561.novalocal cloud-init[1301]: ############################################################# Jan 22 13:02:44 np0005592561.novalocal cloud-init[1302]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Jan 22 13:02:44 np0005592561.novalocal cloud-init[1304]: 256 SHA256:G2lTNp70IOCPpXhXUImxCUcutzRsSmxVRSu17ML29XU root@np0005592561.novalocal (ECDSA) Jan 22 13:02:44 np0005592561.novalocal cloud-init[1306]: 256 SHA256:u8pfiBIMbqRuDyKV2XIxHkzS/kbi9slJBdDtlV2qyBM root@np0005592561.novalocal (ED25519) Jan 22 13:02:44 np0005592561.novalocal cloud-init[1308]: 3072 SHA256:8t59v5QbpFdtvLteyGYnefH6j7+eGZ32zwBzBO4KL/s root@np0005592561.novalocal (RSA) Jan 22 13:02:44 np0005592561.novalocal cloud-init[1309]: -----END SSH HOST KEY FINGERPRINTS----- Jan 22 13:02:44 np0005592561.novalocal cloud-init[1310]: ############################################################# Jan 22 13:02:44 np0005592561.novalocal cloud-init[1280]: Cloud-init v. 24.4-8.el9 finished at Thu, 22 Jan 2026 18:02:44 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 10.21 seconds Jan 22 13:02:44 np0005592561.novalocal dracut[1286]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics --mount "/dev/disk/by-uuid/22ac9141-3960-4912-b20e-19fc8a328d40 /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device --add-confdir /lib/kdump/dracut.conf.d -f /boot/initramfs-5.14.0-661.el9.x86_64kdump.img 5.14.0-661.el9.x86_64 Jan 22 13:02:44 np0005592561.novalocal systemd[1]: Finished Cloud-init: Final Stage. Jan 22 13:02:44 np0005592561.novalocal systemd[1]: Reached target Cloud-init target. Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: Module 'ifcfg' will not be installed, because it's in the list to be omitted! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: Module 'plymouth' will not be installed, because it's in the list to be omitted! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: Module 'resume' will not be installed, because it's in the list to be omitted! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: Module 'earlykdump' will not be installed, because it's in the list to be omitted! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: memstrack is not available Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Jan 22 13:02:45 np0005592561.novalocal dracut[1286]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: memstrack is not available Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: *** Including module: systemd *** Jan 22 13:02:46 np0005592561.novalocal chronyd[787]: Selected source 167.160.187.179 (2.centos.pool.ntp.org) Jan 22 13:02:46 np0005592561.novalocal chronyd[787]: System clock TAI offset set to 37 seconds Jan 22 13:02:46 np0005592561.novalocal dracut[1286]: *** Including module: fips *** Jan 22 13:02:47 np0005592561.novalocal dracut[1286]: *** Including module: systemd-initrd *** Jan 22 13:02:47 np0005592561.novalocal dracut[1286]: *** Including module: i18n *** Jan 22 13:02:47 np0005592561.novalocal dracut[1286]: *** Including module: drm *** Jan 22 13:02:47 np0005592561.novalocal dracut[1286]: *** Including module: prefixdevname *** Jan 22 13:02:47 np0005592561.novalocal dracut[1286]: *** Including module: kernel-modules *** Jan 22 13:02:47 np0005592561.novalocal kernel: block vda: the capability attribute has been deprecated. Jan 22 13:02:48 np0005592561.novalocal dracut[1286]: *** Including module: kernel-modules-extra *** Jan 22 13:02:48 np0005592561.novalocal dracut[1286]: kernel-modules-extra: configuration source "/run/depmod.d" does not exist Jan 22 13:02:48 np0005592561.novalocal dracut[1286]: kernel-modules-extra: configuration source "/lib/depmod.d" does not exist Jan 22 13:02:48 np0005592561.novalocal dracut[1286]: kernel-modules-extra: parsing configuration file "/etc/depmod.d/dist.conf" Jan 22 13:02:48 np0005592561.novalocal dracut[1286]: kernel-modules-extra: /etc/depmod.d/dist.conf: added "updates extra built-in weak-updates" to the list of search directories Jan 22 13:02:48 np0005592561.novalocal dracut[1286]: *** Including module: qemu *** Jan 22 13:02:48 np0005592561.novalocal dracut[1286]: *** Including module: fstab-sys *** Jan 22 13:02:48 np0005592561.novalocal dracut[1286]: *** Including module: rootfs-block *** Jan 22 13:02:48 np0005592561.novalocal dracut[1286]: *** Including module: terminfo *** Jan 22 13:02:48 np0005592561.novalocal dracut[1286]: *** Including module: udev-rules *** Jan 22 13:02:49 np0005592561.novalocal dracut[1286]: Skipping udev rule: 91-permissions.rules Jan 22 13:02:49 np0005592561.novalocal dracut[1286]: Skipping udev rule: 80-drivers-modprobe.rules Jan 22 13:02:49 np0005592561.novalocal dracut[1286]: *** Including module: virtiofs *** Jan 22 13:02:49 np0005592561.novalocal dracut[1286]: *** Including module: dracut-systemd *** Jan 22 13:02:49 np0005592561.novalocal dracut[1286]: *** Including module: usrmount *** Jan 22 13:02:49 np0005592561.novalocal dracut[1286]: *** Including module: base *** Jan 22 13:02:49 np0005592561.novalocal dracut[1286]: *** Including module: fs-lib *** Jan 22 13:02:49 np0005592561.novalocal dracut[1286]: *** Including module: kdumpbase *** Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: *** Including module: microcode_ctl-fw_dir_override *** Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl module: mangling fw_dir Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware" Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: configuration "intel" is ignored Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: configuration "intel-06-2d-07" is ignored Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: configuration "intel-06-4e-03" is ignored Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: configuration "intel-06-4f-01" is ignored Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: configuration "intel-06-55-04" is ignored Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: configuration "intel-06-5e-03" is ignored Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Jan 22 13:02:50 np0005592561.novalocal sshd-session[2927]: Accepted publickey for zuul-worker from 38.102.83.114 port 60126 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: configuration "intel-06-8c-01" is ignored Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Jan 22 13:02:50 np0005592561.novalocal systemd[1]: Created slice User Slice of UID 1000. Jan 22 13:02:50 np0005592561.novalocal systemd[1]: Starting User Runtime Directory /run/user/1000... Jan 22 13:02:50 np0005592561.novalocal systemd-logind[792]: New session 1 of user zuul-worker. Jan 22 13:02:50 np0005592561.novalocal systemd[1]: Finished User Runtime Directory /run/user/1000. Jan 22 13:02:50 np0005592561.novalocal systemd[1]: Starting User Manager for UID 1000... Jan 22 13:02:50 np0005592561.novalocal systemd[2998]: pam_unix(systemd-user:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Jan 22 13:02:50 np0005592561.novalocal dracut[1286]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Jan 22 13:02:51 np0005592561.novalocal dracut[1286]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Jan 22 13:02:51 np0005592561.novalocal dracut[1286]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8f-08"... Jan 22 13:02:51 np0005592561.novalocal dracut[1286]: microcode_ctl: configuration "intel-06-8f-08" is ignored Jan 22 13:02:51 np0005592561.novalocal dracut[1286]: microcode_ctl: final fw_dir: "/lib/firmware/updates /lib/firmware" Jan 22 13:02:51 np0005592561.novalocal dracut[1286]: *** Including module: openssl *** Jan 22 13:02:51 np0005592561.novalocal systemd[2998]: Queued start job for default target Main User Target. Jan 22 13:02:51 np0005592561.novalocal systemd[2998]: Created slice User Application Slice. Jan 22 13:02:51 np0005592561.novalocal systemd[2998]: Started Mark boot as successful after the user session has run 2 minutes. Jan 22 13:02:51 np0005592561.novalocal systemd[2998]: Started Daily Cleanup of User's Temporary Directories. Jan 22 13:02:51 np0005592561.novalocal systemd[2998]: Reached target Paths. Jan 22 13:02:51 np0005592561.novalocal systemd[2998]: Reached target Timers. Jan 22 13:02:51 np0005592561.novalocal systemd[2998]: Starting D-Bus User Message Bus Socket... Jan 22 13:02:51 np0005592561.novalocal systemd[2998]: Starting Create User's Volatile Files and Directories... Jan 22 13:02:51 np0005592561.novalocal dracut[1286]: *** Including module: shutdown *** Jan 22 13:02:51 np0005592561.novalocal systemd[2998]: Finished Create User's Volatile Files and Directories. Jan 22 13:02:51 np0005592561.novalocal systemd[2998]: Listening on D-Bus User Message Bus Socket. Jan 22 13:02:51 np0005592561.novalocal systemd[2998]: Reached target Sockets. Jan 22 13:02:51 np0005592561.novalocal systemd[2998]: Reached target Basic System. Jan 22 13:02:51 np0005592561.novalocal systemd[2998]: Reached target Main User Target. Jan 22 13:02:51 np0005592561.novalocal systemd[2998]: Startup finished in 167ms. Jan 22 13:02:51 np0005592561.novalocal systemd[1]: Started User Manager for UID 1000. Jan 22 13:02:51 np0005592561.novalocal systemd[1]: Started Session 1 of User zuul-worker. Jan 22 13:02:51 np0005592561.novalocal sshd-session[2927]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Jan 22 13:02:51 np0005592561.novalocal dracut[1286]: *** Including module: squash *** Jan 22 13:02:51 np0005592561.novalocal dracut[1286]: *** Including modules done *** Jan 22 13:02:51 np0005592561.novalocal dracut[1286]: *** Installing kernel module dependencies *** Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: Cannot change IRQ 35 affinity: Operation not permitted Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: IRQ 35 affinity is now unmanaged Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: Cannot change IRQ 33 affinity: Operation not permitted Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: IRQ 33 affinity is now unmanaged Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: Cannot change IRQ 31 affinity: Operation not permitted Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: IRQ 31 affinity is now unmanaged Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: Cannot change IRQ 28 affinity: Operation not permitted Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: IRQ 28 affinity is now unmanaged Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: Cannot change IRQ 34 affinity: Operation not permitted Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: IRQ 34 affinity is now unmanaged Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: Cannot change IRQ 32 affinity: Operation not permitted Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: IRQ 32 affinity is now unmanaged Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: Cannot change IRQ 30 affinity: Operation not permitted Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: IRQ 30 affinity is now unmanaged Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: Cannot change IRQ 29 affinity: Operation not permitted Jan 22 13:02:51 np0005592561.novalocal irqbalance[789]: IRQ 29 affinity is now unmanaged Jan 22 13:02:51 np0005592561.novalocal python3[3201]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 22 13:02:51 np0005592561.novalocal systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 22 13:02:52 np0005592561.novalocal dracut[1286]: *** Installing kernel module dependencies done *** Jan 22 13:02:52 np0005592561.novalocal dracut[1286]: *** Resolving executable dependencies *** Jan 22 13:02:53 np0005592561.novalocal dracut[1286]: *** Resolving executable dependencies done *** Jan 22 13:02:53 np0005592561.novalocal dracut[1286]: *** Generating early-microcode cpio image *** Jan 22 13:02:53 np0005592561.novalocal dracut[1286]: *** Store current command line parameters *** Jan 22 13:02:53 np0005592561.novalocal dracut[1286]: Stored kernel commandline: Jan 22 13:02:53 np0005592561.novalocal dracut[1286]: No dracut internal kernel commandline stored in the initramfs Jan 22 13:02:54 np0005592561.novalocal dracut[1286]: *** Install squash loader *** Jan 22 13:02:54 np0005592561.novalocal python3[4194]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 22 13:02:54 np0005592561.novalocal dracut[1286]: *** Squashing the files inside the initramfs *** Jan 22 13:02:56 np0005592561.novalocal dracut[1286]: *** Squashing the files inside the initramfs done *** Jan 22 13:02:56 np0005592561.novalocal dracut[1286]: *** Creating image file '/boot/initramfs-5.14.0-661.el9.x86_64kdump.img' *** Jan 22 13:02:56 np0005592561.novalocal dracut[1286]: *** Hardlinking files *** Jan 22 13:02:56 np0005592561.novalocal dracut[1286]: Mode: real Jan 22 13:02:56 np0005592561.novalocal dracut[1286]: Files: 50 Jan 22 13:02:56 np0005592561.novalocal dracut[1286]: Linked: 0 files Jan 22 13:02:56 np0005592561.novalocal dracut[1286]: Compared: 0 xattrs Jan 22 13:02:56 np0005592561.novalocal dracut[1286]: Compared: 0 files Jan 22 13:02:56 np0005592561.novalocal dracut[1286]: Saved: 0 B Jan 22 13:02:56 np0005592561.novalocal dracut[1286]: Duration: 0.000363 seconds Jan 22 13:02:56 np0005592561.novalocal dracut[1286]: *** Hardlinking files done *** Jan 22 13:02:56 np0005592561.novalocal dracut[1286]: *** Creating initramfs image file '/boot/initramfs-5.14.0-661.el9.x86_64kdump.img' done *** Jan 22 13:02:57 np0005592561.novalocal kdumpctl[1014]: kdump: kexec: loaded kdump kernel Jan 22 13:02:57 np0005592561.novalocal kdumpctl[1014]: kdump: Starting kdump: [OK] Jan 22 13:02:57 np0005592561.novalocal systemd[1]: Finished Crash recovery kernel arming. Jan 22 13:02:57 np0005592561.novalocal systemd[1]: Startup finished in 1.759s (kernel) + 2.846s (initrd) + 18.139s (userspace) = 22.745s. Jan 22 13:03:01 np0005592561.novalocal python3[4472]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 22 13:03:02 np0005592561.novalocal python3[4512]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Jan 22 13:03:05 np0005592561.novalocal python3[4538]: ansible-authorized_key Invoked with user=zuul-worker state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 22 13:03:05 np0005592561.novalocal python3[4562]: ansible-file Invoked with state=directory path=/home/zuul-worker/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:05 np0005592561.novalocal python3[4661]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 22 13:03:06 np0005592561.novalocal python3[4732]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1769104985.5944417-163-152884807224602/source dest=/home/zuul-worker/.ssh/id_rsa mode=384 force=False _original_basename=b62238576da549879a1d6c77bc31e41e_id_rsa follow=False checksum=a2b2f90e1472d4021fd3afa2e85057b55bb753e6 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:07 np0005592561.novalocal python3[4855]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 22 13:03:07 np0005592561.novalocal python3[4926]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1769104986.6765203-174-274865722824090/source dest=/home/zuul-worker/.ssh/id_rsa.pub mode=420 force=False _original_basename=b62238576da549879a1d6c77bc31e41e_id_rsa.pub follow=False checksum=361e1c56a74f48ca466ae5892f71e0baba378d43 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:09 np0005592561.novalocal python3[4974]: ansible-ping Invoked with data=pong Jan 22 13:03:10 np0005592561.novalocal python3[4998]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 22 13:03:11 np0005592561.novalocal systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jan 22 13:03:12 np0005592561.novalocal python3[5058]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Jan 22 13:03:13 np0005592561.novalocal python3[5090]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:14 np0005592561.novalocal python3[5114]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:14 np0005592561.novalocal python3[5138]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:14 np0005592561.novalocal python3[5162]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:14 np0005592561.novalocal python3[5186]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:15 np0005592561.novalocal python3[5210]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:17 np0005592561.novalocal python3[5234]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Jan 22 13:03:18 np0005592561.novalocal sshd-session[5237]: Accepted publickey for zuul-worker from 38.102.83.114 port 41054 ssh2: RSA SHA256:y1KbHA4EnUbh62snrTxPzfw/Vk5CkvTGu04dcykbV60 Jan 22 13:03:18 np0005592561.novalocal systemd-logind[792]: New session 3 of user zuul-worker. Jan 22 13:03:18 np0005592561.novalocal systemd[1]: Started Session 3 of User zuul-worker. Jan 22 13:03:18 np0005592561.novalocal sshd-session[5237]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Jan 22 13:03:21 np0005592561.novalocal sshd-session[5240]: Received disconnect from 38.102.83.114 port 41054:11: disconnected by user Jan 22 13:03:21 np0005592561.novalocal sshd-session[5240]: Disconnected from user zuul-worker 38.102.83.114 port 41054 Jan 22 13:03:21 np0005592561.novalocal sshd-session[5237]: pam_unix(sshd:session): session closed for user zuul-worker Jan 22 13:03:21 np0005592561.novalocal systemd[1]: session-3.scope: Deactivated successfully. Jan 22 13:03:21 np0005592561.novalocal systemd[1]: session-3.scope: Consumed 2.106s CPU time. Jan 22 13:03:21 np0005592561.novalocal systemd-logind[792]: Session 3 logged out. Waiting for processes to exit. Jan 22 13:03:21 np0005592561.novalocal systemd-logind[792]: Removed session 3. Jan 22 13:03:21 np0005592561.novalocal python3[5288]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:21 np0005592561.novalocal python3[5312]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:22 np0005592561.novalocal python3[5336]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:22 np0005592561.novalocal python3[5360]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:22 np0005592561.novalocal python3[5384]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:22 np0005592561.novalocal python3[5408]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:23 np0005592561.novalocal python3[5433]: ansible-ansible.legacy.command Invoked with _raw_params=sudo -n true zuul_log_id=fa163ec2-ffbe-d493-d981-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 13:03:23 np0005592561.novalocal sudo[5434]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/true Jan 22 13:03:23 np0005592561.novalocal sudo[5434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:23 np0005592561.novalocal sudo[5434]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:24 np0005592561.novalocal python3[5462]: ansible-file Invoked with path=/home/zuul-worker/.pydistutils.cfg state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:24 np0005592561.novalocal sudo[5538]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-shaipnqxulnebfczfuuzummduvsynpsk ; /usr/bin/python3' Jan 22 13:03:24 np0005592561.novalocal sudo[5538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:24 np0005592561.novalocal python3[5540]: ansible-ansible.legacy.stat Invoked with path=/etc/pip.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 22 13:03:24 np0005592561.novalocal sudo[5538]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:24 np0005592561.novalocal sudo[5611]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-srspbndybegshibikcybwynovmapcoin ; /usr/bin/python3' Jan 22 13:03:24 np0005592561.novalocal sudo[5611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:25 np0005592561.novalocal python3[5613]: ansible-ansible.legacy.copy Invoked with dest=/etc/pip.conf group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1769105004.3006237-91-144160477357028/source follow=False _original_basename=pip.conf.j2 checksum=5b65c9094402b8db60a77928be1f816342638afe backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:25 np0005592561.novalocal sudo[5611]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:25 np0005592561.novalocal sudo[5713]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wqrxtzvlmdostuvdxznasbqrxwqgruhe ; /usr/bin/python3' Jan 22 13:03:25 np0005592561.novalocal sudo[5713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:25 np0005592561.novalocal python3[5715]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 22 13:03:25 np0005592561.novalocal sudo[5713]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:26 np0005592561.novalocal sudo[5788]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jsvubbvurvnyqgrjbzghopzqitvyridi ; /usr/bin/python3' Jan 22 13:03:26 np0005592561.novalocal sudo[5788]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:26 np0005592561.novalocal python3[5790]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1769105005.524411-103-78017178978168/source follow=False _original_basename=centos.repo.j2 checksum=0268eb1686bc9b047a2096dbaf287658b0d20a19 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:26 np0005592561.novalocal sudo[5788]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:26 np0005592561.novalocal sudo[5890]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hxukewegpbsgavtptftosbxywkeikfzp ; /usr/bin/python3' Jan 22 13:03:26 np0005592561.novalocal sudo[5890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:26 np0005592561.novalocal python3[5892]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos-addons.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 22 13:03:26 np0005592561.novalocal sudo[5890]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:27 np0005592561.novalocal sudo[5965]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-huqnscvierauuosjgeqzuwgzkdstsrfv ; /usr/bin/python3' Jan 22 13:03:27 np0005592561.novalocal sudo[5965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:27 np0005592561.novalocal python3[5967]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos-addons.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1769105006.537307-103-19492993115832/source follow=False _original_basename=centos-addons.repo.j2 checksum=2917e612982cadeb3009a3bf37bf30cbcd7f2044 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:27 np0005592561.novalocal sudo[5965]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:27 np0005592561.novalocal sudo[6015]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ehyjxpgjhbnpdzdecibozcnfwppfpohk ; /usr/bin/python3' Jan 22 13:03:27 np0005592561.novalocal sudo[6015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:28 np0005592561.novalocal python3[6017]: ansible-ini_file Invoked with path=/etc/dnf.conf section=main option=deltarpm value=0 mode=420 backup=False state=present exclusive=True no_extra_spaces=False ignore_spaces=False allow_no_value=False create=True follow=False unsafe_writes=False values=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:28 np0005592561.novalocal python3[6017]: ansible-ini_file [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Jan 22 13:03:28 np0005592561.novalocal sudo[6015]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:28 np0005592561.novalocal sudo[6041]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vbigulkxduxauufcjzoggggmzojjzqpx ; /usr/bin/python3' Jan 22 13:03:28 np0005592561.novalocal sudo[6041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:28 np0005592561.novalocal python3[6043]: ansible-ansible.legacy.command Invoked with _raw_params=dnf clean all zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 13:03:28 np0005592561.novalocal sudo[6041]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:28 np0005592561.novalocal sudo[6069]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-telgndgixbpvrgqhadfufajqnnzcfndc ; /usr/bin/python3' Jan 22 13:03:28 np0005592561.novalocal sudo[6069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:29 np0005592561.novalocal python3[6071]: ansible-ansible.legacy.command Invoked with _raw_params=dnf makecache -v zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 13:03:39 np0005592561.novalocal sudo[6069]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:41 np0005592561.novalocal python3[6112]: ansible-file Invoked with path=/home/zuul-worker/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:42 np0005592561.novalocal python3[6137]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=PYTHON2=0 PYTHON3=1 # Not all platforms install a `pip` when installing python # specific pip packages. We first check if pip$VERSION is # available and if not fallback to checking if just `pip` # is present. if [ "$PYTHON2" -eq "1" ] ; then command -v pip2 || command -v pip || exit 1 python2 -m wheel --help || exit 1 fi if [ "$PYTHON3" -eq "1" ] ; then command -v pip3 || command -v pip || exit 1 python3 -m wheel --help || exit 1 fi _uses_shell=True zuul_log_id=fa163ec2-ffbe-85ad-f81e-000000000089-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Jan 22 13:03:42 np0005592561.novalocal sudo[6165]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ggduskqrxwvsafpjrygohcrwgzjyvkok ; /usr/bin/python3' Jan 22 13:03:42 np0005592561.novalocal sudo[6165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:43 np0005592561.novalocal python3[6167]: ansible-ansible.legacy.dnf Invoked with name=['python3-pip', 'python3-setuptools', 'python3-wheel'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 22 13:03:44 np0005592561.novalocal sudo[6165]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:45 np0005592561.novalocal python3[6199]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v python3 _uses_shell=True zuul_log_id=fa163ec2-ffbe-85ad-f81e-000000000093-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Jan 22 13:03:46 np0005592561.novalocal python3[6227]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v tox /home/zuul-worker/.local/tox/bin/tox || exit 1 _uses_shell=True zuul_log_id=fa163ec2-ffbe-85ad-f81e-000000000021-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Jan 22 13:03:46 np0005592561.novalocal python3[6255]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/bin/python3 -m venv /home/zuul-worker/.local/tox zuul_log_id=fa163ec2-ffbe-85ad-f81e-000000000024-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 13:03:50 np0005592561.novalocal python3[6287]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/pip install tox zuul_log_id=fa163ec2-ffbe-85ad-f81e-000000000025-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 13:03:53 np0005592561.novalocal python3[6317]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/tox --version zuul_log_id=fa163ec2-ffbe-85ad-f81e-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 13:03:53 np0005592561.novalocal sudo[6344]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ubbdialqogwlxucxzrctphbflmdqgtym ; /usr/bin/python3' Jan 22 13:03:53 np0005592561.novalocal sudo[6344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:53 np0005592561.novalocal python3[6346]: ansible-file Invoked with state=link src=/home/zuul-worker/.local/tox/bin/tox dest=/usr/local/bin/tox path=/usr/local/bin/tox recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:53 np0005592561.novalocal sudo[6344]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:54 np0005592561.novalocal python3[6371]: ansible-ansible.legacy.command Invoked with _raw_params=export WBASE="/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo"; mkdir -p $WBASE/playbooks/roles ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-common" $WBASE/playbooks/roles/common; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-logs" $WBASE/playbooks/roles/logs; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-kolla" $WBASE/playbooks/roles/kolla; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-packstack" $WBASE/playbooks/roles/packstack; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-puppet-openstack" $WBASE/playbooks/roles/puppet-openstack; # noqa 204 ln -s "/home/zuul-worker/src/github.com/openstack-k8s-operators/ci-framework/roles/build_containers" $WBASE/playbooks/roles/build_containers; # noqa 204 _uses_shell=True zuul_log_id=fa163ec2-ffbe-85ad-f81e-00000000003f-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 13:03:54 np0005592561.novalocal sudo[6404]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lgbphdmalxrhngieaaxtxnjviiirwwrm ; /usr/bin/python3' Jan 22 13:03:54 np0005592561.novalocal sudo[6404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:54 np0005592561.novalocal python3[6406]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:54 np0005592561.novalocal sudo[6404]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:54 np0005592561.novalocal sudo[6482]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-boybclrdiammjdxzeyspncacnjmrykhz ; /usr/bin/python3' Jan 22 13:03:54 np0005592561.novalocal sudo[6482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:55 np0005592561.novalocal python3[6484]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 22 13:03:55 np0005592561.novalocal sudo[6482]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:55 np0005592561.novalocal sudo[6555]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cwbhhkcnqwzhhdlbqbvyemcnpycactcr ; /usr/bin/python3' Jan 22 13:03:55 np0005592561.novalocal sudo[6555]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:55 np0005592561.novalocal python3[6557]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1769105034.6444392-81-163238330565067/source follow=False _original_basename=mirror_info.sh.j2 checksum=ea5d641d750b2605d80a15d4106dfb6027081c92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 13:03:55 np0005592561.novalocal sudo[6555]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:55 np0005592561.novalocal sudo[6606]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yegjzsxumoegawbiveliqfwjttnyranb ; /usr/bin/python3' Jan 22 13:03:55 np0005592561.novalocal sudo[6606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:03:56 np0005592561.novalocal python3[6608]: ansible-ansible.legacy.command Invoked with _raw_params=dnf install -y python3-pip rpmlint python3-rpm _uses_shell=True zuul_log_id=fa163ec2-ffbe-85ad-f81e-000000000052-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 13:03:56 np0005592561.novalocal sudo[6606]: pam_unix(sudo:session): session closed for user root Jan 22 13:03:57 np0005592561.novalocal python3[6635]: ansible-pip Invoked with name=['rdopkg'] virtualenv=/home/zuul-worker/rdopkg-venv virtualenv_command=/usr/bin/python3 -m venv virtualenv_site_packages=True state=present editable=False version=None requirements=None virtualenv_python=None extra_args=None chdir=None executable=None umask=None Jan 22 13:04:03 np0005592561.novalocal python3[6668]: ansible-ansible.legacy.command Invoked with _raw_params=set -e -x source '/home/zuul-worker/rdopkg-venv/bin/activate' MASTER="$(rdopkg info | grep -e "in development phase" | awk '{print $1}')" RELEASE="epoxy" DIST_VER="9" # Find out if it is puppet or packstack and scenario if [[ "weirdo-epoxy-promote-puppet-scenario005-centos-stream-9" == *"puppet"* ]]; then project="puppet-openstack" else project="packstack" fi scenario="scenario005" # Set version related variables if [ $RELEASE = $MASTER ]; then VERSION="master" O_RELEASE="master" else VERSION="$(rdopkg release -r "$RELEASE" | grep upstream_branch | awk '{print $2}')" O_RELEASE="$RELEASE" fi if [[ "promotion" == "promotion" ]]; then enable_puppet_modules_rpm=false dlrn_repo="puppet-ci-testing" else enable_puppet_modules_rpm=true dlrn_repo="puppet-passed-ci" fi # Prepare Ansible inventory to use localhost pushd /home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo cat <hosts localhost ansible_connection=local ansible_python_interpreter=/usr/bin/python3 [openstack_nodes] localhost log_destination=/var/log/weirdo EOF REPOS_URL="http://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/${dlrn_repo}/delorean.repo,https://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/delorean-deps.repo" # noqa 204 tox -e ansible-playbook -- -vv -b -i hosts playbooks/$project-$scenario.yml \ -e version=$VERSION \ -e openstack_release=$O_RELEASE \ -e selinux_enforcing="false" \ -e tempest_from_source=false \ -e enable_puppet_modules_rpm=${enable_puppet_modules_rpm} \ -e trunk_repositories=$REPOS_URL \ _uses_shell=True zuul_log_id=fa163ec2-ffbe-85ad-f81e-000000000005-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 13:05:11 np0005592561.novalocal sudo[6954]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ftebyzegozarjflofzmmfbvmanodsugh ; /usr/bin/python3' Jan 22 13:05:11 np0005592561.novalocal sudo[6954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:11 np0005592561.novalocal python3[6956]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=* fact_path=/etc/ansible/facts.d Jan 22 13:05:11 np0005592561.novalocal sudo[6954]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:11 np0005592561.novalocal sudo[6994]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-airwmzvvuoqfyntndexievdjyqlnoaps ; /usr/bin/python3' Jan 22 13:05:11 np0005592561.novalocal sudo[6994]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:12 np0005592561.novalocal python3[6996]: ansible-command Invoked with _raw_params=sudo dnf config-manager --enable crb _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 13:05:12 np0005592561.novalocal python3[6996]: ansible-command [WARNING] Consider using 'become', 'become_method', and 'become_user' rather than running sudo Jan 22 13:05:12 np0005592561.novalocal sudo[6997]: root : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/dnf config-manager --enable crb Jan 22 13:05:12 np0005592561.novalocal sudo[6997]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:05:12 np0005592561.novalocal sudo[6997]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:12 np0005592561.novalocal sudo[6994]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:12 np0005592561.novalocal sudo[7007]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-whlxqyzlfixsgooredavwdaitjxlokha ; /usr/bin/python3' Jan 22 13:05:12 np0005592561.novalocal sudo[7007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:13 np0005592561.novalocal python3[7009]: ansible-systemd Invoked with name=firewalld state=stopped daemon_reload=False daemon_reexec=False no_block=False enabled=None force=None masked=None user=None scope=None Jan 22 13:05:13 np0005592561.novalocal sudo[7007]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:13 np0005592561.novalocal sudo[7018]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nwbzwokocfjdjwqgwazkjtktemliqfek ; /usr/bin/python3' Jan 22 13:05:13 np0005592561.novalocal sudo[7018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:13 np0005592561.novalocal python3[7020]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 22 13:05:14 np0005592561.novalocal sudo[7018]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:14 np0005592561.novalocal sudo[7036]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dswcqzmydoyylqgeqfjcdwmugkbytvxu ; /usr/bin/python3' Jan 22 13:05:14 np0005592561.novalocal sudo[7036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:14 np0005592561.novalocal python3[7038]: ansible-dnf Invoked with name=['tuned', 'subscription-manager'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 22 13:05:17 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:05:17 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:05:17 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:05:17 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:05:17 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:05:17 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:05:18 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:05:18 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:05:18 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:05:18 np0005592561.novalocal systemd-rc-local-generator[7111]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:05:18 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:05:20 np0005592561.novalocal sudo[7036]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:20 np0005592561.novalocal sudo[8436]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yrrlazppjeykdinsucpgaojpmlmcqjwd ; /usr/bin/python3' Jan 22 13:05:20 np0005592561.novalocal sudo[8436]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:21 np0005592561.novalocal python3[8465]: ansible-systemd Invoked with name=tuned enabled=True state=started daemon_reload=False daemon_reexec=False no_block=False force=None masked=None user=None scope=None Jan 22 13:05:21 np0005592561.novalocal systemd[1]: Starting Dynamic System Tuning Daemon... Jan 22 13:05:21 np0005592561.novalocal systemd[1]: Starting Authorization Manager... Jan 22 13:05:21 np0005592561.novalocal systemd[1]: Started Dynamic System Tuning Daemon. Jan 22 13:05:21 np0005592561.novalocal polkitd[9369]: Started polkitd version 0.117 Jan 22 13:05:21 np0005592561.novalocal sudo[8436]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:21 np0005592561.novalocal polkitd[9369]: Loading rules from directory /etc/polkit-1/rules.d Jan 22 13:05:21 np0005592561.novalocal polkitd[9369]: Loading rules from directory /usr/share/polkit-1/rules.d Jan 22 13:05:21 np0005592561.novalocal polkitd[9369]: Finished loading, compiling and executing 2 rules Jan 22 13:05:21 np0005592561.novalocal systemd[1]: Started Authorization Manager. Jan 22 13:05:21 np0005592561.novalocal polkitd[9369]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jan 22 13:05:21 np0005592561.novalocal sudo[9534]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gpekuiepzmpullxwxhdeifhgcnsyyxdd ; /usr/bin/python3' Jan 22 13:05:21 np0005592561.novalocal sudo[9534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:21 np0005592561.novalocal python3[9564]: ansible-command Invoked with _raw_params=tuned-adm active warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 13:05:22 np0005592561.novalocal sudo[9534]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:22 np0005592561.novalocal sudo[9984]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-achngomkucmbanahhuliylnujnjnznlh ; /usr/bin/python3' Jan 22 13:05:22 np0005592561.novalocal sudo[9984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:22 np0005592561.novalocal python3[10008]: ansible-command Invoked with _raw_params=tuned-adm profile throughput-performance warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 13:05:23 np0005592561.novalocal sudo[9984]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:23 np0005592561.novalocal sudo[11180]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uhhijwizmphglujuuxxkenhorqdohivi ; /usr/bin/python3' Jan 22 13:05:23 np0005592561.novalocal sudo[11180]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:23 np0005592561.novalocal python3[11198]: ansible-file Invoked with path=/var/log/weirdo state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Jan 22 13:05:23 np0005592561.novalocal sudo[11180]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:24 np0005592561.novalocal sudo[11408]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-idikeyhvadhoksuquuotzxgkamsyoykn ; /usr/bin/python3' Jan 22 13:05:24 np0005592561.novalocal sudo[11408]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:24 np0005592561.novalocal python3[11419]: ansible-file Invoked with path=/var/log/weirdo-project state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Jan 22 13:05:24 np0005592561.novalocal sudo[11408]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:24 np0005592561.novalocal sudo[11900]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qfpedgxqblozznfcuncmkzzohijyhald ; /usr/bin/python3' Jan 22 13:05:24 np0005592561.novalocal sudo[11900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:24 np0005592561.novalocal python3[11914]: ansible-get_url Invoked with url=http://trunk.rdoproject.org/centos9-epoxy/puppet-ci-testing/delorean.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Jan 22 13:05:24 np0005592561.novalocal sudo[11900]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:24 np0005592561.novalocal sudo[12165]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bdylkkooxbngbxqqoptsreshsnudlekf ; /usr/bin/python3' Jan 22 13:05:24 np0005592561.novalocal sudo[12165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:25 np0005592561.novalocal python3[12177]: ansible-get_url Invoked with url=https://trunk.rdoproject.org/centos9-epoxy/delorean-deps.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Jan 22 13:05:25 np0005592561.novalocal sudo[12165]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:25 np0005592561.novalocal sudo[12428]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gjyozlhzdpvuicjkhkfzrwpufkdfhzzf ; /usr/bin/python3' Jan 22 13:05:25 np0005592561.novalocal sudo[12428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:25 np0005592561.novalocal python3[12457]: ansible-command Invoked with _raw_params=if [ -f /etc/ci/mirror_info.sh ]; then source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|${NODEPOOL_RDO_PROXY}|g" /etc/yum.repos.d/*.repo # For CentOS8 sed -i -e "s|http://mirror.centos.org/centos|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo # For CentOS9 sed -i -e "s|http://mirror.stream.centos.org|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo fi _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 13:05:25 np0005592561.novalocal sudo[12428]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:25 np0005592561.novalocal sudo[12857]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-oapikbzxpchqvohzufmhxyywncswstfm ; /usr/bin/python3' Jan 22 13:05:25 np0005592561.novalocal sudo[12857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:25 np0005592561.novalocal python3[12873]: ansible-command Invoked with _raw_params=repoquery --disablerepo='*' --enablerepo='delorean*' -a --qf '%{sourcerpm}'|sort -u|sed 's/.src.rpm//g' >/var/log/weirdo/rdo-trunk-deps-start.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 13:05:29 np0005592561.novalocal sudo[12857]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:29 np0005592561.novalocal sudo[14313]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-abwahwnwslghofqepllxaweopbfiqzub ; /usr/bin/python3' Jan 22 13:05:29 np0005592561.novalocal sudo[14313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:29 np0005592561.novalocal python3[14324]: ansible-command Invoked with _raw_params=dnf clean all _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 13:05:29 np0005592561.novalocal python3[14324]: ansible-command [WARNING] Consider using the dnf module rather than running 'dnf'. If you need to use command because dnf is insufficient you can add 'warn: false' to this command task or set 'command_warnings=False' in ansible.cfg to get rid of this message. Jan 22 13:05:30 np0005592561.novalocal sudo[14313]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:30 np0005592561.novalocal sudo[14617]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-omibimpmrfpdehyuwakpoveekgomztko ; /usr/bin/python3' Jan 22 13:05:30 np0005592561.novalocal sudo[14617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:05:30 np0005592561.novalocal python3[14630]: ansible-dnf Invoked with name=['*'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 22 13:05:43 np0005592561.novalocal systemd[2998]: Starting Mark boot as successful... Jan 22 13:05:43 np0005592561.novalocal systemd[2998]: Finished Mark boot as successful. Jan 22 13:05:59 np0005592561.novalocal sudo[14617]: pam_unix(sudo:session): session closed for user root Jan 22 13:05:59 np0005592561.novalocal sudo[25821]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ndgwbgoldvkcyxjlfjbnuqxfymrigryd ; /usr/bin/python3' Jan 22 13:05:59 np0005592561.novalocal sudo[25821]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:06:00 np0005592561.novalocal python3[25831]: ansible-dnf Invoked with name=['gettext', 'diffstat', 'doxygen', 'patch', 'patchutils', 'subversion', 'systemtap', 'git', 'wget', 'python3-libselinux', 'python3-setuptools', 'rubygem-rexml'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 22 13:06:07 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:06:07 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:06:07 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Consumed 55.584s CPU time. Jan 22 13:06:07 np0005592561.novalocal systemd[1]: run-r407387dfcb954c2bb01bc9ebc5c2b3b1.service: Deactivated successfully. Jan 22 13:06:18 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:06:18 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:07:07 np0005592561.novalocal groupadd[44828]: group added to /etc/group: name=rtkit, GID=172 Jan 22 13:07:07 np0005592561.novalocal groupadd[44828]: group added to /etc/gshadow: name=rtkit Jan 22 13:07:07 np0005592561.novalocal groupadd[44828]: new group: name=rtkit, GID=172 Jan 22 13:07:07 np0005592561.novalocal useradd[44836]: new user: name=rtkit, UID=172, GID=172, home=/, shell=/sbin/nologin, from=none Jan 22 13:07:07 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:07:07 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:07:07 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:07:08 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:07:08 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:07:19 np0005592561.novalocal kernel: SELinux: Converting 448 SID table entries... Jan 22 13:07:19 np0005592561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 13:07:19 np0005592561.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 13:07:19 np0005592561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 13:07:19 np0005592561.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 13:07:19 np0005592561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 13:07:19 np0005592561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 13:07:19 np0005592561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 13:07:28 np0005592561.novalocal groupadd[44907]: group added to /etc/group: name=geoclue, GID=994 Jan 22 13:07:28 np0005592561.novalocal groupadd[44907]: group added to /etc/gshadow: name=geoclue Jan 22 13:07:28 np0005592561.novalocal groupadd[44907]: new group: name=geoclue, GID=994 Jan 22 13:07:28 np0005592561.novalocal useradd[44914]: new user: name=geoclue, UID=993, GID=994, home=/var/lib/geoclue, shell=/sbin/nologin, from=none Jan 22 13:07:28 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:07:28 np0005592561.novalocal dbus-broker-launch[769]: avc: op=load_policy lsm=selinux seqno=2 res=1 Jan 22 13:07:28 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Reloading rules Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Collecting garbage unconditionally... Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Loading rules from directory /etc/polkit-1/rules.d Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Loading rules from directory /usr/share/polkit-1/rules.d Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Finished loading, compiling and executing 3 rules Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Reloading rules Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Collecting garbage unconditionally... Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Loading rules from directory /etc/polkit-1/rules.d Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Loading rules from directory /usr/share/polkit-1/rules.d Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Finished loading, compiling and executing 3 rules Jan 22 13:07:28 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:07:28 np0005592561.novalocal groupadd[44926]: group added to /etc/group: name=flatpak, GID=993 Jan 22 13:07:28 np0005592561.novalocal groupadd[44926]: group added to /etc/gshadow: name=flatpak Jan 22 13:07:28 np0005592561.novalocal groupadd[44926]: new group: name=flatpak, GID=993 Jan 22 13:07:28 np0005592561.novalocal useradd[44933]: new user: name=flatpak, UID=992, GID=993, home=/, shell=/usr/sbin/nologin, from=none Jan 22 13:07:28 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:07:28 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:07:28 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Reloading rules Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Collecting garbage unconditionally... Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Loading rules from directory /etc/polkit-1/rules.d Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Loading rules from directory /usr/share/polkit-1/rules.d Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Finished loading, compiling and executing 4 rules Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Reloading rules Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Collecting garbage unconditionally... Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Loading rules from directory /etc/polkit-1/rules.d Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Loading rules from directory /usr/share/polkit-1/rules.d Jan 22 13:07:28 np0005592561.novalocal polkitd[9369]: Finished loading, compiling and executing 4 rules Jan 22 13:07:30 np0005592561.novalocal systemd[1]: Stopping OpenSSH server daemon... Jan 22 13:07:30 np0005592561.novalocal sshd[1004]: Received signal 15; terminating. Jan 22 13:07:30 np0005592561.novalocal systemd[1]: sshd.service: Deactivated successfully. Jan 22 13:07:30 np0005592561.novalocal systemd[1]: Stopped OpenSSH server daemon. Jan 22 13:07:30 np0005592561.novalocal systemd[1]: Stopped target sshd-keygen.target. Jan 22 13:07:30 np0005592561.novalocal systemd[1]: Stopping sshd-keygen.target... Jan 22 13:07:30 np0005592561.novalocal systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 22 13:07:30 np0005592561.novalocal systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 22 13:07:30 np0005592561.novalocal systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 22 13:07:30 np0005592561.novalocal systemd[1]: Reached target sshd-keygen.target. Jan 22 13:07:30 np0005592561.novalocal systemd[1]: Starting OpenSSH server daemon... Jan 22 13:07:30 np0005592561.novalocal sshd[44974]: Server listening on 0.0.0.0 port 22. Jan 22 13:07:30 np0005592561.novalocal sshd[44974]: Server listening on :: port 22. Jan 22 13:07:30 np0005592561.novalocal systemd[1]: Started OpenSSH server daemon. Jan 22 13:07:31 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:07:31 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:07:32 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:07:32 np0005592561.novalocal systemd-rc-local-generator[45073]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:07:32 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:07:35 np0005592561.novalocal sudo[25821]: pam_unix(sudo:session): session closed for user root Jan 22 13:07:35 np0005592561.novalocal sudo[48737]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vybcuaraypllzmcrhlpijhqovgczsstf ; /usr/bin/python3' Jan 22 13:07:35 np0005592561.novalocal sudo[48737]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:07:36 np0005592561.novalocal python3[48764]: ansible-dnf Invoked with name=['net-tools', 'lsof', 'sysstat', 'psmisc', 'dnf-utils'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 22 13:07:41 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:07:41 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:07:41 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:07:41 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Consumed 11.383s CPU time. Jan 22 13:07:41 np0005592561.novalocal systemd[1]: run-rbc75877906d04e348428ded7938e8400.service: Deactivated successfully. Jan 22 13:07:41 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:07:41 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:07:41 np0005592561.novalocal systemd-rc-local-generator[53323]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:07:41 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:07:42 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:07:42 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:07:42 np0005592561.novalocal sudo[48737]: pam_unix(sudo:session): session closed for user root Jan 22 13:07:42 np0005592561.novalocal systemd[1]: run-r10bed6563778445481b60c3aaac3ff95.service: Deactivated successfully. Jan 22 13:07:42 np0005592561.novalocal sudo[53633]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kixuvxfhigvldrppwwbsrxmigbehqvxx ; /usr/bin/python3' Jan 22 13:07:42 np0005592561.novalocal sudo[53633]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:07:42 np0005592561.novalocal python3[53635]: ansible-replace Invoked with dest=/usr/lib/systemd/system/sysstat-collect.timer regexp=10 replace=1 path=/usr/lib/systemd/system/sysstat-collect.timer backup=False encoding=utf-8 follow=False unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Jan 22 13:07:42 np0005592561.novalocal sudo[53633]: pam_unix(sudo:session): session closed for user root Jan 22 13:07:42 np0005592561.novalocal sudo[53642]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-txpbqzawqfndrstvhgzigmbqstajldfs ; /usr/bin/python3' Jan 22 13:07:42 np0005592561.novalocal sudo[53642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:07:42 np0005592561.novalocal python3[53644]: ansible-systemd Invoked with name=sysstat enabled=True daemon_reload=True state=started daemon_reexec=False no_block=False force=None masked=None user=None scope=None Jan 22 13:07:42 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:07:43 np0005592561.novalocal systemd-rc-local-generator[53667]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:07:43 np0005592561.novalocal systemd[1]: Started Run system activity accounting tool every 1 minutes. Jan 22 13:07:43 np0005592561.novalocal systemd[1]: Started Generate summary of yesterday's process accounting. Jan 22 13:07:43 np0005592561.novalocal systemd[1]: Starting Resets System Activity Logs... Jan 22 13:07:43 np0005592561.novalocal systemd[1]: Finished Resets System Activity Logs. Jan 22 13:07:43 np0005592561.novalocal sudo[53642]: pam_unix(sudo:session): session closed for user root Jan 22 13:07:43 np0005592561.novalocal sudo[53692]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gjtlvhogilkjquntslaycbbdsybejzch ; /usr/bin/python3' Jan 22 13:07:43 np0005592561.novalocal sudo[53692]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:07:43 np0005592561.novalocal python3[53694]: ansible-lineinfile Invoked with dest=/etc/hosts line=127.0.0.1 np0005592561 np0005592561.novalocal state=present path=/etc/hosts backrefs=False create=False backup=False firstmatch=False follow=False unsafe_writes=False regexp=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Jan 22 13:07:43 np0005592561.novalocal sudo[53692]: pam_unix(sudo:session): session closed for user root Jan 22 13:07:43 np0005592561.novalocal sudo[53701]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qsioiuenhcczpobezafxesnbnfvocmxa ; /usr/bin/python3' Jan 22 13:07:43 np0005592561.novalocal sudo[53701]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:07:44 np0005592561.novalocal python3[53703]: ansible-dnf Invoked with name=['libxml2-devel', 'libxslt-devel', 'ruby-devel', 'rubygems', 'qemu-img'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 22 13:07:45 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:07:45 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:07:46 np0005592561.novalocal sudo[53701]: pam_unix(sudo:session): session closed for user root Jan 22 13:07:46 np0005592561.novalocal sudo[54026]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xfeqxuwwaoacdlpnkvmdnqthyvmrujrz ; /usr/bin/python3' Jan 22 13:07:46 np0005592561.novalocal sudo[54026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:07:46 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:07:46 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:07:46 np0005592561.novalocal python3[54028]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Jan 22 13:07:46 np0005592561.novalocal python3[54028]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Jan 22 13:07:46 np0005592561.novalocal systemd[1]: run-rf9a6dcda03d74ef38970aac2ad0867c4.service: Deactivated successfully. Jan 22 13:07:46 np0005592561.novalocal sudo[54026]: pam_unix(sudo:session): session closed for user root Jan 22 13:07:46 np0005592561.novalocal sudo[54038]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mllwnlyhxumtwqatmaxqdbgtpyqzomke ; /usr/bin/python3' Jan 22 13:07:46 np0005592561.novalocal sudo[54038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:07:47 np0005592561.novalocal python3[54040]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Jan 22 13:07:47 np0005592561.novalocal python3[54040]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Jan 22 13:07:47 np0005592561.novalocal sudo[54038]: pam_unix(sudo:session): session closed for user root Jan 22 13:07:47 np0005592561.novalocal sudo[54049]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wpsrvwdxbwjwkppudaobkggvyqfblrea ; /usr/bin/python3' Jan 22 13:07:47 np0005592561.novalocal sudo[54049]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:07:47 np0005592561.novalocal python3[54051]: ansible-git Invoked with repo=https://review.opendev.org/openstack/puppet-openstack-integration dest=/tmp/puppet-openstack version=stable/2025.1 force=True remote=origin clone=True update=True verify_commit=False gpg_whitelist=[] accept_hostkey=False bare=False recursive=True track_submodules=False refspec=None reference=None depth=None key_file=None ssh_opts=None executable=None umask=None archive=None separate_git_dir=None Jan 22 13:07:48 np0005592561.novalocal sudo[54049]: pam_unix(sudo:session): session closed for user root Jan 22 13:07:48 np0005592561.novalocal sudo[54082]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ekzkxwjetfiwtiefuivfzzqdfoctigaf ; /usr/bin/python3' Jan 22 13:07:48 np0005592561.novalocal sudo[54082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:07:48 np0005592561.novalocal python3[54084]: ansible-file Invoked with path=/tmp/puppet-openstack/.bundled_gems state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Jan 22 13:07:48 np0005592561.novalocal sudo[54082]: pam_unix(sudo:session): session closed for user root Jan 22 13:07:49 np0005592561.novalocal sudo[54106]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kqxsvdaemghengynnqqxczdnvszajzdn ; /usr/bin/python3' Jan 22 13:07:49 np0005592561.novalocal sudo[54106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:07:49 np0005592561.novalocal python3[54108]: ansible-file Invoked with path=/usr/zuul-env/bin/zuul-cloner state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Jan 22 13:07:49 np0005592561.novalocal sudo[54106]: pam_unix(sudo:session): session closed for user root Jan 22 13:07:49 np0005592561.novalocal sudo[54115]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ghetjpydnzvccltdzljsgsyvsohqrarp ; MANAGE_REPOS=false SCENARIO=scenario005 GEM_HOME=/tmp/puppet-openstack/.bundled_gems TEMPEST_VERSION=\'\' WORKSPACE=/var/log/weirdo-project TEMPEST_FROM_SOURCE=false PUPPETFILE_DIR=/etc/puppet/modules PUPPET_PKG=puppet PUPPET_ARGS=--modulepath=/usr/share/openstack-puppet/modules:/etc/puppet/modules SWAP_SIZE_GB=8 /usr/bin/python3' Jan 22 13:07:49 np0005592561.novalocal sudo[54115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:07:49 np0005592561.novalocal python3[54117]: ansible-command Invoked with chdir=/tmp/puppet-openstack _raw_params=./run_tests.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None creates=None removes=None stdin=None Jan 22 13:08:09 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:08:09 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:08:09 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:08:43 np0005592561.novalocal systemd[2998]: Created slice User Background Tasks Slice. Jan 22 13:08:43 np0005592561.novalocal systemd[2998]: Starting Cleanup of User's Temporary Files and Directories... Jan 22 13:08:51 np0005592561.novalocal systemd[2998]: Finished Cleanup of User's Temporary Files and Directories. Jan 22 13:09:09 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:09:10 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:09:10 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:09:50 np0005592561.novalocal kernel: Adding 8388604k swap on /swapfile. Priority:-2 extents:25 across:10503148k Jan 22 13:09:59 np0005592561.novalocal sshd-session[54186]: error: maximum authentication attempts exceeded for root from 115.140.161.61 port 53798 ssh2 [preauth] Jan 22 13:09:59 np0005592561.novalocal sshd-session[54186]: Disconnecting authenticating user root 115.140.161.61 port 53798: Too many authentication failures [preauth] Jan 22 13:10:00 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:10:01 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:10:01 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:10:01 np0005592561.novalocal groupadd[54193]: group added to /etc/group: name=puppet, GID=52 Jan 22 13:10:01 np0005592561.novalocal groupadd[54193]: group added to /etc/gshadow: name=puppet Jan 22 13:10:01 np0005592561.novalocal groupadd[54193]: new group: name=puppet, GID=52 Jan 22 13:10:01 np0005592561.novalocal useradd[54200]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Jan 22 13:10:02 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:10:02 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:10:02 np0005592561.novalocal sshd-session[54188]: error: maximum authentication attempts exceeded for root from 115.140.161.61 port 54376 ssh2 [preauth] Jan 22 13:10:02 np0005592561.novalocal sshd-session[54188]: Disconnecting authenticating user root 115.140.161.61 port 54376: Too many authentication failures [preauth] Jan 22 13:10:02 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:10:02 np0005592561.novalocal systemd-rc-local-generator[54238]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:10:03 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:10:05 np0005592561.novalocal sshd-session[54642]: error: maximum authentication attempts exceeded for root from 115.140.161.61 port 54850 ssh2 [preauth] Jan 22 13:10:05 np0005592561.novalocal sshd-session[54642]: Disconnecting authenticating user root 115.140.161.61 port 54850: Too many authentication failures [preauth] Jan 22 13:10:07 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:10:07 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:10:07 np0005592561.novalocal systemd[1]: run-r949ac3deb5394d4eac178433af3914a8.service: Deactivated successfully. Jan 22 13:10:07 np0005592561.novalocal sshd-session[54845]: Received disconnect from 115.140.161.61 port 55354:11: disconnected by user [preauth] Jan 22 13:10:07 np0005592561.novalocal sshd-session[54845]: Disconnected from authenticating user root 115.140.161.61 port 55354 [preauth] Jan 22 13:10:33 np0005592561.novalocal kernel: SELinux: Converting 480 SID table entries... Jan 22 13:10:33 np0005592561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 13:10:33 np0005592561.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 13:10:33 np0005592561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 13:10:33 np0005592561.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 13:10:33 np0005592561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 13:10:33 np0005592561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 13:10:33 np0005592561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 13:10:35 np0005592561.novalocal dbus-broker-launch[769]: avc: op=load_policy lsm=selinux seqno=3 res=1 Jan 22 13:10:35 np0005592561.novalocal systemd[1]: Starting PCP Reboot Initialization Helper Service... Jan 22 13:10:35 np0005592561.novalocal systemd[1]: Finished PCP Reboot Initialization Helper Service. Jan 22 13:10:35 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:10:35 np0005592561.novalocal systemd-rc-local-generator[55473]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:10:44 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:10:44 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:10:46 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:10:46 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:10:46 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:10:46 np0005592561.novalocal systemd-rc-local-generator[55727]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:10:47 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:10:54 np0005592561.novalocal dbus-broker-launch[769]: avc: op=setenforce lsm=selinux enforcing=0 res=1 Jan 22 13:10:54 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:10:54 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:10:54 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.535s CPU time. Jan 22 13:10:54 np0005592561.novalocal systemd[1]: run-rb2d6e17cc67041a98ff886d60b35d5ad.service: Deactivated successfully. Jan 22 13:11:08 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:11:08 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:11:08 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:11:56 np0005592561.novalocal setsebool[61920]: The virt_use_nfs policy boolean was changed to 1 by root Jan 22 13:11:56 np0005592561.novalocal setsebool[61920]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Jan 22 13:12:07 np0005592561.novalocal kernel: SELinux: Converting 517 SID table entries... Jan 22 13:12:07 np0005592561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 13:12:07 np0005592561.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 13:12:07 np0005592561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 13:12:07 np0005592561.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 13:12:07 np0005592561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 13:12:07 np0005592561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 13:12:07 np0005592561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 13:12:09 np0005592561.novalocal dbus-broker-launch[769]: avc: op=load_policy lsm=selinux seqno=5 res=1 Jan 22 13:12:09 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:12:09 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:12:09 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:13:09 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:13:09 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:13:09 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:13:12 np0005592561.novalocal kernel: SELinux: Converting 2739 SID table entries... Jan 22 13:13:12 np0005592561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 13:13:12 np0005592561.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 13:13:12 np0005592561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 13:13:12 np0005592561.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 13:13:12 np0005592561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 13:13:12 np0005592561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 13:13:12 np0005592561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 13:13:49 np0005592561.novalocal dbus-broker-launch[769]: avc: op=load_policy lsm=selinux seqno=7 res=1 Jan 22 13:13:49 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:13:49 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:13:50 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:13:50 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:13:50 np0005592561.novalocal systemd[1]: run-r2952503add5148438d6ee206341fe473.service: Deactivated successfully. Jan 22 13:14:02 np0005592561.novalocal kernel: SELinux: Converting 2739 SID table entries... Jan 22 13:14:02 np0005592561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 13:14:02 np0005592561.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 13:14:02 np0005592561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 13:14:02 np0005592561.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 13:14:02 np0005592561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 13:14:02 np0005592561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 13:14:02 np0005592561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 13:14:02 np0005592561.novalocal dbus-broker-launch[769]: avc: op=load_policy lsm=selinux seqno=8 res=1 Jan 22 13:14:02 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:14:02 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:14:02 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:14:02 np0005592561.novalocal groupadd[62979]: group added to /etc/group: name=memcached, GID=989 Jan 22 13:14:02 np0005592561.novalocal groupadd[62979]: group added to /etc/gshadow: name=memcached Jan 22 13:14:02 np0005592561.novalocal groupadd[62979]: new group: name=memcached, GID=989 Jan 22 13:14:02 np0005592561.novalocal useradd[62986]: new user: name=memcached, UID=989, GID=989, home=/, shell=/sbin/nologin, from=none Jan 22 13:14:03 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:14:03 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:14:03 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:14:04 np0005592561.novalocal systemd-rc-local-generator[63416]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:14:04 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:14:04 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:14:04 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:14:04 np0005592561.novalocal systemd[1]: run-rfb86927e1b214b2ba7a81a7a668a004d.service: Deactivated successfully. Jan 22 13:14:05 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:14:05 np0005592561.novalocal systemd-rc-local-generator[63589]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:14:05 np0005592561.novalocal systemd[1]: Started memcached daemon. Jan 22 13:14:05 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:14:05 np0005592561.novalocal systemd-rc-local-generator[63631]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:14:05 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:14:05 np0005592561.novalocal systemd-rc-local-generator[63659]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:14:13 np0005592561.novalocal groupadd[63763]: group added to /etc/group: name=epmd, GID=988 Jan 22 13:14:13 np0005592561.novalocal groupadd[63763]: group added to /etc/gshadow: name=epmd Jan 22 13:14:13 np0005592561.novalocal groupadd[63763]: new group: name=epmd, GID=988 Jan 22 13:14:13 np0005592561.novalocal useradd[63770]: new user: name=epmd, UID=988, GID=988, home=/dev/null, shell=/sbin/nologin, from=none Jan 22 13:14:14 np0005592561.novalocal groupadd[63779]: group added to /etc/group: name=rabbitmq, GID=987 Jan 22 13:14:14 np0005592561.novalocal groupadd[63779]: group added to /etc/gshadow: name=rabbitmq Jan 22 13:14:14 np0005592561.novalocal groupadd[63779]: new group: name=rabbitmq, GID=987 Jan 22 13:14:14 np0005592561.novalocal useradd[63786]: new user: name=rabbitmq, UID=987, GID=987, home=/var/lib/rabbitmq, shell=/sbin/nologin, from=none Jan 22 13:14:15 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:14:16 np0005592561.novalocal systemd-rc-local-generator[63814]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:14:16 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:14:16 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:14:16 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:14:16 np0005592561.novalocal systemd-rc-local-generator[63855]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:14:17 np0005592561.novalocal systemd[1]: Starting dnf makecache... Jan 22 13:14:17 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: Updating Subscription Management repositories. Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: Unable to read consumer identity Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: This system is not registered with an entitlement server. You can use subscription-manager to register. Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: Failed determining last makecache time. Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-openstack-barbican-3416cdce80f63f3e499 124 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-openstack-ironic-python-agent-1492c705 213 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-openstack-cinder-0c0c5bf5ce1a2104eef20 182 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-python-openstackclient-bc1930c20ede201 200 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-python-cloudkitty-tests-tempest-2c80f8 197 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-openstack-kolla-96d11507b4f7013a66a76a 237 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-openstack-nova-3b97b00f0e2b1d7d10b7169 176 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-openstack-designate-bbb241f89620faa6d9 205 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-openstack-glance-d70e40e4cc993dacb8833 159 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-openstack-keystone-732c46d23d45231eba3 207 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-openstack-manila-908cc91cef1f8ade417a3 177 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-openstack-neutron-d9269bcf1bae33ecc9b1 173 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-openstack-octavia-dbec3511b2c49dbf4169 185 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-openstack-watcher-024815af711553739b46 192 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:14:17 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-python-tcib-c2ae956ec1898faaed6197ef95 166 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal systemd[1]: run-rbfe5571bee98440b9e2b199e172ac57e.service: Deactivated successfully. Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-puppet-openstacklib-12557ed183275edadd 157 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-openstack-swift-06b34fdfa0f09f2bdb655e 173 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-python-tempestconf-8515371b7cceebd4282 167 kB/s | 3.0 kB 00:00 Jan 22 13:14:17 np0005592561.novalocal dnf[63909]: delorean-python-django-horizon-30af7039087e10d7 178 kB/s | 3.0 kB 00:00 Jan 22 13:14:18 np0005592561.novalocal dnf[63909]: CentOS-9 - RabbitMQ 38 33 kB/s | 8.0 kB 00:00 Jan 22 13:14:18 np0005592561.novalocal dnf[63909]: CentOS Stream 9 - BaseOS 857 kB/s | 3.9 kB 00:00 Jan 22 13:14:18 np0005592561.novalocal dnf[63909]: CentOS Stream 9 - AppStream 1.0 MB/s | 4.4 kB 00:00 Jan 22 13:14:18 np0005592561.novalocal dnf[63909]: CentOS Stream 9 - CRB 1.2 MB/s | 4.3 kB 00:00 Jan 22 13:14:18 np0005592561.novalocal dnf[63909]: CentOS Stream 9 - Extras packages 840 kB/s | 3.0 kB 00:00 Jan 22 13:14:18 np0005592561.novalocal dnf[63909]: dlrn-epoxy-testing 208 kB/s | 3.0 kB 00:00 Jan 22 13:14:18 np0005592561.novalocal dnf[63909]: dlrn-epoxy-build-deps 213 kB/s | 3.0 kB 00:00 Jan 22 13:14:18 np0005592561.novalocal dnf[63909]: centos9-rabbitmq 831 kB/s | 3.0 kB 00:00 Jan 22 13:14:18 np0005592561.novalocal dnf[63909]: centos9-storage 916 kB/s | 3.0 kB 00:00 Jan 22 13:14:18 np0005592561.novalocal dnf[63909]: centos9-opstools 789 kB/s | 3.0 kB 00:00 Jan 22 13:14:18 np0005592561.novalocal dnf[63909]: NFV SIG OpenvSwitch 933 kB/s | 3.0 kB 00:00 Jan 22 13:14:18 np0005592561.novalocal dnf[63909]: Extra Packages for Enterprise Linux 9 - x86_64 59 kB/s | 27 kB 00:00 Jan 22 13:14:19 np0005592561.novalocal dnf[63909]: Metadata cache created. Jan 22 13:14:19 np0005592561.novalocal systemd[1]: dnf-makecache.service: Deactivated successfully. Jan 22 13:14:19 np0005592561.novalocal systemd[1]: Finished dnf makecache. Jan 22 13:14:19 np0005592561.novalocal systemd[1]: dnf-makecache.service: Consumed 1.321s CPU time. Jan 22 13:14:20 np0005592561.novalocal runuser[64485]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:14:21 np0005592561.novalocal runuser[64485]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:14:36 np0005592561.novalocal kernel: SELinux: Converting 2746 SID table entries... Jan 22 13:14:36 np0005592561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 13:14:36 np0005592561.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 13:14:36 np0005592561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 13:14:36 np0005592561.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 13:14:36 np0005592561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 13:14:36 np0005592561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 13:14:36 np0005592561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 13:14:37 np0005592561.novalocal groupadd[64996]: group added to /etc/group: name=mysql, GID=27 Jan 22 13:14:37 np0005592561.novalocal groupadd[64996]: group added to /etc/gshadow: name=mysql Jan 22 13:14:37 np0005592561.novalocal groupadd[64996]: new group: name=mysql, GID=27 Jan 22 13:14:37 np0005592561.novalocal useradd[65002]: new user: name=mysql, UID=27, GID=27, home=/var/lib/mysql, shell=/sbin/nologin, from=none Jan 22 13:14:39 np0005592561.novalocal dbus-broker-launch[769]: avc: op=load_policy lsm=selinux seqno=9 res=1 Jan 22 13:14:39 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:14:39 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:14:39 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:14:39 np0005592561.novalocal systemd-rc-local-generator[65478]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:14:39 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:14:43 np0005592561.novalocal groupadd[68323]: group added to /etc/group: name=redis, GID=986 Jan 22 13:14:43 np0005592561.novalocal groupadd[68323]: group added to /etc/gshadow: name=redis Jan 22 13:14:43 np0005592561.novalocal groupadd[68323]: new group: name=redis, GID=986 Jan 22 13:14:43 np0005592561.novalocal useradd[68372]: new user: name=redis, UID=986, GID=986, home=/var/lib/redis, shell=/sbin/nologin, from=none Jan 22 13:14:44 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:14:44 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:14:44 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Consumed 5.500s CPU time. Jan 22 13:14:44 np0005592561.novalocal systemd[1]: run-r629879f425214da69711a1eea02a16d0.service: Deactivated successfully. Jan 22 13:14:44 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:14:44 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:14:44 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:14:44 np0005592561.novalocal systemd-rc-local-generator[68756]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:14:44 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:14:45 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:14:45 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:14:45 np0005592561.novalocal systemd[1]: run-rb4540a91f89b432a95335b4c59a8f992.service: Deactivated successfully. Jan 22 13:14:56 np0005592561.novalocal kernel: SELinux: Converting 2749 SID table entries... Jan 22 13:14:56 np0005592561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 13:14:56 np0005592561.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 13:14:56 np0005592561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 13:14:56 np0005592561.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 13:14:56 np0005592561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 13:14:56 np0005592561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 13:14:56 np0005592561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 13:14:56 np0005592561.novalocal groupadd[68800]: group added to /etc/group: name=unbound, GID=985 Jan 22 13:14:56 np0005592561.novalocal groupadd[68800]: group added to /etc/gshadow: name=unbound Jan 22 13:14:56 np0005592561.novalocal groupadd[68800]: new group: name=unbound, GID=985 Jan 22 13:14:57 np0005592561.novalocal useradd[68807]: new user: name=unbound, UID=985, GID=985, home=/var/lib/unbound, shell=/sbin/nologin, from=none Jan 22 13:14:57 np0005592561.novalocal dbus-broker-launch[769]: avc: op=load_policy lsm=selinux seqno=10 res=1 Jan 22 13:14:57 np0005592561.novalocal systemd[1]: Started daily update of the root trust anchor for DNSSEC. Jan 22 13:14:57 np0005592561.novalocal groupadd[68820]: group added to /etc/group: name=openvswitch, GID=984 Jan 22 13:14:57 np0005592561.novalocal groupadd[68820]: group added to /etc/gshadow: name=openvswitch Jan 22 13:14:57 np0005592561.novalocal groupadd[68820]: new group: name=openvswitch, GID=984 Jan 22 13:14:57 np0005592561.novalocal useradd[68827]: new user: name=openvswitch, UID=984, GID=984, home=/, shell=/sbin/nologin, from=none Jan 22 13:14:57 np0005592561.novalocal groupadd[68835]: group added to /etc/group: name=hugetlbfs, GID=983 Jan 22 13:14:57 np0005592561.novalocal groupadd[68835]: group added to /etc/gshadow: name=hugetlbfs Jan 22 13:14:57 np0005592561.novalocal groupadd[68835]: new group: name=hugetlbfs, GID=983 Jan 22 13:14:57 np0005592561.novalocal usermod[68843]: add 'openvswitch' to group 'hugetlbfs' Jan 22 13:14:57 np0005592561.novalocal usermod[68843]: add 'openvswitch' to shadow group 'hugetlbfs' Jan 22 13:14:59 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:14:59 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:14:59 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:14:59 np0005592561.novalocal systemd-rc-local-generator[69319]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:14:59 np0005592561.novalocal systemd-sysv-generator[69326]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:14:59 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:15:00 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:15:00 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:15:00 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:15:00 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:15:00 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:15:00 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.324s CPU time. Jan 22 13:15:00 np0005592561.novalocal systemd[1]: run-r3cd6c38a60c9402fa1b0bd5c0850d7e4.service: Deactivated successfully. Jan 22 13:15:00 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:15:00 np0005592561.novalocal systemd-sysv-generator[69938]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:15:00 np0005592561.novalocal systemd-rc-local-generator[69934]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:15:00 np0005592561.novalocal systemd[1]: Starting Open vSwitch Database Unit... Jan 22 13:15:00 np0005592561.novalocal chown[69945]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Jan 22 13:15:00 np0005592561.novalocal ovs-ctl[69950]: /etc/openvswitch/conf.db does not exist ... (warning). Jan 22 13:15:00 np0005592561.novalocal ovs-ctl[69950]: Creating empty database /etc/openvswitch/conf.db [ OK ] Jan 22 13:15:00 np0005592561.novalocal ovs-ctl[69950]: Starting ovsdb-server [ OK ] Jan 22 13:15:00 np0005592561.novalocal ovs-vsctl[69999]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.8.0 Jan 22 13:15:01 np0005592561.novalocal ovs-vsctl[70018]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.4.4-99.el9s "external-ids:system-id=\"ded5b132-59fa-462e-a303-533eac913eaa\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"centos\"" "system-version=\"9\"" Jan 22 13:15:01 np0005592561.novalocal ovs-ctl[69950]: Configuring Open vSwitch system IDs [ OK ] Jan 22 13:15:01 np0005592561.novalocal ovs-vsctl[70023]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005592561 Jan 22 13:15:01 np0005592561.novalocal ovs-ctl[69950]: Enabling remote OVSDB managers [ OK ] Jan 22 13:15:01 np0005592561.novalocal systemd[1]: Started Open vSwitch Database Unit. Jan 22 13:15:01 np0005592561.novalocal systemd[1]: Starting Open vSwitch Delete Transient Ports... Jan 22 13:15:01 np0005592561.novalocal systemd[1]: Finished Open vSwitch Delete Transient Ports. Jan 22 13:15:01 np0005592561.novalocal systemd[1]: Starting Open vSwitch Forwarding Unit... Jan 22 13:15:01 np0005592561.novalocal kernel: openvswitch: Open vSwitch switching datapath Jan 22 13:15:01 np0005592561.novalocal ovs-ctl[70068]: Inserting openvswitch module [ OK ] Jan 22 13:15:01 np0005592561.novalocal ovs-ctl[70037]: Starting ovs-vswitchd [ OK ] Jan 22 13:15:01 np0005592561.novalocal ovs-vsctl[70084]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005592561 Jan 22 13:15:01 np0005592561.novalocal ovs-ctl[70037]: Enabling remote OVSDB managers [ OK ] Jan 22 13:15:01 np0005592561.novalocal systemd[1]: Started Open vSwitch Forwarding Unit. Jan 22 13:15:01 np0005592561.novalocal systemd[1]: Starting Open vSwitch... Jan 22 13:15:01 np0005592561.novalocal systemd[1]: Finished Open vSwitch. Jan 22 13:15:01 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:15:01 np0005592561.novalocal systemd-rc-local-generator[70111]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:15:01 np0005592561.novalocal systemd-sysv-generator[70116]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:15:02 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:15:02 np0005592561.novalocal systemd-rc-local-generator[70140]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:15:02 np0005592561.novalocal systemd-sysv-generator[70144]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:15:02 np0005592561.novalocal ovs-vsctl[70153]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl add-br br-ex Jan 22 13:15:02 np0005592561.novalocal kernel: ovs-system: entered promiscuous mode Jan 22 13:15:02 np0005592561.novalocal NetworkManager[856]: [1769105702.6399] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Jan 22 13:15:02 np0005592561.novalocal NetworkManager[856]: [1769105702.6416] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/3) Jan 22 13:15:02 np0005592561.novalocal kernel: Timeout policy base is empty Jan 22 13:15:02 np0005592561.novalocal NetworkManager[856]: [1769105702.6641] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Jan 22 13:15:02 np0005592561.novalocal kernel: br-ex: entered promiscuous mode Jan 22 13:15:02 np0005592561.novalocal NetworkManager[856]: [1769105702.6652] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Jan 22 13:15:02 np0005592561.novalocal systemd-udevd[70172]: Network interface NamePolicy= disabled on kernel command line. Jan 22 13:15:02 np0005592561.novalocal systemd-udevd[70169]: Network interface NamePolicy= disabled on kernel command line. Jan 22 13:15:02 np0005592561.novalocal NetworkManager[856]: [1769105702.6861] device (br-ex): carrier: link connected Jan 22 13:15:02 np0005592561.novalocal NetworkManager[856]: [1769105702.7189] manager: (loop1): new Dummy device (/org/freedesktop/NetworkManager/Devices/5) Jan 22 13:15:02 np0005592561.novalocal NetworkManager[856]: [1769105702.9234] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70190 uid=0 result="success" Jan 22 13:15:02 np0005592561.novalocal ifdown[70191]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Jan 22 13:15:02 np0005592561.novalocal ifdown[70192]: 'network-scripts' will be removed from distribution in near future. Jan 22 13:15:02 np0005592561.novalocal ifdown[70193]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 22 13:15:02 np0005592561.novalocal NetworkManager[856]: [1769105702.9610] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70199 uid=0 result="success" Jan 22 13:15:02 np0005592561.novalocal NetworkManager[856]: [1769105702.9963] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70207 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.0232] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70216 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.1372] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70239 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal ovs-vsctl[70244]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-br br-ex Jan 22 13:15:03 np0005592561.novalocal kernel: br-ex: left promiscuous mode Jan 22 13:15:03 np0005592561.novalocal kernel: ovs-system: left promiscuous mode Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.2395] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70262 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal ifdown[70266]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Jan 22 13:15:03 np0005592561.novalocal ifdown[70267]: 'network-scripts' will be removed from distribution in near future. Jan 22 13:15:03 np0005592561.novalocal ifdown[70268]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.2803] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70274 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.3308] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70285 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.3700] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70297 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.4440] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70323 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal ovs-vsctl[70331]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.5023] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70338 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal ifup[70342]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 22 13:15:03 np0005592561.novalocal ifup[70343]: 'network-scripts' will be removed from distribution in near future. Jan 22 13:15:03 np0005592561.novalocal ifup[70344]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.5481] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70350 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.6185] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70362 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal ifup[70363]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 22 13:15:03 np0005592561.novalocal ifup[70364]: 'network-scripts' will be removed from distribution in near future. Jan 22 13:15:03 np0005592561.novalocal ifup[70365]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.6615] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70371 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal ovs-vsctl[70373]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Jan 22 13:15:03 np0005592561.novalocal kernel: ovs-system: entered promiscuous mode Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.7002] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.7020] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Jan 22 13:15:03 np0005592561.novalocal kernel: No such timeout policy "ovs_test_tp" Jan 22 13:15:03 np0005592561.novalocal kernel: br-ex: entered promiscuous mode Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.7122] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Jan 22 13:15:03 np0005592561.novalocal systemd-udevd[70170]: Network interface NamePolicy= disabled on kernel command line. Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.7140] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.7516] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70394 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.7934] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70405 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.8575] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70423 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal ovs-vsctl[70443]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 -- add-port br-ex loop1 Jan 22 13:15:03 np0005592561.novalocal kernel: loop1: entered promiscuous mode Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.9291] device (loop1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.9306] device (loop1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.9537] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70450 uid=0 result="success" Jan 22 13:15:03 np0005592561.novalocal ifup[70451]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 22 13:15:03 np0005592561.novalocal ifup[70452]: 'network-scripts' will be removed from distribution in near future. Jan 22 13:15:03 np0005592561.novalocal ifup[70453]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 22 13:15:03 np0005592561.novalocal NetworkManager[856]: [1769105703.9901] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70459 uid=0 result="success" Jan 22 13:15:04 np0005592561.novalocal ovs-vsctl[70463]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Jan 22 13:15:04 np0005592561.novalocal NetworkManager[856]: [1769105704.0705] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70470 uid=0 result="success" Jan 22 13:15:04 np0005592561.novalocal ifup[70471]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 22 13:15:04 np0005592561.novalocal ifup[70472]: 'network-scripts' will be removed from distribution in near future. Jan 22 13:15:04 np0005592561.novalocal ifup[70473]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 22 13:15:04 np0005592561.novalocal NetworkManager[856]: [1769105704.1161] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70479 uid=0 result="success" Jan 22 13:15:04 np0005592561.novalocal ovs-vsctl[70483]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Jan 22 13:15:04 np0005592561.novalocal NetworkManager[856]: [1769105704.2221] device (br-ex): carrier: link connected Jan 22 13:15:06 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:15:06 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:15:06 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:15:06 np0005592561.novalocal systemd-rc-local-generator[70553]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:15:06 np0005592561.novalocal systemd-sysv-generator[70558]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:15:06 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:15:07 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:15:07 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:15:07 np0005592561.novalocal systemd[1]: run-rd708779b560940078fa31b15c91d7269.service: Deactivated successfully. Jan 22 13:15:10 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:15:10 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:15:10 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:15:10 np0005592561.novalocal systemd-rc-local-generator[70976]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:15:10 np0005592561.novalocal systemd-sysv-generator[70979]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:15:10 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:15:10 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:15:10 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:15:10 np0005592561.novalocal systemd[1]: run-r971f8eae043444e28e75de9eb516eea9.service: Deactivated successfully. Jan 22 13:15:11 np0005592561.novalocal ovs-vsctl[71053]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:[::1]:6642 Jan 22 13:15:11 np0005592561.novalocal ovs-vsctl[71055]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Jan 22 13:15:11 np0005592561.novalocal ovs-vsctl[71057]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=::1 Jan 22 13:15:11 np0005592561.novalocal ovs-vsctl[71060]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005592561.novalocal Jan 22 13:15:11 np0005592561.novalocal ovs-vsctl[71062]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Jan 22 13:15:12 np0005592561.novalocal ovs-vsctl[71064]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Jan 22 13:15:12 np0005592561.novalocal ovs-vsctl[71066]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=false Jan 22 13:15:12 np0005592561.novalocal ovs-vsctl[71068]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Jan 22 13:15:12 np0005592561.novalocal ovs-vsctl[71072]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-cms-options=enable-chassis-as-gw Jan 22 13:15:12 np0005592561.novalocal ovs-vsctl[71076]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=external:br-ex Jan 22 13:15:12 np0005592561.novalocal ovs-vsctl[71080]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Jan 22 13:15:24 np0005592561.novalocal groupadd[71101]: group added to /etc/group: name=keystone, GID=163 Jan 22 13:15:24 np0005592561.novalocal groupadd[71101]: group added to /etc/gshadow: name=keystone Jan 22 13:15:24 np0005592561.novalocal groupadd[71101]: new group: name=keystone, GID=163 Jan 22 13:15:24 np0005592561.novalocal useradd[71108]: new user: name=keystone, UID=163, GID=163, home=/var/lib/keystone, shell=/sbin/nologin, from=none Jan 22 13:15:24 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:15:24 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:15:25 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:15:25 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:15:25 np0005592561.novalocal systemd[1]: run-rd7dc8ad5706c4cbba6bab1d91fda6d42.service: Deactivated successfully. Jan 22 13:15:31 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:15:31 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:15:32 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:15:32 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:15:32 np0005592561.novalocal systemd[1]: run-r419161df82614faeb0e40d5d715a61a6.service: Deactivated successfully. Jan 22 13:15:39 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:15:39 np0005592561.novalocal systemd-sysv-generator[72088]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:15:39 np0005592561.novalocal systemd-rc-local-generator[72082]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:15:40 np0005592561.novalocal systemd[1]: Listening on Device-mapper event daemon FIFOs. Jan 22 13:15:40 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:15:40 np0005592561.novalocal systemd-sysv-generator[72120]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:15:40 np0005592561.novalocal systemd-rc-local-generator[72117]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:15:40 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:15:40 np0005592561.novalocal systemd-sysv-generator[72147]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:15:40 np0005592561.novalocal systemd-rc-local-generator[72143]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:15:41 np0005592561.novalocal systemd-logind[792]: Watching system buttons on /dev/input/event0 (Power Button) Jan 22 13:15:41 np0005592561.novalocal systemd-logind[792]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Jan 22 13:15:43 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:15:43 np0005592561.novalocal systemd-rc-local-generator[72243]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:15:43 np0005592561.novalocal systemd-sysv-generator[72247]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:15:43 np0005592561.novalocal systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Jan 22 13:15:43 np0005592561.novalocal systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Jan 22 13:15:44 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:15:44 np0005592561.novalocal systemd-rc-local-generator[72274]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:15:44 np0005592561.novalocal systemd-sysv-generator[72279]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:15:44 np0005592561.novalocal systemd[1]: Listening on LVM2 poll daemon socket. Jan 22 13:15:46 np0005592561.novalocal groupadd[72291]: group added to /etc/group: name=cinder, GID=165 Jan 22 13:15:46 np0005592561.novalocal groupadd[72291]: group added to /etc/gshadow: name=cinder Jan 22 13:15:46 np0005592561.novalocal groupadd[72291]: new group: name=cinder, GID=165 Jan 22 13:15:46 np0005592561.novalocal useradd[72298]: new user: name=cinder, UID=165, GID=165, home=/var/lib/cinder, shell=/sbin/nologin, from=none Jan 22 13:15:46 np0005592561.novalocal useradd[72298]: add 'cinder' to group 'nobody' Jan 22 13:15:46 np0005592561.novalocal useradd[72298]: add 'cinder' to group 'cinder' Jan 22 13:15:46 np0005592561.novalocal useradd[72298]: add 'cinder' to shadow group 'nobody' Jan 22 13:15:46 np0005592561.novalocal useradd[72298]: add 'cinder' to shadow group 'cinder' Jan 22 13:15:47 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:15:47 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:15:47 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:15:47 np0005592561.novalocal systemd-rc-local-generator[72348]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:15:47 np0005592561.novalocal systemd-sysv-generator[72351]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:15:47 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:15:50 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:15:50 np0005592561.novalocal systemd-sysv-generator[74374]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:15:50 np0005592561.novalocal systemd-rc-local-generator[74370]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:15:50 np0005592561.novalocal systemd[1]: One time configuration for iscsi.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/iscsi/initiatorname.iscsi). Jan 22 13:15:50 np0005592561.novalocal systemd[1]: Starting Open-iSCSI... Jan 22 13:15:50 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:15:50 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:15:50 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Consumed 3.494s CPU time. Jan 22 13:15:50 np0005592561.novalocal systemd[1]: run-ra394e59855084ea0af23d2c9c6ba55ee.service: Deactivated successfully. Jan 22 13:15:50 np0005592561.novalocal kernel: Loading iSCSI transport class v2.0-870. Jan 22 13:15:50 np0005592561.novalocal systemd[1]: Started Open-iSCSI. Jan 22 13:15:50 np0005592561.novalocal systemd[1]: Starting Logout off all iSCSI sessions on shutdown... Jan 22 13:15:50 np0005592561.novalocal systemd[1]: Finished Logout off all iSCSI sessions on shutdown. Jan 22 13:15:50 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:15:50 np0005592561.novalocal systemd-rc-local-generator[74410]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:15:50 np0005592561.novalocal systemd-sysv-generator[74413]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:15:50 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:15:50 np0005592561.novalocal systemd-rc-local-generator[74439]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:15:50 np0005592561.novalocal systemd-sysv-generator[74442]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:15:53 np0005592561.novalocal groupadd[74461]: group added to /etc/group: name=glance, GID=161 Jan 22 13:15:53 np0005592561.novalocal groupadd[74461]: group added to /etc/gshadow: name=glance Jan 22 13:15:53 np0005592561.novalocal groupadd[74461]: new group: name=glance, GID=161 Jan 22 13:15:53 np0005592561.novalocal useradd[74468]: new user: name=glance, UID=161, GID=161, home=/var/lib/glance, shell=/sbin/nologin, from=none Jan 22 13:15:53 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:15:53 np0005592561.novalocal systemd-rc-local-generator[74504]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:15:53 np0005592561.novalocal systemd-sysv-generator[74508]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:15:54 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:16:00 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:16:00 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:16:00 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:16:00 np0005592561.novalocal groupadd[74540]: group added to /etc/group: name=radvd, GID=75 Jan 22 13:16:00 np0005592561.novalocal groupadd[74540]: group added to /etc/gshadow: name=radvd Jan 22 13:16:00 np0005592561.novalocal groupadd[74540]: new group: name=radvd, GID=75 Jan 22 13:16:01 np0005592561.novalocal useradd[74549]: new user: name=radvd, UID=75, GID=75, home=/, shell=/sbin/nologin, from=none Jan 22 13:16:01 np0005592561.novalocal groupadd[74564]: group added to /etc/group: name=haproxy, GID=982 Jan 22 13:16:01 np0005592561.novalocal groupadd[74564]: group added to /etc/gshadow: name=haproxy Jan 22 13:16:01 np0005592561.novalocal groupadd[74564]: new group: name=haproxy, GID=982 Jan 22 13:16:01 np0005592561.novalocal useradd[74571]: new user: name=haproxy, UID=983, GID=982, home=/var/lib/haproxy, shell=/usr/sbin/nologin, from=none Jan 22 13:16:02 np0005592561.novalocal groupadd[74583]: group added to /etc/group: name=dnsmasq, GID=981 Jan 22 13:16:02 np0005592561.novalocal groupadd[74583]: group added to /etc/gshadow: name=dnsmasq Jan 22 13:16:02 np0005592561.novalocal groupadd[74583]: new group: name=dnsmasq, GID=981 Jan 22 13:16:02 np0005592561.novalocal useradd[74590]: new user: name=dnsmasq, UID=982, GID=981, home=/var/lib/dnsmasq, shell=/usr/sbin/nologin, from=none Jan 22 13:16:02 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:16:02 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:16:05 np0005592561.novalocal groupadd[74602]: group added to /etc/group: name=neutron, GID=980 Jan 22 13:16:05 np0005592561.novalocal groupadd[74602]: group added to /etc/gshadow: name=neutron Jan 22 13:16:05 np0005592561.novalocal groupadd[74602]: new group: name=neutron, GID=980 Jan 22 13:16:05 np0005592561.novalocal useradd[74609]: new user: name=neutron, UID=981, GID=980, home=/var/lib/neutron, shell=/sbin/nologin, from=none Jan 22 13:16:06 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:16:06 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:16:06 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:16:06 np0005592561.novalocal systemd-sysv-generator[74661]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:16:06 np0005592561.novalocal systemd-rc-local-generator[74658]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:16:06 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:16:07 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:16:07 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:16:07 np0005592561.novalocal systemd[1]: run-r04eb850d42604658aad62ab3b82d48c5.service: Deactivated successfully. Jan 22 13:16:09 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:16:09 np0005592561.novalocal systemd-rc-local-generator[75292]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:16:09 np0005592561.novalocal systemd-sysv-generator[75297]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:16:09 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:16:12 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:16:12 np0005592561.novalocal systemd-rc-local-generator[75332]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:16:12 np0005592561.novalocal systemd-sysv-generator[75338]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:16:12 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:16:16 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:16:16 np0005592561.novalocal systemd-rc-local-generator[75379]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:16:16 np0005592561.novalocal systemd-sysv-generator[75382]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:16:16 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:16:17 np0005592561.novalocal ovs-vsctl[75392]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set-manager ptcp:6640:127.0.0.1 Jan 22 13:16:20 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:16:20 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:16:20 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:16:20 np0005592561.novalocal systemd-rc-local-generator[75436]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:16:20 np0005592561.novalocal systemd-sysv-generator[75439]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:16:20 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:16:21 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:16:21 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:16:21 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.012s CPU time. Jan 22 13:16:21 np0005592561.novalocal systemd[1]: run-r95bf87fd4aee4402bfad2c38215bc990.service: Deactivated successfully. Jan 22 13:16:23 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:16:23 np0005592561.novalocal systemd-rc-local-generator[75861]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:16:23 np0005592561.novalocal systemd-sysv-generator[75864]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:16:23 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:16:25 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:16:26 np0005592561.novalocal systemd-rc-local-generator[75898]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:16:26 np0005592561.novalocal systemd-sysv-generator[75903]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:16:26 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:16:33 np0005592561.novalocal groupadd[75927]: group added to /etc/group: name=placement, GID=979 Jan 22 13:16:33 np0005592561.novalocal groupadd[75927]: group added to /etc/gshadow: name=placement Jan 22 13:16:33 np0005592561.novalocal groupadd[75927]: new group: name=placement, GID=979 Jan 22 13:16:33 np0005592561.novalocal useradd[75934]: new user: name=placement, UID=980, GID=979, home=/, shell=/bin/bash, from=none Jan 22 13:16:39 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:16:39 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:16:40 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:16:40 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:16:40 np0005592561.novalocal systemd[1]: run-rac68ad751e0041fa93aca1057304c9d9.service: Deactivated successfully. Jan 22 13:16:41 np0005592561.novalocal groupadd[76105]: group added to /etc/group: name=nova, GID=162 Jan 22 13:16:41 np0005592561.novalocal groupadd[76105]: group added to /etc/gshadow: name=nova Jan 22 13:16:41 np0005592561.novalocal groupadd[76105]: new group: name=nova, GID=162 Jan 22 13:16:41 np0005592561.novalocal useradd[76112]: new user: name=nova, UID=162, GID=162, home=/var/lib/nova, shell=/sbin/nologin, from=none Jan 22 13:16:41 np0005592561.novalocal useradd[76112]: add 'nova' to group 'nobody' Jan 22 13:16:41 np0005592561.novalocal useradd[76112]: add 'nova' to group 'nova' Jan 22 13:16:41 np0005592561.novalocal useradd[76112]: add 'nova' to shadow group 'nobody' Jan 22 13:16:41 np0005592561.novalocal useradd[76112]: add 'nova' to shadow group 'nova' Jan 22 13:17:00 np0005592561.novalocal kernel: SELinux: Converting 2777 SID table entries... Jan 22 13:17:00 np0005592561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 13:17:00 np0005592561.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 13:17:00 np0005592561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 13:17:00 np0005592561.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 13:17:00 np0005592561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 13:17:00 np0005592561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 13:17:00 np0005592561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 13:17:09 np0005592561.novalocal kernel: SELinux: Converting 2777 SID table entries... Jan 22 13:17:09 np0005592561.novalocal dbus-broker-launch[769]: avc: op=load_policy lsm=selinux seqno=11 res=1 Jan 22 13:17:09 np0005592561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 13:17:09 np0005592561.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 13:17:09 np0005592561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 13:17:09 np0005592561.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 13:17:09 np0005592561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 13:17:09 np0005592561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 13:17:09 np0005592561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 13:17:09 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:17:09 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:17:09 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:17:18 np0005592561.novalocal kernel: SELinux: Converting 2777 SID table entries... Jan 22 13:17:18 np0005592561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 13:17:18 np0005592561.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 13:17:18 np0005592561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 13:17:18 np0005592561.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 13:17:18 np0005592561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 13:17:18 np0005592561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 13:17:18 np0005592561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 13:17:29 np0005592561.novalocal kernel: SELinux: Converting 2781 SID table entries... Jan 22 13:17:29 np0005592561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 13:17:29 np0005592561.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 13:17:29 np0005592561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 13:17:29 np0005592561.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 13:17:29 np0005592561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 13:17:29 np0005592561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 13:17:29 np0005592561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 13:17:29 np0005592561.novalocal groupadd[76261]: group added to /etc/group: name=qemu, GID=107 Jan 22 13:17:29 np0005592561.novalocal groupadd[76261]: group added to /etc/gshadow: name=qemu Jan 22 13:17:29 np0005592561.novalocal groupadd[76261]: new group: name=qemu, GID=107 Jan 22 13:17:29 np0005592561.novalocal useradd[76268]: new user: name=qemu, UID=107, GID=107, home=/, shell=/sbin/nologin, from=none Jan 22 13:17:29 np0005592561.novalocal useradd[76268]: add 'qemu' to group 'kvm' Jan 22 13:17:29 np0005592561.novalocal useradd[76268]: add 'qemu' to shadow group 'kvm' Jan 22 13:17:29 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:17:29 np0005592561.novalocal dbus-broker-launch[769]: avc: op=load_policy lsm=selinux seqno=14 res=1 Jan 22 13:17:29 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:17:29 np0005592561.novalocal dbus-broker-launch[764]: Noticed file-system modification, trigger reload. Jan 22 13:17:30 np0005592561.novalocal groupadd[76306]: group added to /etc/group: name=libvirt, GID=978 Jan 22 13:17:30 np0005592561.novalocal groupadd[76306]: group added to /etc/gshadow: name=libvirt Jan 22 13:17:30 np0005592561.novalocal groupadd[76306]: new group: name=libvirt, GID=978 Jan 22 13:17:30 np0005592561.novalocal polkitd[9369]: Reloading rules Jan 22 13:17:30 np0005592561.novalocal polkitd[9369]: Collecting garbage unconditionally... Jan 22 13:17:30 np0005592561.novalocal polkitd[9369]: Loading rules from directory /etc/polkit-1/rules.d Jan 22 13:17:30 np0005592561.novalocal polkitd[9369]: Loading rules from directory /usr/share/polkit-1/rules.d Jan 22 13:17:30 np0005592561.novalocal polkitd[9369]: Finished loading, compiling and executing 5 rules Jan 22 13:17:30 np0005592561.novalocal polkitd[9369]: Reloading rules Jan 22 13:17:30 np0005592561.novalocal polkitd[9369]: Collecting garbage unconditionally... Jan 22 13:17:30 np0005592561.novalocal polkitd[9369]: Loading rules from directory /etc/polkit-1/rules.d Jan 22 13:17:30 np0005592561.novalocal polkitd[9369]: Loading rules from directory /usr/share/polkit-1/rules.d Jan 22 13:17:30 np0005592561.novalocal polkitd[9369]: Finished loading, compiling and executing 5 rules Jan 22 13:17:34 np0005592561.novalocal systemd[1]: Starting Cleanup of Temporary Directories... Jan 22 13:17:34 np0005592561.novalocal systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Jan 22 13:17:34 np0005592561.novalocal systemd[1]: Finished Cleanup of Temporary Directories. Jan 22 13:17:34 np0005592561.novalocal systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Jan 22 13:17:35 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:17:35 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:17:35 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:17:35 np0005592561.novalocal systemd-sysv-generator[77021]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:17:35 np0005592561.novalocal systemd-rc-local-generator[77018]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:17:35 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:17:39 np0005592561.novalocal groupadd[79829]: group added to /etc/group: name=octavia, GID=977 Jan 22 13:17:39 np0005592561.novalocal groupadd[79829]: group added to /etc/gshadow: name=octavia Jan 22 13:17:39 np0005592561.novalocal groupadd[79829]: new group: name=octavia, GID=977 Jan 22 13:17:39 np0005592561.novalocal useradd[79879]: new user: name=octavia, UID=979, GID=977, home=/var/lib/octavia, shell=/sbin/nologin, from=none Jan 22 13:17:40 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:17:40 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:17:40 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.572s CPU time. Jan 22 13:17:40 np0005592561.novalocal systemd[1]: run-r5c3e601badbb44a58353291a02c6f52c.service: Deactivated successfully. Jan 22 13:17:44 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:17:44 np0005592561.novalocal systemd-rc-local-generator[80631]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:17:44 np0005592561.novalocal systemd-sysv-generator[80635]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:17:45 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:17:49 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:17:49 np0005592561.novalocal systemd-rc-local-generator[80683]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:17:49 np0005592561.novalocal systemd-sysv-generator[80686]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:17:50 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:17:52 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:17:52 np0005592561.novalocal systemd-rc-local-generator[80719]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:17:52 np0005592561.novalocal systemd-sysv-generator[80722]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:17:52 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:17:54 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:17:55 np0005592561.novalocal systemd-sysv-generator[80766]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:17:55 np0005592561.novalocal systemd-rc-local-generator[80763]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:17:55 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:17:57 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:17:57 np0005592561.novalocal systemd-sysv-generator[80805]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:17:57 np0005592561.novalocal systemd-rc-local-generator[80800]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:17:57 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:18:08 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:18:08 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:18:08 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:18:08 np0005592561.novalocal groupadd[80835]: group added to /etc/group: name=apache, GID=48 Jan 22 13:18:08 np0005592561.novalocal groupadd[80835]: group added to /etc/gshadow: name=apache Jan 22 13:18:08 np0005592561.novalocal groupadd[80835]: new group: name=apache, GID=48 Jan 22 13:18:08 np0005592561.novalocal useradd[80844]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Jan 22 13:18:12 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:18:12 np0005592561.novalocal systemd-rc-local-generator[80875]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:18:12 np0005592561.novalocal systemd-sysv-generator[80881]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:18:13 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:18:13 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:18:13 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:18:13 np0005592561.novalocal systemd-rc-local-generator[80924]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:18:13 np0005592561.novalocal systemd-sysv-generator[80927]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:18:13 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:18:15 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:18:15 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:18:15 np0005592561.novalocal systemd[1]: run-r2729cf31f4f6401792c6f18b0f66d4f7.service: Deactivated successfully. Jan 22 13:18:21 np0005592561.novalocal groupadd[81286]: group added to /etc/group: name=manila, GID=976 Jan 22 13:18:21 np0005592561.novalocal groupadd[81286]: group added to /etc/gshadow: name=manila Jan 22 13:18:21 np0005592561.novalocal groupadd[81286]: new group: name=manila, GID=976 Jan 22 13:18:21 np0005592561.novalocal useradd[81293]: new user: name=manila, UID=978, GID=976, home=/var/lib/manila, shell=/sbin/nologin, from=none Jan 22 13:18:21 np0005592561.novalocal useradd[81293]: add 'manila' to group 'nobody' Jan 22 13:18:21 np0005592561.novalocal useradd[81293]: add 'manila' to group 'manila' Jan 22 13:18:21 np0005592561.novalocal useradd[81293]: add 'manila' to shadow group 'nobody' Jan 22 13:18:21 np0005592561.novalocal useradd[81293]: add 'manila' to shadow group 'manila' Jan 22 13:18:23 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:18:23 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:18:23 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:18:23 np0005592561.novalocal systemd-sysv-generator[81335]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:18:23 np0005592561.novalocal systemd-rc-local-generator[81332]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:18:23 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:18:23 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:18:23 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:18:23 np0005592561.novalocal systemd[1]: run-r8057ad9ff6bb4830adcf984eacbfa2ca.service: Deactivated successfully. Jan 22 13:18:26 np0005592561.novalocal groupadd[81513]: group added to /etc/group: name=printadmin, GID=975 Jan 22 13:18:26 np0005592561.novalocal groupadd[81513]: group added to /etc/gshadow: name=printadmin Jan 22 13:18:26 np0005592561.novalocal groupadd[81513]: new group: name=printadmin, GID=975 Jan 22 13:18:28 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:18:28 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:18:28 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:18:28 np0005592561.novalocal systemd-sysv-generator[81567]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:18:28 np0005592561.novalocal systemd-rc-local-generator[81563]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:18:28 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:18:29 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:18:29 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:18:29 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.169s CPU time. Jan 22 13:18:29 np0005592561.novalocal systemd[1]: run-reffc94caa3eb457dbb07ec32eacd5adf.service: Deactivated successfully. Jan 22 13:18:30 np0005592561.novalocal kernel: loop: module loaded Jan 22 13:18:30 np0005592561.novalocal kernel: loop3: detected capacity change from 0 to 31457280 Jan 22 13:18:30 np0005592561.novalocal lvm[82139]: PV /dev/loop3 not used. Jan 22 13:18:30 np0005592561.novalocal lvm[82142]: PV /dev/loop3 online, VG lvm-shares is complete. Jan 22 13:18:31 np0005592561.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event lvm-shares. Jan 22 13:18:31 np0005592561.novalocal lvm[82144]: 0 logical volume(s) in volume group "lvm-shares" now active Jan 22 13:18:31 np0005592561.novalocal systemd[1]: lvm-activate-lvm-shares.service: Deactivated successfully. Jan 22 13:18:47 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:18:47 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:18:48 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:18:48 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:18:48 np0005592561.novalocal systemd[1]: run-r5b78730f51e84c4e9db4c34009eed18e.service: Deactivated successfully. Jan 22 13:18:56 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:18:56 np0005592561.novalocal systemd-rc-local-generator[82445]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:18:56 np0005592561.novalocal systemd-sysv-generator[82448]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:18:56 np0005592561.novalocal systemd[1]: Starting MariaDB 10.5 database server... Jan 22 13:18:56 np0005592561.novalocal mariadb-prepare-db-dir[82476]: Database MariaDB is probably initialized in /var/lib/mysql already, nothing is done. Jan 22 13:18:56 np0005592561.novalocal mariadb-prepare-db-dir[82476]: If this is not the case, make sure the /var/lib/mysql is empty before running mariadb-prepare-db-dir. Jan 22 13:18:56 np0005592561.novalocal systemd[1]: Started MariaDB 10.5 database server. Jan 22 13:18:57 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:18:57 np0005592561.novalocal systemd-rc-local-generator[82583]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:18:57 np0005592561.novalocal systemd-sysv-generator[82587]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:18:57 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:18:57 np0005592561.novalocal systemd-sysv-generator[82619]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:18:57 np0005592561.novalocal systemd-rc-local-generator[82616]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:18:57 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:18:58 np0005592561.novalocal systemd-rc-local-generator[82646]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:18:58 np0005592561.novalocal systemd-sysv-generator[82651]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:18:58 np0005592561.novalocal systemd[1]: Starting Redis persistent key-value database... Jan 22 13:18:58 np0005592561.novalocal systemd[1]: Started Redis persistent key-value database. Jan 22 13:18:58 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:18:58 np0005592561.novalocal systemd-rc-local-generator[82681]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:18:58 np0005592561.novalocal systemd-sysv-generator[82686]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:18:58 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:18:58 np0005592561.novalocal systemd-rc-local-generator[82714]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:18:58 np0005592561.novalocal systemd-sysv-generator[82718]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:18:59 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:18:59 np0005592561.novalocal systemd-rc-local-generator[82742]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:18:59 np0005592561.novalocal systemd-sysv-generator[82747]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:18:59 np0005592561.novalocal systemd[1]: Starting Redis Sentinel... Jan 22 13:18:59 np0005592561.novalocal systemd[1]: Started Redis Sentinel. Jan 22 13:18:59 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:18:59 np0005592561.novalocal systemd-rc-local-generator[82781]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:18:59 np0005592561.novalocal systemd-sysv-generator[82784]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:19:00 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:19:00 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:19:00 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:19:00 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:19:00 np0005592561.novalocal systemd-rc-local-generator[82810]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:19:00 np0005592561.novalocal systemd-sysv-generator[82813]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:19:00 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:19:01 np0005592561.novalocal systemd-rc-local-generator[82890]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:19:01 np0005592561.novalocal systemd-sysv-generator[82894]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:19:01 np0005592561.novalocal systemd[1]: Starting OVN northd management daemon... Jan 22 13:19:01 np0005592561.novalocal chown[82900]: /usr/bin/chown: cannot access '/var/lib/ovn': No such file or directory Jan 22 13:19:01 np0005592561.novalocal ovn-ctl[82901]: /var/lib/ovn/ovnnb_db.db does not exist ... (warning). Jan 22 13:19:02 np0005592561.novalocal ovn-ctl[82901]: Creating empty database /var/lib/ovn/ovnnb_db.db [ OK ] Jan 22 13:19:02 np0005592561.novalocal ovsdb-server[83003]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Jan 22 13:19:02 np0005592561.novalocal ovsdb-server[83005]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.4.4-99.el9s Jan 22 13:19:02 np0005592561.novalocal ovsdb-server[83004]: ovs|00002|vlog(monitor)|INFO|closing log file Jan 22 13:19:02 np0005592561.novalocal ovsdb-server[83004]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Jan 22 13:19:02 np0005592561.novalocal ovn-ctl[82901]: Starting ovsdb-nb [ OK ] Jan 22 13:19:02 np0005592561.novalocal ovn-nbctl[83009]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl --no-leader-only --db=unix:/run/ovn/ovnnb_db.sock init Jan 22 13:19:02 np0005592561.novalocal ovn-ctl[82901]: /var/lib/ovn/ovnsb_db.db does not exist ... (warning). Jan 22 13:19:02 np0005592561.novalocal ovn-ctl[82901]: Creating empty database /var/lib/ovn/ovnsb_db.db [ OK ] Jan 22 13:19:02 np0005592561.novalocal ovsdb-server[83029]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Jan 22 13:19:02 np0005592561.novalocal ovsdb-server[83031]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.4.4-99.el9s Jan 22 13:19:02 np0005592561.novalocal ovsdb-server[83030]: ovs|00002|vlog(monitor)|INFO|closing log file Jan 22 13:19:02 np0005592561.novalocal ovsdb-server[83030]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Jan 22 13:19:02 np0005592561.novalocal ovn-ctl[82901]: Starting ovsdb-sb [ OK ] Jan 22 13:19:02 np0005592561.novalocal ovn-sbctl[83035]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl --no-leader-only --db=unix:/run/ovn/ovnsb_db.sock init Jan 22 13:19:02 np0005592561.novalocal ovn-ctl[82901]: Starting ovn-northd [ OK ] Jan 22 13:19:02 np0005592561.novalocal systemd[1]: Finished OVN northd management daemon. Jan 22 13:19:02 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:19:02 np0005592561.novalocal systemd-sysv-generator[83078]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:19:02 np0005592561.novalocal systemd-rc-local-generator[83074]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:19:02 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:19:02 np0005592561.novalocal systemd-rc-local-generator[83099]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:19:02 np0005592561.novalocal systemd-sysv-generator[83102]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:19:03 np0005592561.novalocal ovn-nbctl[83114]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set-connection pssl:6641:[::1] Jan 22 13:19:03 np0005592561.novalocal ovn-sbctl[83118]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set-connection pssl:6642:[::1] Jan 22 13:19:03 np0005592561.novalocal sudo[83120]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get connection . inactivity_probe Jan 22 13:19:03 np0005592561.novalocal sudo[83120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:19:03 np0005592561.novalocal sudo[83120]: pam_unix(sudo:session): session closed for user root Jan 22 13:19:03 np0005592561.novalocal ovn-nbctl[83123]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set connection . inactivity_probe=0 Jan 22 13:19:03 np0005592561.novalocal sudo[83125]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get connection . inactivity_probe Jan 22 13:19:03 np0005592561.novalocal sudo[83125]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:19:03 np0005592561.novalocal sudo[83125]: pam_unix(sudo:session): session closed for user root Jan 22 13:19:03 np0005592561.novalocal ovn-sbctl[83128]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set connection . inactivity_probe=0 Jan 22 13:19:03 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:19:03 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:19:04 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:19:04 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:19:04 np0005592561.novalocal systemd-rc-local-generator[83179]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:19:04 np0005592561.novalocal systemd-sysv-generator[83182]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:19:04 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:19:04 np0005592561.novalocal systemd[1]: Starting OVN controller daemon... Jan 22 13:19:04 np0005592561.novalocal ovn-ctl[83186]: Starting ovn-controller [ OK ] Jan 22 13:19:04 np0005592561.novalocal systemd[1]: Started OVN controller daemon. Jan 22 13:19:04 np0005592561.novalocal kernel: br-int: entered promiscuous mode Jan 22 13:19:04 np0005592561.novalocal NetworkManager[856]: [1769105944.5136] manager: (br-int): 'openvswitch' plugin not available; creating generic device Jan 22 13:19:04 np0005592561.novalocal NetworkManager[856]: [1769105944.5162] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Jan 22 13:19:04 np0005592561.novalocal systemd-udevd[83242]: Network interface NamePolicy= disabled on kernel command line. Jan 22 13:19:04 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:19:04 np0005592561.novalocal systemd-sysv-generator[83269]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:19:04 np0005592561.novalocal systemd-rc-local-generator[83265]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:19:04 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:19:04 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:19:05 np0005592561.novalocal systemd-rc-local-generator[83294]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:19:05 np0005592561.novalocal systemd-sysv-generator[83298]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:19:05 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:19:06 np0005592561.novalocal kernel: SELinux: Converting 2805 SID table entries... Jan 22 13:19:06 np0005592561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 13:19:06 np0005592561.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 13:19:06 np0005592561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 13:19:06 np0005592561.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 13:19:06 np0005592561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 13:19:06 np0005592561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 13:19:06 np0005592561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 13:19:06 np0005592561.novalocal setsebool[83305]: The os_neutron_dac_override policy boolean was changed to on by root Jan 22 13:19:09 np0005592561.novalocal kernel: loop2: detected capacity change from 0 to 31457280 Jan 22 13:19:09 np0005592561.novalocal dbus-broker-launch[769]: avc: op=load_policy lsm=selinux seqno=16 res=1 Jan 22 13:19:10 np0005592561.novalocal lvm[83325]: PV /dev/loop2 not used. Jan 22 13:19:10 np0005592561.novalocal lvm[83328]: PV /dev/loop2 online, VG cinder-volumes is complete. Jan 22 13:19:10 np0005592561.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Jan 22 13:19:10 np0005592561.novalocal lvm[83330]: 0 logical volume(s) in volume group "cinder-volumes" now active Jan 22 13:19:10 np0005592561.novalocal systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Jan 22 13:19:12 np0005592561.novalocal ovsdb-server[83005]: ovs|00003|memory|INFO|10536 kB peak resident set size after 10.0 seconds Jan 22 13:19:12 np0005592561.novalocal ovsdb-server[83005]: ovs|00004|memory|INFO|atoms:44 cells:43 json-caches:1 monitors:2 n-weak-refs:0 sessions:1 Jan 22 13:19:12 np0005592561.novalocal ovsdb-server[83031]: ovs|00003|memory|INFO|11228 kB peak resident set size after 10.0 seconds Jan 22 13:19:12 np0005592561.novalocal ovsdb-server[83031]: ovs|00004|memory|INFO|atoms:451 cells:355 json-caches:1 monitors:3 n-weak-refs:11 sessions:2 Jan 22 13:19:21 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:19:21 np0005592561.novalocal systemd-rc-local-generator[83369]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:19:21 np0005592561.novalocal systemd-sysv-generator[83372]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:19:21 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:19:21 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:19:24 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:19:24 np0005592561.novalocal systemd-rc-local-generator[83405]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:19:24 np0005592561.novalocal systemd-sysv-generator[83412]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:19:24 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:19:24 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:19:29 np0005592561.novalocal groupadd[83478]: group added to /etc/group: name=clevis, GID=974 Jan 22 13:19:29 np0005592561.novalocal groupadd[83478]: group added to /etc/gshadow: name=clevis Jan 22 13:19:29 np0005592561.novalocal groupadd[83478]: new group: name=clevis, GID=974 Jan 22 13:19:29 np0005592561.novalocal useradd[83485]: new user: name=clevis, UID=977, GID=974, home=/var/cache/clevis, shell=/usr/sbin/nologin, from=none Jan 22 13:19:29 np0005592561.novalocal usermod[83495]: add 'clevis' to group 'tss' Jan 22 13:19:29 np0005592561.novalocal usermod[83495]: add 'clevis' to shadow group 'tss' Jan 22 13:19:30 np0005592561.novalocal usermod[83511]: add 'nova' to group 'qemu' Jan 22 13:19:30 np0005592561.novalocal usermod[83511]: add 'nova' to shadow group 'qemu' Jan 22 13:19:30 np0005592561.novalocal usermod[83518]: add 'nova' to group 'libvirt' Jan 22 13:19:30 np0005592561.novalocal usermod[83518]: add 'nova' to shadow group 'libvirt' Jan 22 13:19:31 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:19:31 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:19:31 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:19:31 np0005592561.novalocal systemd-rc-local-generator[83598]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:19:31 np0005592561.novalocal systemd-sysv-generator[83601]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:19:31 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:19:31 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:19:34 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:19:34 np0005592561.novalocal systemd-rc-local-generator[85883]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:19:34 np0005592561.novalocal systemd-sysv-generator[85888]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:19:34 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:19:34 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:19:36 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:19:36 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:19:36 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.662s CPU time. Jan 22 13:19:36 np0005592561.novalocal systemd[1]: run-r45b87bc1993b4c6dbabb00fec115456c.service: Deactivated successfully. Jan 22 13:19:37 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:19:37 np0005592561.novalocal systemd-sysv-generator[87504]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:19:37 np0005592561.novalocal systemd-rc-local-generator[87500]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:19:37 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:19:37 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:19:40 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:19:40 np0005592561.novalocal systemd-rc-local-generator[87530]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:19:40 np0005592561.novalocal systemd-sysv-generator[87533]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:19:40 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:20:00 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:20:00 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:20:00 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:20:03 np0005592561.novalocal crontab[87592]: (root) LIST (root) Jan 22 13:20:03 np0005592561.novalocal crontab[87593]: (root) LIST (keystone) Jan 22 13:20:03 np0005592561.novalocal crontab[87594]: (root) LIST (cinder) Jan 22 13:20:03 np0005592561.novalocal crontab[87595]: (root) LIST (glance) Jan 22 13:20:03 np0005592561.novalocal crontab[87596]: (root) LIST (nova) Jan 22 13:20:03 np0005592561.novalocal crontab[87597]: (root) LIST (manila) Jan 22 13:20:03 np0005592561.novalocal crontab[87598]: (root) REPLACE (cinder) Jan 22 13:20:03 np0005592561.novalocal crontab[87599]: (root) REPLACE (glance) Jan 22 13:20:03 np0005592561.novalocal crontab[87600]: (root) REPLACE (glance) Jan 22 13:20:09 np0005592561.novalocal crontab[87614]: (root) REPLACE (glance) Jan 22 13:20:09 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:20:09 np0005592561.novalocal systemd-sysv-generator[87638]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:20:09 np0005592561.novalocal systemd-rc-local-generator[87633]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:20:09 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:20:43 np0005592561.novalocal crontab[87707]: (root) REPLACE (nova) Jan 22 13:20:51 np0005592561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 13:20:51 np0005592561.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 13:20:51 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:20:51 np0005592561.novalocal systemd-sysv-generator[87758]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:20:51 np0005592561.novalocal systemd-rc-local-generator[87755]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:20:51 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:20:51 np0005592561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 13:20:51 np0005592561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 13:20:51 np0005592561.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 13:20:51 np0005592561.novalocal systemd[1]: run-r680f302c73b4401ebe433e93c5e4d462.service: Deactivated successfully. Jan 22 13:21:00 np0005592561.novalocal crontab[87852]: (root) REPLACE (manila) Jan 22 13:21:00 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:21:00 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:00 np0005592561.novalocal systemd-rc-local-generator[87871]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:00 np0005592561.novalocal systemd-sysv-generator[87877]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:00 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:01 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:21:01 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:21:01 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:01 np0005592561.novalocal systemd-rc-local-generator[87904]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:01 np0005592561.novalocal systemd-sysv-generator[87910]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:01 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:01 np0005592561.novalocal systemd[87917]: epmd.socket: Failed to create listening socket ([::]:4369): Address already in use Jan 22 13:21:01 np0005592561.novalocal systemd[1]: epmd.socket: Failed to receive listening socket ([::]:4369): Input/output error Jan 22 13:21:01 np0005592561.novalocal systemd[1]: epmd.socket: Failed to listen on sockets: Input/output error Jan 22 13:21:01 np0005592561.novalocal systemd[1]: epmd.socket: Failed with result 'resources'. Jan 22 13:21:01 np0005592561.novalocal systemd[1]: Failed to listen on Erlang Port Mapper Daemon Activation Socket. Jan 22 13:21:01 np0005592561.novalocal systemd[1]: Starting RabbitMQ broker... Jan 22 13:21:02 np0005592561.novalocal rabbitmq-server[87918]: 2026-01-22 13:21:02.299418-05:00 [warning] <0.129.0> Both old (.config) and new (.conf) format config files exist. Jan 22 13:21:02 np0005592561.novalocal rabbitmq-server[87918]: 2026-01-22 13:21:02.313313-05:00 [warning] <0.129.0> Using the old format config file: /etc/rabbitmq/rabbitmq.config Jan 22 13:21:02 np0005592561.novalocal rabbitmq-server[87918]: 2026-01-22 13:21:02.313349-05:00 [warning] <0.129.0> Please update your config files to the new format and remove the old file. Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: 2026-01-22 13:21:04.003116-05:00 [info] <0.229.0> Feature flags: list of feature flags found: Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: 2026-01-22 13:21:04.003189-05:00 [info] <0.229.0> Feature flags: [ ] implicit_default_bindings Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: 2026-01-22 13:21:04.003211-05:00 [info] <0.229.0> Feature flags: [ ] maintenance_mode_status Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: 2026-01-22 13:21:04.003242-05:00 [info] <0.229.0> Feature flags: [ ] quorum_queue Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: 2026-01-22 13:21:04.003302-05:00 [info] <0.229.0> Feature flags: [ ] stream_queue Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: 2026-01-22 13:21:04.003320-05:00 [info] <0.229.0> Feature flags: [ ] user_limits Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: 2026-01-22 13:21:04.003338-05:00 [info] <0.229.0> Feature flags: [ ] virtual_host_metadata Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: 2026-01-22 13:21:04.003381-05:00 [info] <0.229.0> Feature flags: feature flag states written to disk: yes Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: 2026-01-22 13:21:04.253361-05:00 [notice] <0.44.0> Application syslog exited with reason: stopped Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: 2026-01-22 13:21:04.253473-05:00 [notice] <0.229.0> Logging: switching to configured handler(s); following messages may not be visible in this log output Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: ## ## RabbitMQ 3.9.21 Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: ## ## Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: ########## Copyright (c) 2007-2022 VMware, Inc. or its affiliates. Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: ###### ## Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: ########## Licensed under the MPL 2.0. Website: https://rabbitmq.com Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: Erlang: 24.3.4.2 [jit] Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: TLS Library: OpenSSL - OpenSSL 3.5.1 1 Jul 2025 Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: Doc guides: https://rabbitmq.com/documentation.html Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: Support: https://rabbitmq.com/contact.html Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: Tutorials: https://rabbitmq.com/getstarted.html Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: Monitoring: https://rabbitmq.com/monitoring.html Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: Logs: /var/log/rabbitmq/rabbit@localhost6.log Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: /var/log/rabbitmq/rabbit@localhost6_upgrade.log Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: Jan 22 13:21:04 np0005592561.novalocal rabbitmq-server[87918]: Config file(s): /etc/rabbitmq/rabbitmq.config Jan 22 13:21:07 np0005592561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 13:21:07 np0005592561.novalocal rabbitmq-server[87918]: Starting broker... completed with 3 plugins. Jan 22 13:21:07 np0005592561.novalocal systemd[1]: Started RabbitMQ broker. Jan 22 13:21:07 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:07 np0005592561.novalocal systemd-rc-local-generator[88024]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:07 np0005592561.novalocal systemd-sysv-generator[88027]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:07 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:07 np0005592561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 13:21:07 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:07 np0005592561.novalocal systemd-rc-local-generator[88052]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:07 np0005592561.novalocal systemd-sysv-generator[88055]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:07 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:07 np0005592561.novalocal setroubleshoot[88001]: failed to retrieve rpm info for path '/proc/net/if_inet6': Jan 22 13:21:08 np0005592561.novalocal systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Jan 22 13:21:08 np0005592561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Jan 22 13:21:08 np0005592561.novalocal runuser[88071]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:08 np0005592561.novalocal runuser[88071]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:08 np0005592561.novalocal runuser[88127]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:09 np0005592561.novalocal setroubleshoot[88001]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. For complete SELinux messages run: sealert -l b80808fa-7528-40b3-bee6-79a45d141de4 Jan 22 13:21:09 np0005592561.novalocal setroubleshoot[88001]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that inet_gethost should be allowed read access on the if_inet6 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'inet_gethost' --raw | audit2allow -M my-inetgethost # semodule -X 300 -i my-inetgethost.pp Jan 22 13:21:09 np0005592561.novalocal runuser[88127]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:09 np0005592561.novalocal runuser[88180]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:10 np0005592561.novalocal runuser[88180]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:10 np0005592561.novalocal runuser[88234]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:11 np0005592561.novalocal runuser[88234]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:11 np0005592561.novalocal runuser[88288]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:11 np0005592561.novalocal runuser[88288]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:11 np0005592561.novalocal runuser[88340]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:12 np0005592561.novalocal runuser[88340]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:12 np0005592561.novalocal runuser[88392]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:13 np0005592561.novalocal runuser[88392]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:13 np0005592561.novalocal runuser[88444]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:13 np0005592561.novalocal runuser[88444]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:14 np0005592561.novalocal runuser[88496]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:14 np0005592561.novalocal runuser[88496]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:14 np0005592561.novalocal runuser[88550]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:15 np0005592561.novalocal runuser[88550]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:15 np0005592561.novalocal runuser[88602]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:16 np0005592561.novalocal runuser[88602]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:16 np0005592561.novalocal runuser[88654]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:16 np0005592561.novalocal runuser[88654]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:16 np0005592561.novalocal runuser[88708]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:17 np0005592561.novalocal runuser[88708]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:17 np0005592561.novalocal runuser[88760]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:18 np0005592561.novalocal runuser[88760]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:18 np0005592561.novalocal runuser[88812]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:18 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Jan 22 13:21:18 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.212s CPU time. Jan 22 13:21:18 np0005592561.novalocal runuser[88812]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:19 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:19 np0005592561.novalocal systemd-rc-local-generator[88891]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:19 np0005592561.novalocal systemd-sysv-generator[88894]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:19 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:19 np0005592561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 13:21:19 np0005592561.novalocal systemd[1]: Started OpenStack Cinder Scheduler Server. Jan 22 13:21:19 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:20 np0005592561.novalocal systemd-sysv-generator[88927]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:20 np0005592561.novalocal systemd-rc-local-generator[88923]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:20 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:20 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:20 np0005592561.novalocal systemd-rc-local-generator[88954]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:20 np0005592561.novalocal systemd-sysv-generator[88958]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:20 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:20 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:21 np0005592561.novalocal systemd-sysv-generator[88990]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:21 np0005592561.novalocal systemd-rc-local-generator[88985]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:21 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:21 np0005592561.novalocal systemd[1]: Started OpenStack Cinder Volume Server. Jan 22 13:21:21 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:21 np0005592561.novalocal systemd-sysv-generator[89020]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:21 np0005592561.novalocal systemd-rc-local-generator[89017]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:21 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:21 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:21 np0005592561.novalocal systemd-rc-local-generator[89052]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:21 np0005592561.novalocal systemd-sysv-generator[89055]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:22 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:22 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:22 np0005592561.novalocal systemd-sysv-generator[89089]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:22 np0005592561.novalocal systemd-rc-local-generator[89085]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:22 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:22 np0005592561.novalocal systemd[1]: Started OpenStack Cinder Backup Server. Jan 22 13:21:23 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:23 np0005592561.novalocal systemd-rc-local-generator[89119]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:23 np0005592561.novalocal systemd-sysv-generator[89127]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:23 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:23 np0005592561.novalocal sudo[89113]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings -o name cinder-volumes Jan 22 13:21:23 np0005592561.novalocal systemd[1]: Created slice User Slice of UID 0. Jan 22 13:21:23 np0005592561.novalocal systemd[1]: Starting User Runtime Directory /run/user/0... Jan 22 13:21:23 np0005592561.novalocal systemd[1]: Finished User Runtime Directory /run/user/0. Jan 22 13:21:23 np0005592561.novalocal systemd[1]: Starting User Manager for UID 0... Jan 22 13:21:23 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:23 np0005592561.novalocal systemd-rc-local-generator[89159]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:23 np0005592561.novalocal systemd-sysv-generator[89163]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:23 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:23 np0005592561.novalocal systemd[89136]: pam_unix(systemd-user:session): session opened for user root(uid=0) by root(uid=0) Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: Queued start job for default target Main User Target. Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: Created slice User Application Slice. Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: Started Daily Cleanup of User's Temporary Directories. Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: Reached target Paths. Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: Reached target Timers. Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: Starting D-Bus User Message Bus Socket... Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: PipeWire PulseAudio was skipped because of an unmet condition check (ConditionUser=!root). Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: PipeWire Multimedia System Sockets was skipped because of an unmet condition check (ConditionUser=!root). Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: Starting Create User's Volatile Files and Directories... Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: Listening on D-Bus User Message Bus Socket. Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: Reached target Sockets. Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: Finished Create User's Volatile Files and Directories. Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: Reached target Basic System. Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: Reached target Main User Target. Jan 22 13:21:24 np0005592561.novalocal systemd[89136]: Startup finished in 220ms. Jan 22 13:21:24 np0005592561.novalocal systemd[1]: Started User Manager for UID 0. Jan 22 13:21:24 np0005592561.novalocal systemd[1]: Started Session c1 of User root. Jan 22 13:21:24 np0005592561.novalocal sudo[89113]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:24 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:24 np0005592561.novalocal systemd-rc-local-generator[89200]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:24 np0005592561.novalocal systemd-sysv-generator[89204]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:24 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:24 np0005592561.novalocal sudo[89113]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:24 np0005592561.novalocal systemd[1]: session-c1.scope: Deactivated successfully. Jan 22 13:21:24 np0005592561.novalocal sudo[89210]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Jan 22 13:21:24 np0005592561.novalocal systemd[1]: Started Session c2 of User root. Jan 22 13:21:24 np0005592561.novalocal sudo[89210]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:24 np0005592561.novalocal systemd[1]: Starting Restore LIO kernel target configuration... Jan 22 13:21:24 np0005592561.novalocal kernel: Rounding down aligned max_sectors from 4294967295 to 4294967288 Jan 22 13:21:24 np0005592561.novalocal target[89214]: No saved config file at /etc/target/saveconfig.json, ok, exiting Jan 22 13:21:24 np0005592561.novalocal systemd[1]: Finished Restore LIO kernel target configuration. Jan 22 13:21:24 np0005592561.novalocal sudo[89210]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:24 np0005592561.novalocal systemd[1]: session-c2.scope: Deactivated successfully. Jan 22 13:21:24 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:25 np0005592561.novalocal systemd-rc-local-generator[89247]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:25 np0005592561.novalocal systemd-sysv-generator[89251]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:25 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:25 np0005592561.novalocal sudo[89225]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:21:25 np0005592561.novalocal systemd[1]: Started Session c3 of User root. Jan 22 13:21:25 np0005592561.novalocal sudo[89225]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:25 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:25 np0005592561.novalocal systemd-rc-local-generator[89278]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:25 np0005592561.novalocal systemd-sysv-generator[89282]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:25 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:25 np0005592561.novalocal sudo[89225]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:25 np0005592561.novalocal systemd[1]: session-c3.scope: Deactivated successfully. Jan 22 13:21:25 np0005592561.novalocal runuser[89287]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:25 np0005592561.novalocal sudo[89292]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -L 14.25g cinder-volumes/cinder-volumes-pool Jan 22 13:21:25 np0005592561.novalocal systemd[1]: Started Session c4 of User root. Jan 22 13:21:25 np0005592561.novalocal sudo[89292]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:26 np0005592561.novalocal systemd[1]: Started Device-mapper event daemon. Jan 22 13:21:26 np0005592561.novalocal dmeventd[89366]: dmeventd ready for processing. Jan 22 13:21:26 np0005592561.novalocal dmeventd[89366]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Jan 22 13:21:26 np0005592561.novalocal lvm[89374]: PV /dev/loop2 online, VG cinder-volumes is complete. Jan 22 13:21:26 np0005592561.novalocal lvm[89374]: VG cinder-volumes finished Jan 22 13:21:26 np0005592561.novalocal sudo[89292]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:26 np0005592561.novalocal systemd[1]: session-c4.scope: Deactivated successfully. Jan 22 13:21:26 np0005592561.novalocal runuser[89287]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:26 np0005592561.novalocal sudo[89381]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/cinder-volumes-pool Jan 22 13:21:26 np0005592561.novalocal systemd[1]: Started Session c5 of User root. Jan 22 13:21:26 np0005592561.novalocal sudo[89381]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:26 np0005592561.novalocal runuser[89382]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:26 np0005592561.novalocal sudo[89381]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:26 np0005592561.novalocal systemd[1]: session-c5.scope: Deactivated successfully. Jan 22 13:21:26 np0005592561.novalocal sudo[89434]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C pvs --noheadings --unit=g -o vg_name,name,size,free --separator | --nosuffix --ignoreskippedcluster Jan 22 13:21:26 np0005592561.novalocal systemd[1]: Started Session c6 of User root. Jan 22 13:21:26 np0005592561.novalocal sudo[89434]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:27 np0005592561.novalocal runuser[89382]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:27 np0005592561.novalocal runuser[89445]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:27 np0005592561.novalocal sudo[89434]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:27 np0005592561.novalocal systemd[1]: session-c6.scope: Deactivated successfully. Jan 22 13:21:27 np0005592561.novalocal sudo[89491]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:21:27 np0005592561.novalocal systemd[1]: Started Session c7 of User root. Jan 22 13:21:27 np0005592561.novalocal sudo[89491]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:27 np0005592561.novalocal sudo[89491]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:27 np0005592561.novalocal systemd[1]: session-c7.scope: Deactivated successfully. Jan 22 13:21:27 np0005592561.novalocal sudo[89499]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:21:27 np0005592561.novalocal systemd[1]: Started Session c8 of User root. Jan 22 13:21:27 np0005592561.novalocal runuser[89445]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:27 np0005592561.novalocal sudo[89499]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:27 np0005592561.novalocal runuser[89505]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:27 np0005592561.novalocal sudo[89499]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:28 np0005592561.novalocal systemd[1]: session-c8.scope: Deactivated successfully. Jan 22 13:21:28 np0005592561.novalocal sudo[89551]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:21:28 np0005592561.novalocal systemd[1]: Started Session c9 of User root. Jan 22 13:21:28 np0005592561.novalocal sudo[89551]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:28 np0005592561.novalocal runuser[89505]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:28 np0005592561.novalocal sudo[89551]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:28 np0005592561.novalocal systemd[1]: session-c9.scope: Deactivated successfully. Jan 22 13:21:28 np0005592561.novalocal sudo[89562]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 13:21:28 np0005592561.novalocal systemd[1]: Started Session c10 of User root. Jan 22 13:21:28 np0005592561.novalocal sudo[89562]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:28 np0005592561.novalocal runuser[89568]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:28 np0005592561.novalocal sudo[89562]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:28 np0005592561.novalocal systemd[1]: session-c10.scope: Deactivated successfully. Jan 22 13:21:28 np0005592561.novalocal sudo[89615]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Jan 22 13:21:28 np0005592561.novalocal systemd[1]: Started Session c11 of User root. Jan 22 13:21:28 np0005592561.novalocal sudo[89615]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:29 np0005592561.novalocal sudo[89615]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:29 np0005592561.novalocal systemd[1]: session-c11.scope: Deactivated successfully. Jan 22 13:21:29 np0005592561.novalocal sudo[89624]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Jan 22 13:21:29 np0005592561.novalocal systemd[1]: Started Session c12 of User root. Jan 22 13:21:29 np0005592561.novalocal sudo[89624]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:29 np0005592561.novalocal runuser[89568]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:29 np0005592561.novalocal runuser[89630]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:29 np0005592561.novalocal sudo[89624]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:29 np0005592561.novalocal systemd[1]: session-c12.scope: Deactivated successfully. Jan 22 13:21:29 np0005592561.novalocal sudo[89676]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:21:29 np0005592561.novalocal systemd[1]: Started Session c13 of User root. Jan 22 13:21:29 np0005592561.novalocal sudo[89676]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:30 np0005592561.novalocal sudo[89676]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:30 np0005592561.novalocal systemd[1]: session-c13.scope: Deactivated successfully. Jan 22 13:21:30 np0005592561.novalocal runuser[89630]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:30 np0005592561.novalocal sudo[89687]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:21:30 np0005592561.novalocal systemd[1]: Started Session c14 of User root. Jan 22 13:21:30 np0005592561.novalocal sudo[89687]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:30 np0005592561.novalocal runuser[89689]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:30 np0005592561.novalocal sudo[89687]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:30 np0005592561.novalocal systemd[1]: session-c14.scope: Deactivated successfully. Jan 22 13:21:30 np0005592561.novalocal sudo[89736]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 13:21:30 np0005592561.novalocal systemd[1]: Started Session c15 of User root. Jan 22 13:21:30 np0005592561.novalocal sudo[89736]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:30 np0005592561.novalocal runuser[89689]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:30 np0005592561.novalocal runuser[89747]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:30 np0005592561.novalocal sudo[89736]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:30 np0005592561.novalocal systemd[1]: session-c15.scope: Deactivated successfully. Jan 22 13:21:30 np0005592561.novalocal sudo[89760]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:21:30 np0005592561.novalocal systemd[1]: Started Session c16 of User root. Jan 22 13:21:30 np0005592561.novalocal sudo[89760]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:31 np0005592561.novalocal sudo[89760]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:31 np0005592561.novalocal systemd[1]: session-c16.scope: Deactivated successfully. Jan 22 13:21:31 np0005592561.novalocal sudo[89800]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:21:31 np0005592561.novalocal systemd[1]: Started Session c17 of User root. Jan 22 13:21:31 np0005592561.novalocal runuser[89747]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:31 np0005592561.novalocal sudo[89800]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:31 np0005592561.novalocal sudo[89800]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:31 np0005592561.novalocal systemd[1]: session-c17.scope: Deactivated successfully. Jan 22 13:21:31 np0005592561.novalocal sudo[89811]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:21:31 np0005592561.novalocal systemd[1]: Started Session c18 of User root. Jan 22 13:21:31 np0005592561.novalocal sudo[89811]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:32 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:32 np0005592561.novalocal systemd-rc-local-generator[89837]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:32 np0005592561.novalocal systemd-sysv-generator[89841]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:32 np0005592561.novalocal sudo[89811]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:32 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:32 np0005592561.novalocal systemd[1]: session-c18.scope: Deactivated successfully. Jan 22 13:21:32 np0005592561.novalocal sudo[89846]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 13:21:32 np0005592561.novalocal systemd[1]: Started Session c19 of User root. Jan 22 13:21:32 np0005592561.novalocal sudo[89846]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:32 np0005592561.novalocal systemd[1]: Starting OpenStack Neutron (RPC only) Server... Jan 22 13:21:32 np0005592561.novalocal sudo[89846]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:32 np0005592561.novalocal systemd[1]: session-c19.scope: Deactivated successfully. Jan 22 13:21:32 np0005592561.novalocal sudo[89852]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:21:32 np0005592561.novalocal systemd[1]: Started Session c20 of User root. Jan 22 13:21:32 np0005592561.novalocal sudo[89852]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:32 np0005592561.novalocal neutron-rpc-server[89850]: This program is using eventlet and has been monkey_patched Jan 22 13:21:33 np0005592561.novalocal sudo[89852]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:33 np0005592561.novalocal systemd[1]: session-c20.scope: Deactivated successfully. Jan 22 13:21:33 np0005592561.novalocal sudo[89861]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:21:33 np0005592561.novalocal systemd[1]: Started Session c21 of User root. Jan 22 13:21:33 np0005592561.novalocal sudo[89861]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:33 np0005592561.novalocal sudo[89861]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:33 np0005592561.novalocal systemd[1]: session-c21.scope: Deactivated successfully. Jan 22 13:21:33 np0005592561.novalocal sudo[89865]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:21:33 np0005592561.novalocal systemd[1]: Started Session c22 of User root. Jan 22 13:21:33 np0005592561.novalocal sudo[89865]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:34 np0005592561.novalocal sudo[89865]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:34 np0005592561.novalocal systemd[1]: session-c22.scope: Deactivated successfully. Jan 22 13:21:34 np0005592561.novalocal sudo[89869]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 13:21:34 np0005592561.novalocal systemd[1]: Started Session c23 of User root. Jan 22 13:21:34 np0005592561.novalocal sudo[89869]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:34 np0005592561.novalocal sudo[89869]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:34 np0005592561.novalocal systemd[1]: session-c23.scope: Deactivated successfully. Jan 22 13:21:34 np0005592561.novalocal sudo[89874]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:21:34 np0005592561.novalocal systemd[1]: Started Session c24 of User root. Jan 22 13:21:34 np0005592561.novalocal sudo[89874]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:21:34 np0005592561.novalocal sudo[89874]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:34 np0005592561.novalocal systemd[1]: session-c24.scope: Deactivated successfully. Jan 22 13:21:35 np0005592561.novalocal systemd[1]: Started OpenStack Neutron (RPC only) Server. Jan 22 13:21:35 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:35 np0005592561.novalocal systemd-rc-local-generator[89900]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:35 np0005592561.novalocal systemd-sysv-generator[89905]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:35 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:35 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:35 np0005592561.novalocal systemd-sysv-generator[89936]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:35 np0005592561.novalocal systemd-rc-local-generator[89931]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:35 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:36 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:36 np0005592561.novalocal systemd-sysv-generator[89966]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:36 np0005592561.novalocal systemd-rc-local-generator[89960]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:36 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:36 np0005592561.novalocal systemd[1]: Starting OpenStack Neutron Periodic Workers... Jan 22 13:21:37 np0005592561.novalocal neutron-periodic-workers[89973]: This program is using eventlet and has been monkey_patched Jan 22 13:21:39 np0005592561.novalocal systemd[1]: Started OpenStack Neutron Periodic Workers. Jan 22 13:21:39 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:39 np0005592561.novalocal systemd-rc-local-generator[89999]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:39 np0005592561.novalocal systemd-sysv-generator[90004]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:39 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:39 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:40 np0005592561.novalocal systemd-sysv-generator[90036]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:40 np0005592561.novalocal systemd-rc-local-generator[90029]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:40 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:40 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:40 np0005592561.novalocal systemd-sysv-generator[90068]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:40 np0005592561.novalocal systemd-rc-local-generator[90063]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:40 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:40 np0005592561.novalocal systemd[1]: Started OpenStack Neutron OVN Agent. Jan 22 13:21:41 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:41 np0005592561.novalocal systemd-rc-local-generator[90099]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:41 np0005592561.novalocal systemd-sysv-generator[90103]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:41 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:41 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:41 np0005592561.novalocal systemd-rc-local-generator[90127]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:41 np0005592561.novalocal systemd-sysv-generator[90133]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:41 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:42 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:42 np0005592561.novalocal systemd-sysv-generator[90160]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:42 np0005592561.novalocal systemd-rc-local-generator[90157]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:42 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:42 np0005592561.novalocal systemd[1]: Started OpenStack Neutron VPNaaS support for OVN. Jan 22 13:21:42 np0005592561.novalocal sudo[90180]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmplokc5g83/privsep.sock Jan 22 13:21:42 np0005592561.novalocal systemd[1]: Started Session c25 of User root. Jan 22 13:21:42 np0005592561.novalocal sudo[90180]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Jan 22 13:21:42 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:43 np0005592561.novalocal systemd-rc-local-generator[90204]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:43 np0005592561.novalocal systemd-sysv-generator[90208]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:43 np0005592561.novalocal neutron-ovn-vpn-agent[90170]: This program is using eventlet and has been monkey_patched Jan 22 13:21:43 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:43 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:43 np0005592561.novalocal systemd-sysv-generator[90242]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:43 np0005592561.novalocal systemd-rc-local-generator[90237]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:43 np0005592561.novalocal kernel: capability: warning: `privsep-helper' uses deprecated v2 capabilities in a way that may be insecure Jan 22 13:21:43 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:43 np0005592561.novalocal sudo[90180]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:43 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:44 np0005592561.novalocal systemd-rc-local-generator[90276]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:44 np0005592561.novalocal systemd-sysv-generator[90280]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:44 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:44 np0005592561.novalocal systemd[1]: Starting OpenStack Neutron OVN Maintenance Worker... Jan 22 13:21:44 np0005592561.novalocal neutron-ovn-maintenance-worker[90287]: This program is using eventlet and has been monkey_patched Jan 22 13:21:45 np0005592561.novalocal sudo[90298]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpjgcz9ttw/privsep.sock Jan 22 13:21:45 np0005592561.novalocal systemd[1]: Started Session c26 of User root. Jan 22 13:21:45 np0005592561.novalocal sudo[90298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Jan 22 13:21:45 np0005592561.novalocal sudo[90298]: pam_unix(sudo:session): session closed for user root Jan 22 13:21:46 np0005592561.novalocal systemd[1]: Started OpenStack Neutron OVN Maintenance Worker. Jan 22 13:21:46 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:47 np0005592561.novalocal systemd-sysv-generator[90337]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:47 np0005592561.novalocal systemd-rc-local-generator[90334]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:47 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:47 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:47 np0005592561.novalocal systemd-sysv-generator[90369]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:47 np0005592561.novalocal systemd-rc-local-generator[90365]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:47 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:47 np0005592561.novalocal runuser[90374]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:48 np0005592561.novalocal runuser[90374]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:48 np0005592561.novalocal runuser[90426]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:49 np0005592561.novalocal runuser[90426]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:49 np0005592561.novalocal runuser[90479]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:50 np0005592561.novalocal runuser[90479]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:50 np0005592561.novalocal runuser[90531]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:21:50 np0005592561.novalocal runuser[90531]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:21:51 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:51 np0005592561.novalocal systemd-rc-local-generator[90610]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:51 np0005592561.novalocal systemd-sysv-generator[90613]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:51 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:51 np0005592561.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Jan 22 13:21:51 np0005592561.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Jan 22 13:21:52 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:52 np0005592561.novalocal systemd-rc-local-generator[90639]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:52 np0005592561.novalocal systemd-sysv-generator[90645]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:52 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:52 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:52 np0005592561.novalocal systemd-sysv-generator[90673]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:52 np0005592561.novalocal systemd-rc-local-generator[90668]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:52 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:53 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:53 np0005592561.novalocal systemd-rc-local-generator[90705]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:53 np0005592561.novalocal systemd-sysv-generator[90708]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:53 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:53 np0005592561.novalocal systemd[1]: Listening on libvirt locking daemon socket. Jan 22 13:21:53 np0005592561.novalocal systemd[1]: Listening on libvirt locking daemon admin socket. Jan 22 13:21:53 np0005592561.novalocal systemd[1]: Starting libvirt locking daemon... Jan 22 13:21:53 np0005592561.novalocal systemd[1]: Started libvirt locking daemon. Jan 22 13:21:54 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:54 np0005592561.novalocal systemd-sysv-generator[90740]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:54 np0005592561.novalocal systemd-rc-local-generator[90737]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:54 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:54 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:54 np0005592561.novalocal systemd-rc-local-generator[90764]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:54 np0005592561.novalocal systemd-sysv-generator[90767]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:54 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:55 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:55 np0005592561.novalocal systemd-rc-local-generator[90800]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:55 np0005592561.novalocal systemd-sysv-generator[90804]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:55 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:55 np0005592561.novalocal systemd[1]: Listening on libvirt logging daemon socket. Jan 22 13:21:55 np0005592561.novalocal systemd[1]: Listening on libvirt logging daemon admin socket. Jan 22 13:21:55 np0005592561.novalocal systemd[1]: Starting libvirt logging daemon... Jan 22 13:21:55 np0005592561.novalocal systemd[1]: Started libvirt logging daemon. Jan 22 13:21:56 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:56 np0005592561.novalocal systemd-rc-local-generator[90832]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:56 np0005592561.novalocal systemd-sysv-generator[90836]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:56 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:56 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:56 np0005592561.novalocal systemd-rc-local-generator[90861]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:56 np0005592561.novalocal systemd-sysv-generator[90864]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:56 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:57 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:57 np0005592561.novalocal systemd-rc-local-generator[90894]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:57 np0005592561.novalocal systemd-sysv-generator[90899]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:57 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:57 np0005592561.novalocal systemd[1]: Listening on libvirt secret daemon socket. Jan 22 13:21:58 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:58 np0005592561.novalocal systemd-rc-local-generator[90931]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:58 np0005592561.novalocal systemd-sysv-generator[90935]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:58 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:58 np0005592561.novalocal systemd[1]: Listening on libvirt nodedev daemon socket. Jan 22 13:21:59 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:21:59 np0005592561.novalocal systemd-rc-local-generator[90965]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:21:59 np0005592561.novalocal systemd-sysv-generator[90971]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:21:59 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:21:59 np0005592561.novalocal systemd[1]: Listening on libvirt QEMU daemon socket. Jan 22 13:22:00 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:22:00 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:22:00 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:22:00 np0005592561.novalocal systemd[1]: virtproxyd-tcp.socket: Deactivated successfully. Jan 22 13:22:00 np0005592561.novalocal systemd[1]: Closed libvirt proxy daemon non-TLS IP socket. Jan 22 13:22:00 np0005592561.novalocal systemd[1]: Stopping libvirt proxy daemon non-TLS IP socket... Jan 22 13:22:00 np0005592561.novalocal systemd[1]: virtproxyd.socket: Deactivated successfully. Jan 22 13:22:00 np0005592561.novalocal systemd[1]: Closed libvirt proxy daemon socket. Jan 22 13:22:00 np0005592561.novalocal systemd[1]: Stopping libvirt proxy daemon socket... Jan 22 13:22:00 np0005592561.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Jan 22 13:22:00 np0005592561.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Jan 22 13:22:00 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:00 np0005592561.novalocal systemd-sysv-generator[91013]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:00 np0005592561.novalocal systemd-rc-local-generator[91010]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:00 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:01 np0005592561.novalocal systemd[1]: Listening on libvirt storage daemon socket. Jan 22 13:22:01 np0005592561.novalocal systemd[1]: Created slice Virtual Machine and Container Slice. Jan 22 13:22:01 np0005592561.novalocal systemd[1]: Listening on libvirt QEMU daemon admin socket. Jan 22 13:22:01 np0005592561.novalocal systemd[1]: Listening on libvirt QEMU daemon read-only socket. Jan 22 13:22:01 np0005592561.novalocal systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jan 22 13:22:01 np0005592561.novalocal systemd[1]: Starting Virtual Machine and Container Registration Service... Jan 22 13:22:01 np0005592561.novalocal systemd[1]: Started Virtual Machine and Container Registration Service. Jan 22 13:22:01 np0005592561.novalocal systemd[1]: Starting libvirt QEMU daemon... Jan 22 13:22:01 np0005592561.novalocal systemd[1]: Started libvirt QEMU daemon. Jan 22 13:22:01 np0005592561.novalocal virtqemud[91024]: libvirt version: 11.10.0, package: 2.el9 (builder@centos.org, 2025-12-18-15:09:54, ) Jan 22 13:22:01 np0005592561.novalocal virtqemud[91024]: hostname: np0005592561.novalocal Jan 22 13:22:01 np0005592561.novalocal virtqemud[91024]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Jan 22 13:22:01 np0005592561.novalocal virtqemud[91024]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Jan 22 13:22:01 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:02 np0005592561.novalocal systemd-rc-local-generator[91072]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:02 np0005592561.novalocal systemd-sysv-generator[91075]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:02 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:02 np0005592561.novalocal systemd[1]: Reached target libvirt guests shutdown target. Jan 22 13:22:02 np0005592561.novalocal systemd[1]: Starting libvirt guests suspend/resume service... Jan 22 13:22:02 np0005592561.novalocal systemd[1]: Finished libvirt guests suspend/resume service. Jan 22 13:22:02 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:02 np0005592561.novalocal systemd-sysv-generator[91113]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:02 np0005592561.novalocal systemd-rc-local-generator[91109]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:02 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:02 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:03 np0005592561.novalocal systemd-rc-local-generator[91139]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:03 np0005592561.novalocal systemd-sysv-generator[91142]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:03 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:03 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:04 np0005592561.novalocal systemd-rc-local-generator[91174]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:04 np0005592561.novalocal systemd-sysv-generator[91177]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:04 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:04 np0005592561.novalocal systemd[1]: Started OpenStack Nova NoVNC Proxy Server. Jan 22 13:22:04 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:04 np0005592561.novalocal systemd-sysv-generator[91209]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:04 np0005592561.novalocal systemd-rc-local-generator[91205]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:04 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:04 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:04 np0005592561.novalocal systemd-rc-local-generator[91234]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:04 np0005592561.novalocal systemd-sysv-generator[91238]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:05 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:05 np0005592561.novalocal runuser[91245]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:22:05 np0005592561.novalocal runuser[91245]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:22:05 np0005592561.novalocal runuser[91297]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:22:06 np0005592561.novalocal runuser[91297]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:22:06 np0005592561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 13:22:06 np0005592561.novalocal runuser[91351]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:22:07 np0005592561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 13:22:07 np0005592561.novalocal runuser[91351]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:22:07 np0005592561.novalocal runuser[91444]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:22:07 np0005592561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service. Jan 22 13:22:08 np0005592561.novalocal runuser[91444]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:22:08 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 78bd0feb-9713-4829-8afe-ae7a3d67bd27 Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l d1ac9bda-c0c3-4079-bf65-8d224f718e16 Jan 22 13:22:08 np0005592561.novalocal systemd-sysv-generator[91533]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:08 np0005592561.novalocal systemd-rc-local-generator[91530]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 19b2e6c7-272c-4368-88b2-3f7dc96cd691 Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 13:22:08 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 55890bf4-fb78-4245-8aa9-a658f124ca60 Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 4aef929f-9ca6-46b3-90e2-8fb8cc393941 Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 95bc14b2-59e7-4157-af5e-9e6fefea685b Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 4e83cb71-d0ba-47f5-b825-f0fc748101a7 Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 20d800e5-f2e4-4de3-8700-98189de66c65 Jan 22 13:22:08 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 13:22:09 np0005592561.novalocal systemd[1]: Started OpenStack Octavia Health-Manager service. Jan 22 13:22:09 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 0268cc3f-f832-4d5e-87f0-54be9b233f77 Jan 22 13:22:09 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 13:22:09 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 637f9a5d-69df-439a-b54b-ceb81be97a14 Jan 22 13:22:09 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 13:22:09 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 59ddf0a4-e3fd-4822-8cce-c6ee53dfeae4 Jan 22 13:22:09 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 13:22:09 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 19b2e6c7-272c-4368-88b2-3f7dc96cd691 Jan 22 13:22:09 np0005592561.novalocal setroubleshoot[91350]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 13:22:09 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:09 np0005592561.novalocal systemd-rc-local-generator[91571]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:09 np0005592561.novalocal systemd-sysv-generator[91576]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:09 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:09 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:09 np0005592561.novalocal systemd-rc-local-generator[91599]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:09 np0005592561.novalocal systemd-sysv-generator[91603]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:09 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:10 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:10 np0005592561.novalocal systemd-sysv-generator[91638]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:10 np0005592561.novalocal systemd-rc-local-generator[91632]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:10 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:10 np0005592561.novalocal systemd[1]: Started OpenStack Octavia Housekeeping service. Jan 22 13:22:10 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:10 np0005592561.novalocal systemd-rc-local-generator[91668]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:10 np0005592561.novalocal systemd-sysv-generator[91672]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:10 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:11 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:11 np0005592561.novalocal systemd-rc-local-generator[91698]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:11 np0005592561.novalocal systemd-sysv-generator[91701]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:11 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:11 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:11 np0005592561.novalocal systemd-rc-local-generator[91729]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:11 np0005592561.novalocal systemd-sysv-generator[91734]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:11 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:12 np0005592561.novalocal systemd[1]: Started OpenStack Octavia Driver Agent service. Jan 22 13:22:12 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:12 np0005592561.novalocal systemd-rc-local-generator[91764]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:12 np0005592561.novalocal systemd-sysv-generator[91768]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:12 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:12 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:12 np0005592561.novalocal systemd-rc-local-generator[91795]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:12 np0005592561.novalocal systemd-sysv-generator[91798]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:12 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:13 np0005592561.novalocal runuser[91803]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:22:13 np0005592561.novalocal runuser[91803]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:22:13 np0005592561.novalocal runuser[91855]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:22:14 np0005592561.novalocal runuser[91855]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:22:14 np0005592561.novalocal runuser[91912]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:22:15 np0005592561.novalocal runuser[91912]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:22:15 np0005592561.novalocal runuser[91966]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:22:15 np0005592561.novalocal runuser[91966]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:22:16 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:16 np0005592561.novalocal systemd-rc-local-generator[92059]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:16 np0005592561.novalocal systemd-sysv-generator[92064]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:16 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:17 np0005592561.novalocal systemd[1]: Started OpenStack Manila Scheduler. Jan 22 13:22:17 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:17 np0005592561.novalocal systemd-rc-local-generator[92091]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:17 np0005592561.novalocal systemd-sysv-generator[92095]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:17 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:17 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:17 np0005592561.novalocal systemd-rc-local-generator[92121]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:17 np0005592561.novalocal systemd-sysv-generator[92124]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:17 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:18 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:18 np0005592561.novalocal systemd-rc-local-generator[92158]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:18 np0005592561.novalocal systemd-sysv-generator[92161]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:18 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:18 np0005592561.novalocal systemd[1]: Started OpenStack Manila Share Service. Jan 22 13:22:18 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:18 np0005592561.novalocal systemd-rc-local-generator[92193]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:18 np0005592561.novalocal systemd-sysv-generator[92196]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:18 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:19 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:19 np0005592561.novalocal systemd-rc-local-generator[92218]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:19 np0005592561.novalocal systemd-sysv-generator[92222]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:19 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:19 np0005592561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 13:22:19 np0005592561.novalocal systemd[1]: setroubleshootd.service: Consumed 1.490s CPU time. Jan 22 13:22:19 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Jan 22 13:22:19 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Consumed 1.244s CPU time. Jan 22 13:22:19 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:19 np0005592561.novalocal systemd-sysv-generator[92258]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:19 np0005592561.novalocal systemd-rc-local-generator[92254]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:19 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:20 np0005592561.novalocal sudo[92266]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/privsep-helper --config-file /usr/share/manila/manila-dist.conf --config-file /etc/manila/manila.conf --privsep_context manila.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpy46jejc3/privsep.sock Jan 22 13:22:20 np0005592561.novalocal systemd[1]: Started Session c27 of User root. Jan 22 13:22:20 np0005592561.novalocal systemd[1]: Started OpenStack Manila Data Server. Jan 22 13:22:20 np0005592561.novalocal sudo[92266]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=978) Jan 22 13:22:20 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:20 np0005592561.novalocal systemd-sysv-generator[92296]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:20 np0005592561.novalocal systemd-rc-local-generator[92292]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:20 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:20 np0005592561.novalocal sudo[92266]: pam_unix(sudo:session): session closed for user root Jan 22 13:22:20 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:20 np0005592561.novalocal systemd-rc-local-generator[92323]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:20 np0005592561.novalocal systemd-sysv-generator[92326]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:20 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:21 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:22 np0005592561.novalocal systemd-rc-local-generator[92357]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:22 np0005592561.novalocal systemd-sysv-generator[92360]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:22 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:22 np0005592561.novalocal systemd[1]: Starting One-time temporary TLS key generation for httpd.service... Jan 22 13:22:22 np0005592561.novalocal systemd[1]: httpd-init.service: Deactivated successfully. Jan 22 13:22:22 np0005592561.novalocal systemd[1]: Finished One-time temporary TLS key generation for httpd.service. Jan 22 13:22:22 np0005592561.novalocal systemd[1]: Starting The Apache HTTP Server... Jan 22 13:22:23 np0005592561.novalocal python3[92374]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Jan 22 13:22:23 np0005592561.novalocal python3[92374]: version_info = version.StrictVersion(__version__).version Jan 22 13:22:25 np0005592561.novalocal python3[92377]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Jan 22 13:22:25 np0005592561.novalocal python3[92377]: version_info = version.StrictVersion(__version__).version Jan 22 13:22:29 np0005592561.novalocal httpd[92389]: Server configured, listening on: ::1 port 9876, ... Jan 22 13:22:29 np0005592561.novalocal systemd[1]: Started The Apache HTTP Server. Jan 22 13:22:29 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:29 np0005592561.novalocal systemd-rc-local-generator[92507]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:29 np0005592561.novalocal systemd-sysv-generator[92511]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:29 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:29 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:22:30 np0005592561.novalocal systemd-sysv-generator[92541]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:22:30 np0005592561.novalocal systemd-rc-local-generator[92534]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:22:30 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:22:30 np0005592561.novalocal crontab[92545]: (root) REPLACE (keystone) Jan 22 13:22:32 np0005592561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 13:22:32 np0005592561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 13:22:33 np0005592561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service. Jan 22 13:22:34 np0005592561.novalocal setroubleshoot[92552]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 944d4509-4d6b-45d4-9d5d-4901dde69a63 Jan 22 13:22:34 np0005592561.novalocal setroubleshoot[92552]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:22:34 np0005592561.novalocal setroubleshoot[92552]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 5b3534f9-0de0-42e3-bc57-dce55d5e180b Jan 22 13:22:34 np0005592561.novalocal setroubleshoot[92552]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:22:34 np0005592561.novalocal setroubleshoot[92552]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 129cc23d-3e4e-4e73-8a0a-d69de2419c92 Jan 22 13:22:34 np0005592561.novalocal setroubleshoot[92552]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:22:34 np0005592561.novalocal setroubleshoot[92552]: failed to retrieve rpm info for path '/var/lib/keystone/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f': Jan 22 13:22:34 np0005592561.novalocal setroubleshoot[92552]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. For complete SELinux messages run: sealert -l 231cfcd3-a1ad-4302-a243-abfe9051c10b Jan 22 13:22:34 np0005592561.novalocal setroubleshoot[92552]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the 6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:22:44 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Deactivated successfully. Jan 22 13:22:44 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Consumed 1.185s CPU time. Jan 22 13:22:44 np0005592561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 13:22:44 np0005592561.novalocal systemd[1]: setroubleshootd.service: Consumed 1.037s CPU time. Jan 22 13:23:07 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:23:07 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:23:07 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:23:12 np0005592561.novalocal octavia-health-manager[91773]: /usr/lib/python3.9/site-packages/octavia/db/repositories.py:1661: SAWarning: Coercing Subquery object into a select() for use in IN(); please pass a select() construct explicitly Jan 22 13:23:12 np0005592561.novalocal octavia-health-manager[91773]: self.model_class.amphora_id.in_(expired_ids_query) Jan 22 13:23:20 np0005592561.novalocal sudo[92686]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:23:20 np0005592561.novalocal systemd[1]: Started Session c28 of User root. Jan 22 13:23:20 np0005592561.novalocal sudo[92686]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:23:20 np0005592561.novalocal sudo[92686]: pam_unix(sudo:session): session closed for user root Jan 22 13:23:20 np0005592561.novalocal systemd[1]: session-c28.scope: Deactivated successfully. Jan 22 13:23:20 np0005592561.novalocal sudo[92690]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:23:20 np0005592561.novalocal systemd[1]: Started Session c29 of User root. Jan 22 13:23:20 np0005592561.novalocal sudo[92690]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:23:20 np0005592561.novalocal sudo[92690]: pam_unix(sudo:session): session closed for user root Jan 22 13:23:20 np0005592561.novalocal systemd[1]: session-c29.scope: Deactivated successfully. Jan 22 13:23:20 np0005592561.novalocal sudo[92695]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 13:23:20 np0005592561.novalocal systemd[1]: Started Session c30 of User root. Jan 22 13:23:20 np0005592561.novalocal sudo[92695]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:23:21 np0005592561.novalocal sudo[92695]: pam_unix(sudo:session): session closed for user root Jan 22 13:23:21 np0005592561.novalocal systemd[1]: session-c30.scope: Deactivated successfully. Jan 22 13:23:21 np0005592561.novalocal sudo[92701]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:23:21 np0005592561.novalocal systemd[1]: Started Session c31 of User root. Jan 22 13:23:21 np0005592561.novalocal sudo[92701]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:23:21 np0005592561.novalocal sudo[92701]: pam_unix(sudo:session): session closed for user root Jan 22 13:23:21 np0005592561.novalocal systemd[1]: session-c31.scope: Deactivated successfully. Jan 22 13:23:54 np0005592561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 13:23:54 np0005592561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 13:23:55 np0005592561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service. Jan 22 13:23:56 np0005592561.novalocal setroubleshoot[92764]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l bb01f57d-9081-4f93-b52d-cf64ebb1bd90 Jan 22 13:23:56 np0005592561.novalocal setroubleshoot[92764]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:23:56 np0005592561.novalocal setroubleshoot[92764]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 88ba9ea4-24cb-4d20-8fd1-3e6ef0869bff Jan 22 13:23:56 np0005592561.novalocal setroubleshoot[92764]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:23:56 np0005592561.novalocal setroubleshoot[92764]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 7905e379-2d5b-4b03-b1db-059c1e702d79 Jan 22 13:23:56 np0005592561.novalocal setroubleshoot[92764]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:23:58 np0005592561.novalocal setroubleshoot[92764]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l bb01f57d-9081-4f93-b52d-cf64ebb1bd90 Jan 22 13:23:58 np0005592561.novalocal setroubleshoot[92764]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:23:58 np0005592561.novalocal setroubleshoot[92764]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 88ba9ea4-24cb-4d20-8fd1-3e6ef0869bff Jan 22 13:23:58 np0005592561.novalocal setroubleshoot[92764]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:23:59 np0005592561.novalocal setroubleshoot[92764]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 7905e379-2d5b-4b03-b1db-059c1e702d79 Jan 22 13:23:59 np0005592561.novalocal setroubleshoot[92764]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:24:01 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:24:01 np0005592561.novalocal systemd[1]: virtqemud.service: Deactivated successfully. Jan 22 13:24:01 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:24:01 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:24:09 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Deactivated successfully. Jan 22 13:24:09 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Consumed 1.264s CPU time. Jan 22 13:24:09 np0005592561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 13:24:09 np0005592561.novalocal systemd[1]: setroubleshootd.service: Consumed 1.300s CPU time. Jan 22 13:24:20 np0005592561.novalocal sudo[92870]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:24:20 np0005592561.novalocal systemd[1]: Started Session c32 of User root. Jan 22 13:24:20 np0005592561.novalocal sudo[92870]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:20 np0005592561.novalocal sudo[92870]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:20 np0005592561.novalocal systemd[1]: session-c32.scope: Deactivated successfully. Jan 22 13:24:20 np0005592561.novalocal sudo[92874]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:24:20 np0005592561.novalocal systemd[1]: Started Session c33 of User root. Jan 22 13:24:20 np0005592561.novalocal sudo[92874]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:20 np0005592561.novalocal sudo[92874]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:20 np0005592561.novalocal systemd[1]: session-c33.scope: Deactivated successfully. Jan 22 13:24:20 np0005592561.novalocal sudo[92878]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 13:24:20 np0005592561.novalocal systemd[1]: Started Session c34 of User root. Jan 22 13:24:20 np0005592561.novalocal sudo[92878]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:21 np0005592561.novalocal sudo[92878]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:21 np0005592561.novalocal systemd[1]: session-c34.scope: Deactivated successfully. Jan 22 13:24:21 np0005592561.novalocal sudo[92882]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:24:21 np0005592561.novalocal systemd[1]: Started Session c35 of User root. Jan 22 13:24:21 np0005592561.novalocal sudo[92882]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:21 np0005592561.novalocal sudo[92882]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:21 np0005592561.novalocal systemd[1]: session-c35.scope: Deactivated successfully. Jan 22 13:24:23 np0005592561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 13:24:24 np0005592561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 13:24:24 np0005592561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service. Jan 22 13:24:25 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l bb01f57d-9081-4f93-b52d-cf64ebb1bd90 Jan 22 13:24:25 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:24:25 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 88ba9ea4-24cb-4d20-8fd1-3e6ef0869bff Jan 22 13:24:25 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:24:25 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 7905e379-2d5b-4b03-b1db-059c1e702d79 Jan 22 13:24:25 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:24:25 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l bb01f57d-9081-4f93-b52d-cf64ebb1bd90 Jan 22 13:24:25 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:24:25 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 88ba9ea4-24cb-4d20-8fd1-3e6ef0869bff Jan 22 13:24:25 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:24:26 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 7905e379-2d5b-4b03-b1db-059c1e702d79 Jan 22 13:24:26 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:24:29 np0005592561.novalocal sudo[92926]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-68b2d7d1-1fae-4012-810a-ab8657e76b00 cinder-volumes/cinder-volumes-pool Jan 22 13:24:29 np0005592561.novalocal systemd[1]: Started Session c36 of User root. Jan 22 13:24:29 np0005592561.novalocal sudo[92926]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:29 np0005592561.novalocal dmeventd[89366]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool. Jan 22 13:24:31 np0005592561.novalocal dmeventd[89366]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Jan 22 13:24:31 np0005592561.novalocal lvm[92982]: PV /dev/loop2 online, VG cinder-volumes is complete. Jan 22 13:24:31 np0005592561.novalocal lvm[92982]: VG cinder-volumes finished Jan 22 13:24:31 np0005592561.novalocal sudo[92926]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:31 np0005592561.novalocal systemd[1]: session-c36.scope: Deactivated successfully. Jan 22 13:24:32 np0005592561.novalocal sudo[92984]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmp63h5t__x/privsep.sock Jan 22 13:24:33 np0005592561.novalocal systemd[1]: Started Session c37 of User root. Jan 22 13:24:33 np0005592561.novalocal sudo[92984]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Jan 22 13:24:33 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l c081d333-057e-472a-b8e6-6775b74cd718 Jan 22 13:24:33 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 13:24:33 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l b4e628df-7b82-4a93-94c3-9fc840e43b14 Jan 22 13:24:33 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 13:24:33 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 345a4ea3-b5d7-4ffa-ba5d-5fe2453a729c Jan 22 13:24:33 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 13:24:33 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l bc90bceb-9ab2-409e-8c46-5faba9bafa0a Jan 22 13:24:33 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 13:24:33 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l a01854f3-15a0-4b83-bfb4-7832aea097b2 Jan 22 13:24:33 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 13:24:33 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 2664e56f-45be-4576-8724-1d808bad2ac5 Jan 22 13:24:33 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 13:24:33 np0005592561.novalocal sudo[92984]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:33 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 8114b75c-611e-44b5-bd34-cf8efbeb7450 Jan 22 13:24:33 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l a3186545-fb59-4956-8a39-f2acea4a094c Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: failed to retrieve rpm info for path '/dev/vda1': Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8969d84b-9298-4275-9410-2d9a817183fe Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 69348e8c-ac58-4dbf-b1da-ca0d398c53ac Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 56bc0905-fbc1-4d2a-9e87-203245a2f38f Jan 22 13:24:34 np0005592561.novalocal sudo[93015]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-68b2d7d1-1fae-4012-810a-ab8657e76b00 Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal systemd[1]: Started Session c38 of User root. Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l b6e42bcd-bdd8-4e5e-93c5-b44b7926ec8d Jan 22 13:24:34 np0005592561.novalocal sudo[93015]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l efeb7cc3-eee1-4f59-a693-f7b5433e2e2f Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 047dcdc9-92f5-4f00-b29a-0fddec0cf3bb Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l cab872e9-e33f-4dc1-9e97-5f5983074988 Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 4c8529df-37a6-4a87-9902-c82810c19396 Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-aCp3Ao. For complete SELinux messages run: sealert -l 6e0982d7-c69d-4378-9920-a5e4eb5bf170 Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-aCp3Ao. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-aCp3Ao file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-aCp3Ao. For complete SELinux messages run: sealert -l b56c1d74-c457-4517-9ce6-314030653e60 Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-aCp3Ao. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-aCp3Ao file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l dae22ed0-801b-4c1a-a683-4273f129dc06 Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 26e5629f-c68d-4e14-8596-a5e4c631ba4f Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l a5b7a48f-23db-4b84-aaf8-3c447879891a Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 59f64e7f-8f6c-4800-971a-012c6ba348ea Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 6f70fe83-17ea-444c-a5e8-096e1e925eb5 Jan 22 13:24:34 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:34 np0005592561.novalocal sudo[93015]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:34 np0005592561.novalocal systemd[1]: session-c38.scope: Deactivated successfully. Jan 22 13:24:34 np0005592561.novalocal sudo[93019]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-68b2d7d1-1fae-4012-810a-ab8657e76b00 iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00 23ggoVSKHN2hrcQNvJVM dbWyogvRZgLY5AaE False -p3260 -a::1 Jan 22 13:24:34 np0005592561.novalocal systemd[1]: Started Session c39 of User root. Jan 22 13:24:34 np0005592561.novalocal sudo[93019]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:35 np0005592561.novalocal sudo[93019]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:35 np0005592561.novalocal systemd[1]: session-c39.scope: Deactivated successfully. Jan 22 13:24:35 np0005592561.novalocal sudo[93034]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Jan 22 13:24:35 np0005592561.novalocal systemd[1]: Started Session c40 of User root. Jan 22 13:24:35 np0005592561.novalocal sudo[93034]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:35 np0005592561.novalocal sudo[93034]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:35 np0005592561.novalocal systemd[1]: session-c40.scope: Deactivated successfully. Jan 22 13:24:35 np0005592561.novalocal sudo[93039]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 13:24:35 np0005592561.novalocal systemd[1]: Started Session c41 of User root. Jan 22 13:24:35 np0005592561.novalocal sudo[93039]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:36 np0005592561.novalocal sudo[93039]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:36 np0005592561.novalocal systemd[1]: session-c41.scope: Deactivated successfully. Jan 22 13:24:36 np0005592561.novalocal sudo[93044]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00 23ggoVSKHN2hrcQNvJVM dbWyogvRZgLY5AaE iqn.1994-05.com.redhat:8e572f8880e5 Jan 22 13:24:36 np0005592561.novalocal systemd[1]: Started Session c42 of User root. Jan 22 13:24:36 np0005592561.novalocal sudo[93044]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:36 np0005592561.novalocal sudo[93044]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:36 np0005592561.novalocal systemd[1]: session-c42.scope: Deactivated successfully. Jan 22 13:24:36 np0005592561.novalocal sudo[93051]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 13:24:37 np0005592561.novalocal systemd[1]: Started Session c43 of User root. Jan 22 13:24:37 np0005592561.novalocal sudo[93051]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:37 np0005592561.novalocal sudo[93051]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:37 np0005592561.novalocal systemd[1]: session-c43.scope: Deactivated successfully. Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l ba06e2ad-bf79-422f-9dea-c6e3f5afd7b3 Jan 22 13:24:38 np0005592561.novalocal kernel: iscsi: registered transport (tcp) Jan 22 13:24:38 np0005592561.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Jan 22 13:24:38 np0005592561.novalocal iscsid[74382]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00, portal: ::1,3260] through [iface: default] is operational now Jan 22 13:24:38 np0005592561.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Jan 22 13:24:38 np0005592561.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Jan 22 13:24:38 np0005592561.novalocal kernel: scsi 2:0:0:0: alua: device naa.600140547fa67318b7741a799a7a7f6f port group 0 rel port 1 Jan 22 13:24:38 np0005592561.novalocal kernel: scsi 2:0:0:0: Attached scsi generic sg1 type 0 Jan 22 13:24:38 np0005592561.novalocal kernel: scsi 2:0:0:0: alua: transition timeout set to 60 seconds Jan 22 13:24:38 np0005592561.novalocal kernel: scsi 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Jan 22 13:24:38 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Jan 22 13:24:38 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Jan 22 13:24:38 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Jan 22 13:24:38 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Jan 22 13:24:38 np0005592561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Jan 22 13:24:38 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Jan 22 13:24:38 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Jan 22 13:24:38 np0005592561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Jan 22 13:24:38 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 93b916ea-5ced-4676-b890-30d8afc7ab03 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 086414e0-0c18-4e21-a9db-ed22889cead7 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l d1e12f62-a1c5-432e-9519-dfb667282886 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l a1bce25c-bffb-41d5-bf6e-59283d8c8dfb Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 314b1250-f63b-414a-9fe7-e32b64bab784 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l e5387212-7f06-4738-9f42-2ffde4d24c0d Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 0e82f4fa-fb57-454c-8117-7df35decacc2 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 8dffde2a-0c90-4ff4-b3de-f4de3142bbc6 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l be73d309-14bc-4fe8-afad-e41913008e4b Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l bd86b9c7-0a65-4f73-baf1-64c4a0ff4dae Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 1fc546ee-0db2-44b6-86af-1fd8faa6ecf2 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 93f3cfab-88ca-42e7-8982-03142fb4878b Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 5f736859-7bb4-4d17-9778-f6592646c99f Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l c870ba3c-32b2-4114-aa16-caf5f42fd7b6 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 5572da91-2bed-4859-b5b5-909d4505b794 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00/::1,3260. For complete SELinux messages run: sealert -l 69825526-c17a-4bc5-ac37-6c2d411dfec5 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00/::1,3260. For complete SELinux messages run: sealert -l a93becb2-2102-4c87-a4c0-037aa40073f5 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l c69167d3-5bba-4d5d-8b18-3b3b39daee86 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00/::1,3260. For complete SELinux messages run: sealert -l a93becb2-2102-4c87-a4c0-037aa40073f5 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l c69167d3-5bba-4d5d-8b18-3b3b39daee86 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00/::1,3260. For complete SELinux messages run: sealert -l a7fc2c95-f118-4239-9222-17b7d512c545 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l b5c7af6a-e0c8-4c8f-a365-f4ae8bf95eb7 Jan 22 13:24:38 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:39 np0005592561.novalocal sudo[93111]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Jan 22 13:24:39 np0005592561.novalocal systemd[1]: Started Session c44 of User root. Jan 22 13:24:39 np0005592561.novalocal sudo[93111]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 8f54c3bc-f105-4555-9f91-34d4f10c2b93 Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 2ca0495b-0729-4745-9e8f-bfe3aaa20995 Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 72506c37-0fa1-4ccb-803d-1293746b9070 Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: failed to retrieve rpm info for path '/dev/sda': Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8969d84b-9298-4275-9410-2d9a817183fe Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l c081d333-057e-472a-b8e6-6775b74cd718 Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l b4e628df-7b82-4a93-94c3-9fc840e43b14 Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 345a4ea3-b5d7-4ffa-ba5d-5fe2453a729c Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l bc90bceb-9ab2-409e-8c46-5faba9bafa0a Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l a01854f3-15a0-4b83-bfb4-7832aea097b2 Jan 22 13:24:39 np0005592561.novalocal sudo[93111]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:39 np0005592561.novalocal systemd[1]: session-c44.scope: Deactivated successfully. Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 2664e56f-45be-4576-8724-1d808bad2ac5 Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 8f8f71b4-7344-4db2-a57a-92aac355d9af Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 7e3720a3-7e70-478b-8a92-e5a9d6ee817e Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 56bc0905-fbc1-4d2a-9e87-203245a2f38f Jan 22 13:24:39 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:40 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l b6e42bcd-bdd8-4e5e-93c5-b44b7926ec8d Jan 22 13:24:40 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:43 np0005592561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Jan 22 13:24:43 np0005592561.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jan 22 13:24:43 np0005592561.novalocal kernel: GPT:229375 != 2097151 Jan 22 13:24:43 np0005592561.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Jan 22 13:24:43 np0005592561.novalocal kernel: GPT:229375 != 2097151 Jan 22 13:24:43 np0005592561.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Jan 22 13:24:43 np0005592561.novalocal kernel: sda: sda1 sda15 Jan 22 13:24:43 np0005592561.novalocal sudo[93126]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Jan 22 13:24:43 np0005592561.novalocal systemd[1]: Started Session c45 of User root. Jan 22 13:24:43 np0005592561.novalocal sudo[93126]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8969d84b-9298-4275-9410-2d9a817183fe Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:44 np0005592561.novalocal sudo[93126]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:44 np0005592561.novalocal systemd[1]: session-c45.scope: Deactivated successfully. Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 8f8f71b4-7344-4db2-a57a-92aac355d9af Jan 22 13:24:44 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l d1e12f62-a1c5-432e-9519-dfb667282886 Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l be73d309-14bc-4fe8-afad-e41913008e4b Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l a1bce25c-bffb-41d5-bf6e-59283d8c8dfb Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 314b1250-f63b-414a-9fe7-e32b64bab784 Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l e5387212-7f06-4738-9f42-2ffde4d24c0d Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 0e82f4fa-fb57-454c-8117-7df35decacc2 Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 8dffde2a-0c90-4ff4-b3de-f4de3142bbc6 Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l bd86b9c7-0a65-4f73-baf1-64c4a0ff4dae Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 1fc546ee-0db2-44b6-86af-1fd8faa6ecf2 Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l ba06e2ad-bf79-422f-9dea-c6e3f5afd7b3 Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 93b916ea-5ced-4676-b890-30d8afc7ab03 Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 086414e0-0c18-4e21-a9db-ed22889cead7 Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 69348e8c-ac58-4dbf-b1da-ca0d398c53ac Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 56bc0905-fbc1-4d2a-9e87-203245a2f38f Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:44 np0005592561.novalocal kernel: scsi 2:0:0:0: alua: Detached Jan 22 13:24:44 np0005592561.novalocal iscsid[74382]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00, portal: ::1,3260] through [iface: default] is shutdown. Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l b6e42bcd-bdd8-4e5e-93c5-b44b7926ec8d Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00. For complete SELinux messages run: sealert -l 93f3cfab-88ca-42e7-8982-03142fb4878b Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l d1efd099-cfa8-4680-8c6e-da931455901e Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 92c321b3-1bbd-41ce-899f-137535eeed36 Jan 22 13:24:44 np0005592561.novalocal sudo[93169]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00 iqn.1994-05.com.redhat:8e572f8880e5 Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:44 np0005592561.novalocal systemd[1]: Started Session c46 of User root. Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00. For complete SELinux messages run: sealert -l 0dd3f63c-36d2-47c9-9cd0-9f790624ca12 Jan 22 13:24:44 np0005592561.novalocal sudo[93169]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:44 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:45 np0005592561.novalocal sudo[93169]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:45 np0005592561.novalocal systemd[1]: session-c46.scope: Deactivated successfully. Jan 22 13:24:45 np0005592561.novalocal sudo[93175]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 13:24:45 np0005592561.novalocal systemd[1]: Started Session c47 of User root. Jan 22 13:24:45 np0005592561.novalocal sudo[93175]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:45 np0005592561.novalocal sudo[93175]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:45 np0005592561.novalocal systemd[1]: session-c47.scope: Deactivated successfully. Jan 22 13:24:45 np0005592561.novalocal sudo[93180]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Jan 22 13:24:45 np0005592561.novalocal systemd[1]: Started Session c48 of User root. Jan 22 13:24:45 np0005592561.novalocal sudo[93180]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:46 np0005592561.novalocal sudo[93180]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:46 np0005592561.novalocal systemd[1]: session-c48.scope: Deactivated successfully. Jan 22 13:24:46 np0005592561.novalocal sudo[93185]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-68b2d7d1-1fae-4012-810a-ab8657e76b00 Jan 22 13:24:46 np0005592561.novalocal systemd[1]: Started Session c49 of User root. Jan 22 13:24:46 np0005592561.novalocal sudo[93185]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:46 np0005592561.novalocal sudo[93185]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:46 np0005592561.novalocal systemd[1]: session-c49.scope: Deactivated successfully. Jan 22 13:24:46 np0005592561.novalocal sudo[93190]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 13:24:46 np0005592561.novalocal systemd[1]: Started Session c50 of User root. Jan 22 13:24:46 np0005592561.novalocal sudo[93190]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:47 np0005592561.novalocal sudo[93190]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:47 np0005592561.novalocal systemd[1]: session-c50.scope: Deactivated successfully. Jan 22 13:24:52 np0005592561.novalocal sudo[93207]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190 cinder-volumes/cinder-volumes-pool Jan 22 13:24:52 np0005592561.novalocal systemd[1]: Started Session c51 of User root. Jan 22 13:24:52 np0005592561.novalocal sudo[93207]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:53 np0005592561.novalocal lvm[93218]: PV /dev/loop2 online, VG cinder-volumes is complete. Jan 22 13:24:53 np0005592561.novalocal lvm[93218]: VG cinder-volumes finished Jan 22 13:24:53 np0005592561.novalocal sudo[93207]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:53 np0005592561.novalocal systemd[1]: session-c51.scope: Deactivated successfully. Jan 22 13:24:54 np0005592561.novalocal sudo[93221]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpq2ygehki/privsep.sock Jan 22 13:24:54 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l c081d333-057e-472a-b8e6-6775b74cd718 Jan 22 13:24:54 np0005592561.novalocal systemd[1]: Started Session c52 of User root. Jan 22 13:24:54 np0005592561.novalocal sudo[93221]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Jan 22 13:24:54 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 13:24:54 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l b4e628df-7b82-4a93-94c3-9fc840e43b14 Jan 22 13:24:54 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 13:24:54 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 345a4ea3-b5d7-4ffa-ba5d-5fe2453a729c Jan 22 13:24:54 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 13:24:54 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l bc90bceb-9ab2-409e-8c46-5faba9bafa0a Jan 22 13:24:54 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 13:24:54 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l a01854f3-15a0-4b83-bfb4-7832aea097b2 Jan 22 13:24:54 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 13:24:54 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 2664e56f-45be-4576-8724-1d808bad2ac5 Jan 22 13:24:54 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 13:24:54 np0005592561.novalocal sudo[93221]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 652b1338-ff38-4b50-9213-55dfdeb5fc02 Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 31ac6e98-0195-4a56-ae87-82476a48596b Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8969d84b-9298-4275-9410-2d9a817183fe Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 69348e8c-ac58-4dbf-b1da-ca0d398c53ac Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 56bc0905-fbc1-4d2a-9e87-203245a2f38f Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l b6e42bcd-bdd8-4e5e-93c5-b44b7926ec8d Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 2d896d0c-12b1-4a15-9e0d-1e07d85b9b9f Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 047dcdc9-92f5-4f00-b29a-0fddec0cf3bb Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l cab872e9-e33f-4dc1-9e97-5f5983074988 Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 4c8529df-37a6-4a87-9902-c82810c19396 Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-PGCWAs. For complete SELinux messages run: sealert -l b56c1d74-c457-4517-9ce6-314030653e60 Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-PGCWAs. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-PGCWAs file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l dae22ed0-801b-4c1a-a683-4273f129dc06 Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 6f70fe83-17ea-444c-a5e8-096e1e925eb5 Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 25bd05e9-aa58-4f2e-bab9-0ef72f267816 Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal sudo[93243]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190 Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 59f64e7f-8f6c-4800-971a-012c6ba348ea Jan 22 13:24:55 np0005592561.novalocal systemd[1]: Started Session c53 of User root. Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 26e5629f-c68d-4e14-8596-a5e4c631ba4f Jan 22 13:24:55 np0005592561.novalocal sudo[93243]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:55 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:24:55 np0005592561.novalocal sudo[93243]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:55 np0005592561.novalocal systemd[1]: session-c53.scope: Deactivated successfully. Jan 22 13:24:55 np0005592561.novalocal sudo[93247]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190 iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190 xHP78Ls8jStRNejyqRDL yc7nXRU5pkMSLvFZ False -p3260 -a::1 Jan 22 13:24:55 np0005592561.novalocal systemd[1]: Started Session c54 of User root. Jan 22 13:24:55 np0005592561.novalocal sudo[93247]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:56 np0005592561.novalocal sudo[93247]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:56 np0005592561.novalocal systemd[1]: session-c54.scope: Deactivated successfully. Jan 22 13:24:56 np0005592561.novalocal sudo[93253]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Jan 22 13:24:56 np0005592561.novalocal systemd[1]: Started Session c55 of User root. Jan 22 13:24:56 np0005592561.novalocal sudo[93253]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:57 np0005592561.novalocal sudo[93253]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:57 np0005592561.novalocal systemd[1]: session-c55.scope: Deactivated successfully. Jan 22 13:24:57 np0005592561.novalocal sudo[93260]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 13:24:57 np0005592561.novalocal systemd[1]: Started Session c56 of User root. Jan 22 13:24:57 np0005592561.novalocal sudo[93260]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:57 np0005592561.novalocal sudo[93260]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:57 np0005592561.novalocal systemd[1]: session-c56.scope: Deactivated successfully. Jan 22 13:24:57 np0005592561.novalocal sudo[93265]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190 xHP78Ls8jStRNejyqRDL yc7nXRU5pkMSLvFZ iqn.1994-05.com.redhat:8e572f8880e5 Jan 22 13:24:57 np0005592561.novalocal systemd[1]: Started Session c57 of User root. Jan 22 13:24:57 np0005592561.novalocal sudo[93265]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:58 np0005592561.novalocal sudo[93265]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:58 np0005592561.novalocal systemd[1]: session-c57.scope: Deactivated successfully. Jan 22 13:24:58 np0005592561.novalocal sudo[93270]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 13:24:58 np0005592561.novalocal systemd[1]: Started Session c58 of User root. Jan 22 13:24:58 np0005592561.novalocal sudo[93270]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:24:58 np0005592561.novalocal sudo[93270]: pam_unix(sudo:session): session closed for user root Jan 22 13:24:58 np0005592561.novalocal systemd[1]: session-c58.scope: Deactivated successfully. Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l ba06e2ad-bf79-422f-9dea-c6e3f5afd7b3 Jan 22 13:24:59 np0005592561.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Jan 22 13:24:59 np0005592561.novalocal iscsid[74382]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190, portal: ::1,3260] through [iface: default] is operational now Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 13:24:59 np0005592561.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Jan 22 13:24:59 np0005592561.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Jan 22 13:24:59 np0005592561.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405db17c432737d471f9008d8e11 port group 0 rel port 1 Jan 22 13:24:59 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Jan 22 13:24:59 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Jan 22 13:24:59 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Jan 22 13:24:59 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Jan 22 13:24:59 np0005592561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Jan 22 13:24:59 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Jan 22 13:24:59 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Jan 22 13:24:59 np0005592561.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 93b916ea-5ced-4676-b890-30d8afc7ab03 Jan 22 13:24:59 np0005592561.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Jan 22 13:24:59 np0005592561.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Jan 22 13:24:59 np0005592561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Jan 22 13:24:59 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 086414e0-0c18-4e21-a9db-ed22889cead7 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l d1e12f62-a1c5-432e-9519-dfb667282886 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l a1bce25c-bffb-41d5-bf6e-59283d8c8dfb Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 314b1250-f63b-414a-9fe7-e32b64bab784 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l e5387212-7f06-4738-9f42-2ffde4d24c0d Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 0e82f4fa-fb57-454c-8117-7df35decacc2 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 8dffde2a-0c90-4ff4-b3de-f4de3142bbc6 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l be73d309-14bc-4fe8-afad-e41913008e4b Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l bd86b9c7-0a65-4f73-baf1-64c4a0ff4dae Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 1fc546ee-0db2-44b6-86af-1fd8faa6ecf2 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l a1bce25c-bffb-41d5-bf6e-59283d8c8dfb Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 314b1250-f63b-414a-9fe7-e32b64bab784 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 8dffde2a-0c90-4ff4-b3de-f4de3142bbc6 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 93f3cfab-88ca-42e7-8982-03142fb4878b Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 6fb043dd-bd84-4593-ac85-6ab705efe183 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l c870ba3c-32b2-4114-aa16-caf5f42fd7b6 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 5572da91-2bed-4859-b5b5-909d4505b794 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190/::1,3260. For complete SELinux messages run: sealert -l 69825526-c17a-4bc5-ac37-6c2d411dfec5 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190/::1,3260. For complete SELinux messages run: sealert -l a93becb2-2102-4c87-a4c0-037aa40073f5 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 1fc546ee-0db2-44b6-86af-1fd8faa6ecf2 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l c69167d3-5bba-4d5d-8b18-3b3b39daee86 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l d1e12f62-a1c5-432e-9519-dfb667282886 Jan 22 13:24:59 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:00 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 8f54c3bc-f105-4555-9f91-34d4f10c2b93 Jan 22 13:25:00 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Jan 22 13:25:00 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 2ca0495b-0729-4745-9e8f-bfe3aaa20995 Jan 22 13:25:00 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Jan 22 13:25:00 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 72506c37-0fa1-4ccb-803d-1293746b9070 Jan 22 13:25:00 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Jan 22 13:25:01 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:25:01 np0005592561.novalocal sudo[93325]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8969d84b-9298-4275-9410-2d9a817183fe Jan 22 13:25:01 np0005592561.novalocal systemd[1]: Started Session c59 of User root. Jan 22 13:25:01 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:25:01 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:25:01 np0005592561.novalocal sudo[93325]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l b4e628df-7b82-4a93-94c3-9fc840e43b14 Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 345a4ea3-b5d7-4ffa-ba5d-5fe2453a729c Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l bc90bceb-9ab2-409e-8c46-5faba9bafa0a Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l a01854f3-15a0-4b83-bfb4-7832aea097b2 Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 13:25:01 np0005592561.novalocal sudo[93325]: pam_unix(sudo:session): session closed for user root Jan 22 13:25:01 np0005592561.novalocal systemd[1]: session-c59.scope: Deactivated successfully. Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 8f8f71b4-7344-4db2-a57a-92aac355d9af Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 7e3720a3-7e70-478b-8a92-e5a9d6ee817e Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 56bc0905-fbc1-4d2a-9e87-203245a2f38f Jan 22 13:25:01 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:25:02 np0005592561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Jan 22 13:25:02 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l b6e42bcd-bdd8-4e5e-93c5-b44b7926ec8d Jan 22 13:25:02 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:25:02 np0005592561.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jan 22 13:25:02 np0005592561.novalocal kernel: GPT:229375 != 2097151 Jan 22 13:25:02 np0005592561.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Jan 22 13:25:02 np0005592561.novalocal kernel: GPT:229375 != 2097151 Jan 22 13:25:02 np0005592561.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Jan 22 13:25:02 np0005592561.novalocal kernel: sda: sda1 sda15 Jan 22 13:25:02 np0005592561.novalocal sudo[93333]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Jan 22 13:25:02 np0005592561.novalocal systemd[1]: Started Session c60 of User root. Jan 22 13:25:02 np0005592561.novalocal sudo[93333]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l b4e628df-7b82-4a93-94c3-9fc840e43b14 Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 345a4ea3-b5d7-4ffa-ba5d-5fe2453a729c Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l bc90bceb-9ab2-409e-8c46-5faba9bafa0a Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l a01854f3-15a0-4b83-bfb4-7832aea097b2 Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 2664e56f-45be-4576-8724-1d808bad2ac5 Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 13:25:03 np0005592561.novalocal sudo[93333]: pam_unix(sudo:session): session closed for user root Jan 22 13:25:03 np0005592561.novalocal systemd[1]: session-c60.scope: Deactivated successfully. Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l c081d333-057e-472a-b8e6-6775b74cd718 Jan 22 13:25:03 np0005592561.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l be73d309-14bc-4fe8-afad-e41913008e4b Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190/::1,3260. For complete SELinux messages run: sealert -l a93becb2-2102-4c87-a4c0-037aa40073f5 Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l a1bce25c-bffb-41d5-bf6e-59283d8c8dfb Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 314b1250-f63b-414a-9fe7-e32b64bab784 Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l e5387212-7f06-4738-9f42-2ffde4d24c0d Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 0e82f4fa-fb57-454c-8117-7df35decacc2 Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 8dffde2a-0c90-4ff4-b3de-f4de3142bbc6 Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l c69167d3-5bba-4d5d-8b18-3b3b39daee86 Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190/::1,3260. For complete SELinux messages run: sealert -l a7fc2c95-f118-4239-9222-17b7d512c545 Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l bd86b9c7-0a65-4f73-baf1-64c4a0ff4dae Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 1fc546ee-0db2-44b6-86af-1fd8faa6ecf2 Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l ba06e2ad-bf79-422f-9dea-c6e3f5afd7b3 Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 93b916ea-5ced-4676-b890-30d8afc7ab03 Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 086414e0-0c18-4e21-a9db-ed22889cead7 Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 69348e8c-ac58-4dbf-b1da-ca0d398c53ac Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 13:25:03 np0005592561.novalocal kernel: scsi 2:0:0:0: alua: Detached Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 72506c37-0fa1-4ccb-803d-1293746b9070 Jan 22 13:25:03 np0005592561.novalocal iscsid[74382]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190, portal: ::1,3260] through [iface: default] is shutdown. Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l d1e12f62-a1c5-432e-9519-dfb667282886 Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:03 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l b5c7af6a-e0c8-4c8f-a365-f4ae8bf95eb7 Jan 22 13:25:03 np0005592561.novalocal sudo[93377]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190 iqn.1994-05.com.redhat:8e572f8880e5 Jan 22 13:25:04 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:04 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190. For complete SELinux messages run: sealert -l 93f3cfab-88ca-42e7-8982-03142fb4878b Jan 22 13:25:04 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:04 np0005592561.novalocal systemd[1]: Started Session c61 of User root. Jan 22 13:25:04 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l d1efd099-cfa8-4680-8c6e-da931455901e Jan 22 13:25:04 np0005592561.novalocal sudo[93377]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:25:04 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:04 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 92c321b3-1bbd-41ce-899f-137535eeed36 Jan 22 13:25:04 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:04 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190. For complete SELinux messages run: sealert -l 0dd3f63c-36d2-47c9-9cd0-9f790624ca12 Jan 22 13:25:04 np0005592561.novalocal setroubleshoot[92892]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 13:25:04 np0005592561.novalocal sudo[93377]: pam_unix(sudo:session): session closed for user root Jan 22 13:25:04 np0005592561.novalocal systemd[1]: session-c61.scope: Deactivated successfully. Jan 22 13:25:04 np0005592561.novalocal sudo[93384]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 13:25:04 np0005592561.novalocal systemd[1]: Started Session c62 of User root. Jan 22 13:25:04 np0005592561.novalocal sudo[93384]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:25:05 np0005592561.novalocal sudo[93384]: pam_unix(sudo:session): session closed for user root Jan 22 13:25:05 np0005592561.novalocal systemd[1]: session-c62.scope: Deactivated successfully. Jan 22 13:25:05 np0005592561.novalocal sudo[93389]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Jan 22 13:25:05 np0005592561.novalocal systemd[1]: Started Session c63 of User root. Jan 22 13:25:05 np0005592561.novalocal sudo[93389]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:25:05 np0005592561.novalocal sudo[93389]: pam_unix(sudo:session): session closed for user root Jan 22 13:25:05 np0005592561.novalocal systemd[1]: session-c63.scope: Deactivated successfully. Jan 22 13:25:05 np0005592561.novalocal sudo[93394]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-54e20a8d-b5cf-4d6f-8ff9-3408255a9190 Jan 22 13:25:05 np0005592561.novalocal systemd[1]: Started Session c64 of User root. Jan 22 13:25:05 np0005592561.novalocal sudo[93394]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:25:06 np0005592561.novalocal sudo[93394]: pam_unix(sudo:session): session closed for user root Jan 22 13:25:06 np0005592561.novalocal systemd[1]: session-c64.scope: Deactivated successfully. Jan 22 13:25:06 np0005592561.novalocal sudo[93399]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 13:25:06 np0005592561.novalocal systemd[1]: Started Session c65 of User root. Jan 22 13:25:06 np0005592561.novalocal sudo[93399]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:25:06 np0005592561.novalocal sudo[93399]: pam_unix(sudo:session): session closed for user root Jan 22 13:25:06 np0005592561.novalocal systemd[1]: session-c65.scope: Deactivated successfully. Jan 22 13:25:14 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully. Jan 22 13:25:14 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Consumed 1.435s CPU time. Jan 22 13:25:14 np0005592561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 13:25:14 np0005592561.novalocal systemd[1]: setroubleshootd.service: Consumed 7.075s CPU time. Jan 22 13:25:20 np0005592561.novalocal sudo[93463]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:25:20 np0005592561.novalocal systemd[1]: Started Session c66 of User root. Jan 22 13:25:20 np0005592561.novalocal sudo[93463]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:25:20 np0005592561.novalocal sudo[93463]: pam_unix(sudo:session): session closed for user root Jan 22 13:25:20 np0005592561.novalocal systemd[1]: session-c66.scope: Deactivated successfully. Jan 22 13:25:20 np0005592561.novalocal sudo[93467]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:25:20 np0005592561.novalocal systemd[1]: Started Session c67 of User root. Jan 22 13:25:20 np0005592561.novalocal sudo[93467]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:25:20 np0005592561.novalocal sudo[93467]: pam_unix(sudo:session): session closed for user root Jan 22 13:25:20 np0005592561.novalocal systemd[1]: session-c67.scope: Deactivated successfully. Jan 22 13:25:20 np0005592561.novalocal sudo[93472]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 13:25:20 np0005592561.novalocal systemd[1]: Started Session c68 of User root. Jan 22 13:25:20 np0005592561.novalocal sudo[93472]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:25:21 np0005592561.novalocal sudo[93472]: pam_unix(sudo:session): session closed for user root Jan 22 13:25:21 np0005592561.novalocal systemd[1]: session-c68.scope: Deactivated successfully. Jan 22 13:25:21 np0005592561.novalocal sudo[93478]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:25:21 np0005592561.novalocal systemd[1]: Started Session c69 of User root. Jan 22 13:25:21 np0005592561.novalocal sudo[93478]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:25:21 np0005592561.novalocal sudo[93478]: pam_unix(sudo:session): session closed for user root Jan 22 13:25:21 np0005592561.novalocal systemd[1]: session-c69.scope: Deactivated successfully. Jan 22 13:25:32 np0005592561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 13:25:32 np0005592561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 13:25:33 np0005592561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service. Jan 22 13:25:34 np0005592561.novalocal setroubleshoot[93501]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 37f7076b-0a9e-497b-b827-52c468bedf80 Jan 22 13:25:34 np0005592561.novalocal setroubleshoot[93501]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:25:34 np0005592561.novalocal setroubleshoot[93501]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 1707cf58-3090-41d2-a804-a18c5965ebb3 Jan 22 13:25:34 np0005592561.novalocal setroubleshoot[93501]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:25:34 np0005592561.novalocal setroubleshoot[93501]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 9397c2dd-6cb4-428e-b310-fcf72fc2c49a Jan 22 13:25:34 np0005592561.novalocal setroubleshoot[93501]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:25:34 np0005592561.novalocal setroubleshoot[93501]: failed to retrieve rpm info for path '/var/lib/neutron/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f': Jan 22 13:25:34 np0005592561.novalocal setroubleshoot[93501]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/neutron/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. For complete SELinux messages run: sealert -l 6be705ed-bd1e-435a-a0c2-d8f475d7f53f Jan 22 13:25:34 np0005592561.novalocal setroubleshoot[93501]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/neutron/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the 6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:25:34 np0005592561.novalocal setroubleshoot[93501]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. For complete SELinux messages run: sealert -l 131aa98f-d2fd-4b5e-b45b-3c3113429fbb Jan 22 13:25:34 np0005592561.novalocal setroubleshoot[93501]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:25:34 np0005592561.novalocal setroubleshoot[93501]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. For complete SELinux messages run: sealert -l e8f15cee-d18f-4192-a4ab-ab57d084758f Jan 22 13:25:34 np0005592561.novalocal setroubleshoot[93501]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:25:37 np0005592561.novalocal setroubleshoot[93501]: SELinux is preventing /usr/sbin/httpd from read access on the file 6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. For complete SELinux messages run: sealert -l e7520cb1-800f-4dac-ad1c-fa2798800d4f Jan 22 13:25:37 np0005592561.novalocal setroubleshoot[93501]: SELinux is preventing /usr/sbin/httpd from read access on the file 6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:25:47 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Deactivated successfully. Jan 22 13:25:47 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Consumed 1.282s CPU time. Jan 22 13:25:47 np0005592561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 13:25:47 np0005592561.novalocal systemd[1]: setroubleshootd.service: Consumed 1.462s CPU time. Jan 22 13:26:07 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:26:07 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:26:07 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:26:20 np0005592561.novalocal sudo[93657]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:26:20 np0005592561.novalocal systemd[1]: Started Session c70 of User root. Jan 22 13:26:20 np0005592561.novalocal sudo[93657]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:26:20 np0005592561.novalocal sudo[93657]: pam_unix(sudo:session): session closed for user root Jan 22 13:26:20 np0005592561.novalocal systemd[1]: session-c70.scope: Deactivated successfully. Jan 22 13:26:20 np0005592561.novalocal sudo[93661]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:26:20 np0005592561.novalocal systemd[1]: Started Session c71 of User root. Jan 22 13:26:20 np0005592561.novalocal sudo[93661]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:26:20 np0005592561.novalocal sudo[93661]: pam_unix(sudo:session): session closed for user root Jan 22 13:26:20 np0005592561.novalocal systemd[1]: session-c71.scope: Deactivated successfully. Jan 22 13:26:20 np0005592561.novalocal sudo[93665]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 13:26:20 np0005592561.novalocal systemd[1]: Started Session c72 of User root. Jan 22 13:26:20 np0005592561.novalocal sudo[93665]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:26:21 np0005592561.novalocal sudo[93665]: pam_unix(sudo:session): session closed for user root Jan 22 13:26:21 np0005592561.novalocal systemd[1]: session-c72.scope: Deactivated successfully. Jan 22 13:26:21 np0005592561.novalocal sudo[93670]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:26:21 np0005592561.novalocal systemd[1]: Started Session c73 of User root. Jan 22 13:26:21 np0005592561.novalocal sudo[93670]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:26:21 np0005592561.novalocal sudo[93670]: pam_unix(sudo:session): session closed for user root Jan 22 13:26:21 np0005592561.novalocal systemd[1]: session-c73.scope: Deactivated successfully. Jan 22 13:26:43 np0005592561.novalocal systemd[89136]: Created slice User Background Tasks Slice. Jan 22 13:26:43 np0005592561.novalocal systemd[89136]: Starting Cleanup of User's Temporary Files and Directories... Jan 22 13:26:43 np0005592561.novalocal systemd[89136]: Finished Cleanup of User's Temporary Files and Directories. Jan 22 13:27:08 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:27:08 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:27:08 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:27:20 np0005592561.novalocal sudo[93823]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:27:20 np0005592561.novalocal systemd[1]: Started Session c74 of User root. Jan 22 13:27:20 np0005592561.novalocal sudo[93823]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:27:20 np0005592561.novalocal sudo[93823]: pam_unix(sudo:session): session closed for user root Jan 22 13:27:20 np0005592561.novalocal systemd[1]: session-c74.scope: Deactivated successfully. Jan 22 13:27:20 np0005592561.novalocal sudo[93827]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:27:20 np0005592561.novalocal systemd[1]: Started Session c75 of User root. Jan 22 13:27:20 np0005592561.novalocal sudo[93827]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:27:20 np0005592561.novalocal sudo[93827]: pam_unix(sudo:session): session closed for user root Jan 22 13:27:20 np0005592561.novalocal systemd[1]: session-c75.scope: Deactivated successfully. Jan 22 13:27:20 np0005592561.novalocal sudo[93832]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 13:27:20 np0005592561.novalocal systemd[1]: Started Session c76 of User root. Jan 22 13:27:20 np0005592561.novalocal sudo[93832]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:27:21 np0005592561.novalocal sudo[93832]: pam_unix(sudo:session): session closed for user root Jan 22 13:27:21 np0005592561.novalocal systemd[1]: session-c76.scope: Deactivated successfully. Jan 22 13:27:21 np0005592561.novalocal sudo[93838]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:27:21 np0005592561.novalocal systemd[1]: Started Session c77 of User root. Jan 22 13:27:21 np0005592561.novalocal sudo[93838]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:27:21 np0005592561.novalocal sudo[93838]: pam_unix(sudo:session): session closed for user root Jan 22 13:27:21 np0005592561.novalocal systemd[1]: session-c77.scope: Deactivated successfully. Jan 22 13:27:32 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:27:32 np0005592561.novalocal systemd-rc-local-generator[93885]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:27:32 np0005592561.novalocal systemd-sysv-generator[93889]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:27:32 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:27:33 np0005592561.novalocal systemd[1]: Starting OpenStack Nova Conductor Server... Jan 22 13:27:34 np0005592561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 13:27:35 np0005592561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 13:27:35 np0005592561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service. Jan 22 13:27:36 np0005592561.novalocal systemd[1]: Started OpenStack Nova Conductor Server. Jan 22 13:27:36 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:27:36 np0005592561.novalocal systemd-sysv-generator[93946]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:27:36 np0005592561.novalocal systemd-rc-local-generator[93942]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:27:36 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:27:36 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:27:37 np0005592561.novalocal systemd-sysv-generator[93975]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:27:37 np0005592561.novalocal systemd-rc-local-generator[93972]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l d97ba018-a048-4737-bf42-06f6728085f0 Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:37 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 72cb19a1-2839-45d2-9674-9ae7e6a48751 Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 126eb24d-bdf7-40a8-97c5-38b6d6b494c3 Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l bb3aaffb-5a49-4bad-a6aa-cc37b1701f60 Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 2cb12dad-3f2f-467a-a5c2-71b4d038e2e2 Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l aa6b4a68-7c54-49ab-b320-fbf6c97a5ba0 Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 8532fa66-2fbd-4da3-97f5-99f5fcef0138 Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l bcee409d-efa3-4997-a45a-d105b8be0758 Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 4678ec79-d720-436d-84e4-b45900a11451 Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l fd5e2ee9-a5e7-4b38-993b-c61f5d66e2fd Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l a1ab60f5-44cd-4563-94b3-5662d6f80dc2 Jan 22 13:27:37 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:27:37 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:37 np0005592561.novalocal systemd-rc-local-generator[94018]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:27:37 np0005592561.novalocal systemd-sysv-generator[94022]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:27:37 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:27:38 np0005592561.novalocal systemd[1]: Starting OpenStack Nova Compute Server... Jan 22 13:27:42 np0005592561.novalocal systemd[1]: Started OpenStack Nova Compute Server. Jan 22 13:27:42 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:27:42 np0005592561.novalocal systemd-rc-local-generator[94063]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:27:43 np0005592561.novalocal systemd-sysv-generator[94066]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:27:43 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:27:43 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:27:43 np0005592561.novalocal systemd-sysv-generator[94117]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:27:43 np0005592561.novalocal systemd-rc-local-generator[94114]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:27:43 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:27:43 np0005592561.novalocal systemd[1]: Starting libvirt QEMU daemon... Jan 22 13:27:43 np0005592561.novalocal systemd[1]: Started libvirt QEMU daemon. Jan 22 13:27:43 np0005592561.novalocal nova-compute[94028]: libvirt: error : internal error: could not initialize domain event timer Jan 22 13:27:43 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:27:44 np0005592561.novalocal systemd-sysv-generator[94177]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:27:44 np0005592561.novalocal systemd-rc-local-generator[94174]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:27:44 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:27:44 np0005592561.novalocal systemd[1]: Starting OpenStack Nova Scheduler Server... Jan 22 13:27:44 np0005592561.novalocal systemd[1]: Listening on libvirt nodedev daemon admin socket. Jan 22 13:27:44 np0005592561.novalocal systemd[1]: Listening on libvirt nodedev daemon read-only socket. Jan 22 13:27:44 np0005592561.novalocal systemd[1]: Starting libvirt nodedev daemon... Jan 22 13:27:44 np0005592561.novalocal systemd[1]: Started libvirt nodedev daemon. Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l d97ba018-a048-4737-bf42-06f6728085f0 Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 72cb19a1-2839-45d2-9674-9ae7e6a48751 Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 126eb24d-bdf7-40a8-97c5-38b6d6b494c3 Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l bb3aaffb-5a49-4bad-a6aa-cc37b1701f60 Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 2cb12dad-3f2f-467a-a5c2-71b4d038e2e2 Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l aa6b4a68-7c54-49ab-b320-fbf6c97a5ba0 Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 8532fa66-2fbd-4da3-97f5-99f5fcef0138 Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l bcee409d-efa3-4997-a45a-d105b8be0758 Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 4678ec79-d720-436d-84e4-b45900a11451 Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l fd5e2ee9-a5e7-4b38-993b-c61f5d66e2fd Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l a1ab60f5-44cd-4563-94b3-5662d6f80dc2 Jan 22 13:27:46 np0005592561.novalocal setroubleshoot[93898]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 13:27:46 np0005592561.novalocal systemd[1]: Started OpenStack Nova Scheduler Server. Jan 22 13:27:46 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:27:46 np0005592561.novalocal systemd-rc-local-generator[94257]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:27:46 np0005592561.novalocal systemd-sysv-generator[94260]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:27:46 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:27:47 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:27:47 np0005592561.novalocal systemd-rc-local-generator[94286]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:27:47 np0005592561.novalocal systemd-sysv-generator[94291]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:27:47 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:27:56 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Deactivated successfully. Jan 22 13:27:56 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Consumed 1.268s CPU time. Jan 22 13:27:56 np0005592561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 13:27:56 np0005592561.novalocal systemd[1]: setroubleshootd.service: Consumed 2.218s CPU time. Jan 22 13:28:08 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:28:08 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:28:08 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:28:20 np0005592561.novalocal sudo[94356]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:28:20 np0005592561.novalocal systemd[1]: Started Session c78 of User root. Jan 22 13:28:20 np0005592561.novalocal sudo[94356]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:28:20 np0005592561.novalocal sudo[94356]: pam_unix(sudo:session): session closed for user root Jan 22 13:28:20 np0005592561.novalocal systemd[1]: session-c78.scope: Deactivated successfully. Jan 22 13:28:20 np0005592561.novalocal sudo[94363]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:28:20 np0005592561.novalocal systemd[1]: Started Session c79 of User root. Jan 22 13:28:20 np0005592561.novalocal sudo[94363]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:28:20 np0005592561.novalocal sudo[94363]: pam_unix(sudo:session): session closed for user root Jan 22 13:28:20 np0005592561.novalocal systemd[1]: session-c79.scope: Deactivated successfully. Jan 22 13:28:20 np0005592561.novalocal sudo[94367]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 13:28:20 np0005592561.novalocal systemd[1]: Started Session c80 of User root. Jan 22 13:28:20 np0005592561.novalocal sudo[94367]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:28:21 np0005592561.novalocal sudo[94367]: pam_unix(sudo:session): session closed for user root Jan 22 13:28:21 np0005592561.novalocal systemd[1]: session-c80.scope: Deactivated successfully. Jan 22 13:28:21 np0005592561.novalocal sudo[94371]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:28:21 np0005592561.novalocal systemd[1]: Started Session c81 of User root. Jan 22 13:28:21 np0005592561.novalocal sudo[94371]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:28:21 np0005592561.novalocal sudo[94371]: pam_unix(sudo:session): session closed for user root Jan 22 13:28:21 np0005592561.novalocal systemd[1]: session-c81.scope: Deactivated successfully. Jan 22 13:28:22 np0005592561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 13:28:22 np0005592561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 13:28:23 np0005592561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service. Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 8d88f0bc-8380-4770-95ac-0fef13bd353f Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 19245ba4-38a3-4073-8cfa-3f9d37a92be3 Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). For complete SELinux messages run: sealert -l ca9d8be2-c636-4267-9292-c844d85cc8ba Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f': Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. For complete SELinux messages run: sealert -l 4a6edbc8-19a7-48fd-af6d-890de39e1b62 Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the 6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. For complete SELinux messages run: sealert -l 8f49e1c0-6a8d-42ef-806f-8ca9fcb309ef Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. For complete SELinux messages run: sealert -l 539a00de-500d-4fd0-9dfc-9c1bb19406a8 Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 0fad235b-116e-4f1f-af82-c9de3a073811 Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 526cf085-1207-4cc5-b92a-8f0336c8e69c Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 5ddf8d4b-8e11-46c8-81c2-776c5d5eb9b8 Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/sbin/httpd from read access on the file 6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. For complete SELinux messages run: sealert -l 51199394-f441-429e-bce3-9132b548f2a7 Jan 22 13:28:24 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/sbin/httpd from read access on the file 6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 6e38f25ed86713b9b4b245cde9487454440d59e861dacaf1ef3024b653839f3f file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:28:25 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 0fad235b-116e-4f1f-af82-c9de3a073811 Jan 22 13:28:25 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:28:25 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 526cf085-1207-4cc5-b92a-8f0336c8e69c Jan 22 13:28:25 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:28:26 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 5ddf8d4b-8e11-46c8-81c2-776c5d5eb9b8 Jan 22 13:28:26 np0005592561.novalocal setroubleshoot[94377]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 13:28:33 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:28:33 np0005592561.novalocal systemd-rc-local-generator[94438]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:28:33 np0005592561.novalocal systemd-sysv-generator[94445]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:28:33 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:28:34 np0005592561.novalocal systemd[1]: Started OpenStack Octavia Worker service. Jan 22 13:28:34 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:28:34 np0005592561.novalocal systemd-rc-local-generator[94476]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:28:34 np0005592561.novalocal systemd-sysv-generator[94479]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:28:34 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:28:34 np0005592561.novalocal systemd[1]: Reloading. Jan 22 13:28:34 np0005592561.novalocal systemd-sysv-generator[94513]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 13:28:34 np0005592561.novalocal systemd-rc-local-generator[94510]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 13:28:34 np0005592561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 13:28:36 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Deactivated successfully. Jan 22 13:28:36 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Consumed 1.142s CPU time. Jan 22 13:28:37 np0005592561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 13:28:37 np0005592561.novalocal systemd[1]: setroubleshootd.service: Consumed 1.734s CPU time. Jan 22 13:28:50 np0005592561.novalocal runuser[94692]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:28:51 np0005592561.novalocal runuser[94692]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:28:51 np0005592561.novalocal runuser[94745]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:28:52 np0005592561.novalocal runuser[94745]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:28:52 np0005592561.novalocal runuser[94799]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:28:52 np0005592561.novalocal runuser[94799]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:29:04 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:29:04 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:29:04 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:29:17 np0005592561.novalocal systemd[1]: Stopping Redis persistent key-value database... Jan 22 13:29:17 np0005592561.novalocal redis-shutdown[95227]: Warning: Using a password with '-a' or '-u' option on the command line interface may not be safe. Jan 22 13:29:17 np0005592561.novalocal systemd[1]: redis.service: Deactivated successfully. Jan 22 13:29:17 np0005592561.novalocal systemd[1]: Stopped Redis persistent key-value database. Jan 22 13:29:17 np0005592561.novalocal systemd[1]: redis.service: Consumed 1.334s CPU time, 9.6M memory peak. Jan 22 13:29:17 np0005592561.novalocal systemd[1]: Starting Redis persistent key-value database... Jan 22 13:29:17 np0005592561.novalocal systemd[1]: Started Redis persistent key-value database. Jan 22 13:29:18 np0005592561.novalocal systemd[1]: Stopping Redis Sentinel... Jan 22 13:29:18 np0005592561.novalocal redis-shutdown[95251]: Warning: Using a password with '-a' or '-u' option on the command line interface may not be safe. Jan 22 13:29:18 np0005592561.novalocal redis-shutdown[95251]: Could not connect to Redis at ::1:0: Connection refused Jan 22 13:29:18 np0005592561.novalocal systemd[1]: redis-sentinel.service: Control process exited, code=exited, status=1/FAILURE Jan 22 13:29:18 np0005592561.novalocal systemd[1]: redis-sentinel.service: Failed with result 'exit-code'. Jan 22 13:29:18 np0005592561.novalocal systemd[1]: Stopped Redis Sentinel. Jan 22 13:29:18 np0005592561.novalocal systemd[1]: redis-sentinel.service: Consumed 1.660s CPU time, 10.7M memory peak. Jan 22 13:29:18 np0005592561.novalocal systemd[1]: Starting Redis Sentinel... Jan 22 13:29:18 np0005592561.novalocal systemd[1]: Started Redis Sentinel. Jan 22 13:29:18 np0005592561.novalocal sudo[95266]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get connection . inactivity_probe Jan 22 13:29:18 np0005592561.novalocal sudo[95266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:29:18 np0005592561.novalocal sudo[95266]: pam_unix(sudo:session): session closed for user root Jan 22 13:29:18 np0005592561.novalocal sudo[95270]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get connection . inactivity_probe Jan 22 13:29:18 np0005592561.novalocal sudo[95270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:29:18 np0005592561.novalocal sudo[95270]: pam_unix(sudo:session): session closed for user root Jan 22 13:29:20 np0005592561.novalocal sudo[95277]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:29:20 np0005592561.novalocal systemd[1]: Started Session c82 of User root. Jan 22 13:29:20 np0005592561.novalocal sudo[95277]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:29:20 np0005592561.novalocal sudo[95277]: pam_unix(sudo:session): session closed for user root Jan 22 13:29:20 np0005592561.novalocal systemd[1]: session-c82.scope: Deactivated successfully. Jan 22 13:29:20 np0005592561.novalocal sudo[95281]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:29:20 np0005592561.novalocal systemd[1]: Started Session c83 of User root. Jan 22 13:29:20 np0005592561.novalocal sudo[95281]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:29:20 np0005592561.novalocal sudo[95281]: pam_unix(sudo:session): session closed for user root Jan 22 13:29:20 np0005592561.novalocal systemd[1]: session-c83.scope: Deactivated successfully. Jan 22 13:29:20 np0005592561.novalocal sudo[95285]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 13:29:20 np0005592561.novalocal systemd[1]: Started Session c84 of User root. Jan 22 13:29:20 np0005592561.novalocal sudo[95285]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:29:21 np0005592561.novalocal sudo[95285]: pam_unix(sudo:session): session closed for user root Jan 22 13:29:21 np0005592561.novalocal systemd[1]: session-c84.scope: Deactivated successfully. Jan 22 13:29:21 np0005592561.novalocal sudo[95289]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:29:21 np0005592561.novalocal systemd[1]: Started Session c85 of User root. Jan 22 13:29:21 np0005592561.novalocal sudo[95289]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:29:21 np0005592561.novalocal sudo[95289]: pam_unix(sudo:session): session closed for user root Jan 22 13:29:21 np0005592561.novalocal systemd[1]: session-c85.scope: Deactivated successfully. Jan 22 13:29:41 np0005592561.novalocal crontab[95351]: (root) LIST (root) Jan 22 13:29:41 np0005592561.novalocal crontab[95352]: (root) LIST (keystone) Jan 22 13:29:41 np0005592561.novalocal crontab[95353]: (root) LIST (cinder) Jan 22 13:29:41 np0005592561.novalocal crontab[95354]: (root) LIST (glance) Jan 22 13:29:42 np0005592561.novalocal crontab[95355]: (root) LIST (nova) Jan 22 13:29:42 np0005592561.novalocal crontab[95356]: (root) LIST (manila) Jan 22 13:29:45 np0005592561.novalocal runuser[95366]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:29:46 np0005592561.novalocal runuser[95366]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:29:46 np0005592561.novalocal runuser[95421]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:29:47 np0005592561.novalocal runuser[95421]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:29:47 np0005592561.novalocal runuser[95475]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:29:47 np0005592561.novalocal runuser[95475]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:29:48 np0005592561.novalocal runuser[95531]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:29:48 np0005592561.novalocal runuser[95531]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:29:48 np0005592561.novalocal runuser[95583]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:29:49 np0005592561.novalocal runuser[95583]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:29:49 np0005592561.novalocal runuser[95636]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:29:50 np0005592561.novalocal runuser[95636]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:29:50 np0005592561.novalocal runuser[95688]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:29:51 np0005592561.novalocal runuser[95688]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:29:51 np0005592561.novalocal runuser[95742]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:29:52 np0005592561.novalocal runuser[95742]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:29:52 np0005592561.novalocal runuser[95794]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:29:53 np0005592561.novalocal runuser[95794]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:29:53 np0005592561.novalocal runuser[95846]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:29:53 np0005592561.novalocal runuser[95846]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:29:54 np0005592561.novalocal runuser[95909]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:29:55 np0005592561.novalocal runuser[95909]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:29:55 np0005592561.novalocal runuser[95961]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:29:56 np0005592561.novalocal runuser[95961]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:29:56 np0005592561.novalocal runuser[96015]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:29:57 np0005592561.novalocal runuser[96015]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:29:57 np0005592561.novalocal runuser[96069]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:29:58 np0005592561.novalocal runuser[96069]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:29:59 np0005592561.novalocal runuser[96133]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:29:59 np0005592561.novalocal runuser[96133]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:30:00 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:30:00 np0005592561.novalocal runuser[96186]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:30:00 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:30:00 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:30:01 np0005592561.novalocal runuser[96186]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:30:01 np0005592561.novalocal systemd[1]: Created slice User Slice of UID 161. Jan 22 13:30:01 np0005592561.novalocal systemd[1]: Starting User Runtime Directory /run/user/161... Jan 22 13:30:01 np0005592561.novalocal systemd[1]: Created slice User Slice of UID 163. Jan 22 13:30:01 np0005592561.novalocal systemd[1]: Starting User Runtime Directory /run/user/163... Jan 22 13:30:01 np0005592561.novalocal systemd[1]: Finished User Runtime Directory /run/user/161. Jan 22 13:30:01 np0005592561.novalocal systemd[1]: Starting User Manager for UID 161... Jan 22 13:30:01 np0005592561.novalocal systemd[1]: Finished User Runtime Directory /run/user/163. Jan 22 13:30:01 np0005592561.novalocal systemd[1]: Starting User Manager for UID 163... Jan 22 13:30:01 np0005592561.novalocal systemd[96252]: pam_unix(systemd-user:session): session opened for user glance(uid=161) by glance(uid=0) Jan 22 13:30:01 np0005592561.novalocal systemd[96253]: pam_unix(systemd-user:session): session opened for user keystone(uid=163) by keystone(uid=0) Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Queued start job for default target Main User Target. Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Queued start job for default target Main User Target. Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Created slice User Application Slice. Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Created slice User Application Slice. Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Started Daily Cleanup of User's Temporary Directories. Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Reached target Paths. Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Reached target Timers. Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Started Daily Cleanup of User's Temporary Directories. Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Reached target Paths. Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Reached target Timers. Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Starting D-Bus User Message Bus Socket... Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Starting D-Bus User Message Bus Socket... Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Listening on PipeWire PulseAudio. Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Listening on PipeWire PulseAudio. Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Listening on PipeWire Multimedia System Sockets. Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Listening on PipeWire Multimedia System Sockets. Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Starting Create User's Volatile Files and Directories... Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Starting Create User's Volatile Files and Directories... Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Listening on D-Bus User Message Bus Socket. Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Reached target Sockets. Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Listening on D-Bus User Message Bus Socket. Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Reached target Sockets. Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Finished Create User's Volatile Files and Directories. Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Reached target Basic System. Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Reached target Main User Target. Jan 22 13:30:02 np0005592561.novalocal systemd[96252]: Startup finished in 235ms. Jan 22 13:30:02 np0005592561.novalocal systemd[1]: Started User Manager for UID 161. Jan 22 13:30:02 np0005592561.novalocal systemd[1]: Started Session 5 of User glance. Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Finished Create User's Volatile Files and Directories. Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Reached target Basic System. Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Reached target Main User Target. Jan 22 13:30:02 np0005592561.novalocal systemd[1]: Started User Manager for UID 163. Jan 22 13:30:02 np0005592561.novalocal systemd[96253]: Startup finished in 251ms. Jan 22 13:30:02 np0005592561.novalocal systemd[1]: Started Session 6 of User keystone. Jan 22 13:30:02 np0005592561.novalocal CROND[96276]: (glance) CMD (glance-cache-pruner) Jan 22 13:30:02 np0005592561.novalocal CROND[96277]: (keystone) CMD (keystone-manage fernet_rotate) Jan 22 13:30:02 np0005592561.novalocal CROND[96245]: (glance) CMDOUT (2026-01-22 13:30:02.803 96276 INFO glance.image_cache [-] Image cache loaded driver 'centralized_db'.) Jan 22 13:30:03 np0005592561.novalocal CROND[96245]: (glance) CMDOUT (2026-01-22 13:30:03.071 96276 DEBUG glance.image_cache [None req-72de0ffe-4040-4e48-b2a9-0ce7e1b53157 - - - - - -] Image cache has free space, skipping prune... prune /usr/lib/python3.9/site-packages/glance/image_cache/__init__.py:291) Jan 22 13:30:03 np0005592561.novalocal CROND[96245]: (glance) CMDEND (glance-cache-pruner) Jan 22 13:30:03 np0005592561.novalocal systemd[1]: session-5.scope: Deactivated successfully. Jan 22 13:30:03 np0005592561.novalocal systemd[1]: session-5.scope: Consumed 1.124s CPU time. Jan 22 13:30:03 np0005592561.novalocal virtqemud[94122]: libvirt version: 11.10.0, package: 2.el9 (builder@centos.org, 2025-12-18-15:09:54, ) Jan 22 13:30:03 np0005592561.novalocal virtqemud[94122]: hostname: np0005592561.novalocal Jan 22 13:30:03 np0005592561.novalocal virtqemud[94122]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Jan 22 13:30:03 np0005592561.novalocal virtqemud[94122]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Jan 22 13:30:04 np0005592561.novalocal runuser[96305]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:30:04 np0005592561.novalocal CROND[96246]: (keystone) CMDEND (keystone-manage fernet_rotate) Jan 22 13:30:04 np0005592561.novalocal systemd[1]: session-6.scope: Deactivated successfully. Jan 22 13:30:04 np0005592561.novalocal systemd[1]: session-6.scope: Consumed 2.036s CPU time. Jan 22 13:30:04 np0005592561.novalocal runuser[96305]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:30:04 np0005592561.novalocal runuser[96358]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:30:05 np0005592561.novalocal runuser[96358]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:30:06 np0005592561.novalocal runuser[96418]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:30:07 np0005592561.novalocal runuser[96418]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:30:07 np0005592561.novalocal runuser[96470]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 13:30:07 np0005592561.novalocal runuser[96470]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 13:30:13 np0005592561.novalocal systemd[1]: Stopping User Manager for UID 161... Jan 22 13:30:13 np0005592561.novalocal systemd[96252]: Activating special unit Exit the Session... Jan 22 13:30:13 np0005592561.novalocal systemd[96252]: Stopped target Main User Target. Jan 22 13:30:13 np0005592561.novalocal systemd[96252]: Stopped target Basic System. Jan 22 13:30:13 np0005592561.novalocal systemd[96252]: Stopped target Paths. Jan 22 13:30:13 np0005592561.novalocal systemd[96252]: Stopped target Sockets. Jan 22 13:30:13 np0005592561.novalocal systemd[96252]: Stopped target Timers. Jan 22 13:30:13 np0005592561.novalocal systemd[96252]: Stopped Daily Cleanup of User's Temporary Directories. Jan 22 13:30:13 np0005592561.novalocal systemd[96252]: Closed D-Bus User Message Bus Socket. Jan 22 13:30:13 np0005592561.novalocal systemd[96252]: Closed PipeWire PulseAudio. Jan 22 13:30:13 np0005592561.novalocal systemd[96252]: Closed PipeWire Multimedia System Sockets. Jan 22 13:30:13 np0005592561.novalocal systemd[96252]: Stopped Create User's Volatile Files and Directories. Jan 22 13:30:13 np0005592561.novalocal systemd[96252]: Removed slice User Application Slice. Jan 22 13:30:13 np0005592561.novalocal systemd[96252]: Reached target Shutdown. Jan 22 13:30:13 np0005592561.novalocal systemd[96252]: Finished Exit the Session. Jan 22 13:30:13 np0005592561.novalocal systemd[96252]: Reached target Exit the Session. Jan 22 13:30:13 np0005592561.novalocal systemd[1]: user@161.service: Deactivated successfully. Jan 22 13:30:13 np0005592561.novalocal systemd[1]: Stopped User Manager for UID 161. Jan 22 13:30:13 np0005592561.novalocal systemd[1]: Stopping User Runtime Directory /run/user/161... Jan 22 13:30:13 np0005592561.novalocal systemd[1]: run-user-161.mount: Deactivated successfully. Jan 22 13:30:13 np0005592561.novalocal systemd[1]: user-runtime-dir@161.service: Deactivated successfully. Jan 22 13:30:13 np0005592561.novalocal systemd[1]: Stopped User Runtime Directory /run/user/161. Jan 22 13:30:13 np0005592561.novalocal systemd[1]: Removed slice User Slice of UID 161. Jan 22 13:30:13 np0005592561.novalocal systemd[1]: user-161.slice: Consumed 1.429s CPU time. Jan 22 13:30:14 np0005592561.novalocal systemd[1]: Stopping User Manager for UID 163... Jan 22 13:30:14 np0005592561.novalocal systemd[96253]: Activating special unit Exit the Session... Jan 22 13:30:14 np0005592561.novalocal systemd[96253]: Stopped target Main User Target. Jan 22 13:30:14 np0005592561.novalocal systemd[96253]: Stopped target Basic System. Jan 22 13:30:14 np0005592561.novalocal systemd[96253]: Stopped target Paths. Jan 22 13:30:14 np0005592561.novalocal systemd[96253]: Stopped target Sockets. Jan 22 13:30:14 np0005592561.novalocal systemd[96253]: Stopped target Timers. Jan 22 13:30:14 np0005592561.novalocal systemd[96253]: Stopped Daily Cleanup of User's Temporary Directories. Jan 22 13:30:14 np0005592561.novalocal systemd[96253]: Closed D-Bus User Message Bus Socket. Jan 22 13:30:14 np0005592561.novalocal systemd[96253]: Closed PipeWire PulseAudio. Jan 22 13:30:14 np0005592561.novalocal systemd[96253]: Closed PipeWire Multimedia System Sockets. Jan 22 13:30:14 np0005592561.novalocal systemd[96253]: Stopped Create User's Volatile Files and Directories. Jan 22 13:30:14 np0005592561.novalocal systemd[96253]: Removed slice User Application Slice. Jan 22 13:30:14 np0005592561.novalocal systemd[96253]: Reached target Shutdown. Jan 22 13:30:14 np0005592561.novalocal systemd[96253]: Finished Exit the Session. Jan 22 13:30:14 np0005592561.novalocal systemd[96253]: Reached target Exit the Session. Jan 22 13:30:14 np0005592561.novalocal systemd[1]: user@163.service: Deactivated successfully. Jan 22 13:30:14 np0005592561.novalocal systemd[1]: Stopped User Manager for UID 163. Jan 22 13:30:14 np0005592561.novalocal systemd[1]: Stopping User Runtime Directory /run/user/163... Jan 22 13:30:14 np0005592561.novalocal systemd[1]: run-user-163.mount: Deactivated successfully. Jan 22 13:30:14 np0005592561.novalocal systemd[1]: user-runtime-dir@163.service: Deactivated successfully. Jan 22 13:30:14 np0005592561.novalocal systemd[1]: Stopped User Runtime Directory /run/user/163. Jan 22 13:30:14 np0005592561.novalocal systemd[1]: Removed slice User Slice of UID 163. Jan 22 13:30:14 np0005592561.novalocal systemd[1]: user-163.slice: Consumed 2.317s CPU time. Jan 22 13:30:20 np0005592561.novalocal sudo[96598]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:30:20 np0005592561.novalocal systemd[1]: Started Session c86 of User root. Jan 22 13:30:20 np0005592561.novalocal sudo[96598]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:30:20 np0005592561.novalocal sudo[96598]: pam_unix(sudo:session): session closed for user root Jan 22 13:30:20 np0005592561.novalocal systemd[1]: session-c86.scope: Deactivated successfully. Jan 22 13:30:20 np0005592561.novalocal sudo[96602]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:30:20 np0005592561.novalocal systemd[1]: Started Session c87 of User root. Jan 22 13:30:20 np0005592561.novalocal sudo[96602]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:30:20 np0005592561.novalocal sudo[96602]: pam_unix(sudo:session): session closed for user root Jan 22 13:30:20 np0005592561.novalocal systemd[1]: session-c87.scope: Deactivated successfully. Jan 22 13:30:20 np0005592561.novalocal sudo[96606]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 13:30:20 np0005592561.novalocal systemd[1]: Started Session c88 of User root. Jan 22 13:30:20 np0005592561.novalocal sudo[96606]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:30:21 np0005592561.novalocal sudo[96606]: pam_unix(sudo:session): session closed for user root Jan 22 13:30:21 np0005592561.novalocal systemd[1]: session-c88.scope: Deactivated successfully. Jan 22 13:30:21 np0005592561.novalocal sudo[96611]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:30:21 np0005592561.novalocal systemd[1]: Started Session c89 of User root. Jan 22 13:30:21 np0005592561.novalocal sudo[96611]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:30:21 np0005592561.novalocal sudo[96611]: pam_unix(sudo:session): session closed for user root Jan 22 13:30:21 np0005592561.novalocal systemd[1]: session-c89.scope: Deactivated successfully. Jan 22 13:31:08 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:31:08 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:31:08 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:31:20 np0005592561.novalocal sudo[96762]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:31:20 np0005592561.novalocal systemd[1]: Started Session c90 of User root. Jan 22 13:31:20 np0005592561.novalocal sudo[96762]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:31:20 np0005592561.novalocal sudo[96762]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:20 np0005592561.novalocal systemd[1]: session-c90.scope: Deactivated successfully. Jan 22 13:31:20 np0005592561.novalocal sudo[96766]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:31:20 np0005592561.novalocal systemd[1]: Started Session c91 of User root. Jan 22 13:31:20 np0005592561.novalocal sudo[96766]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:31:20 np0005592561.novalocal sudo[96766]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:20 np0005592561.novalocal systemd[1]: session-c91.scope: Deactivated successfully. Jan 22 13:31:20 np0005592561.novalocal sudo[96771]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 13:31:20 np0005592561.novalocal systemd[1]: Started Session c92 of User root. Jan 22 13:31:20 np0005592561.novalocal sudo[96771]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:31:21 np0005592561.novalocal sudo[96771]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:21 np0005592561.novalocal systemd[1]: session-c92.scope: Deactivated successfully. Jan 22 13:31:21 np0005592561.novalocal sudo[96777]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:31:21 np0005592561.novalocal systemd[1]: Started Session c93 of User root. Jan 22 13:31:21 np0005592561.novalocal sudo[96777]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:31:21 np0005592561.novalocal sudo[96777]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:21 np0005592561.novalocal systemd[1]: session-c93.scope: Deactivated successfully. Jan 22 13:31:56 np0005592561.novalocal sudo[54115]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:56 np0005592561.novalocal sudo[97431]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-iqfeunhdvwnfljxtruyiihnmdtuhebnj ; WORKSPACE=/var/log/weirdo-project /usr/bin/python3' Jan 22 13:31:56 np0005592561.novalocal sudo[97431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:31:56 np0005592561.novalocal python3[97433]: ansible-command Invoked with chdir=/tmp/puppet-openstack creates=/var/log/weirdo-project/logs _raw_params=./copy_logs.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None removes=None stdin=None Jan 22 13:31:56 np0005592561.novalocal sudo[97556]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ceph /var/log/weirdo-project/logs/etc/ Jan 22 13:31:56 np0005592561.novalocal sudo[97556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97556]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97559]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/cinder /var/log/weirdo-project/logs/etc/ Jan 22 13:31:57 np0005592561.novalocal sudo[97559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97559]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97562]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/cinder /var/log/weirdo-project/logs Jan 22 13:31:57 np0005592561.novalocal sudo[97562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97562]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97565]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/glance /var/log/weirdo-project/logs/etc/ Jan 22 13:31:57 np0005592561.novalocal sudo[97565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97565]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97568]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/glance /var/log/weirdo-project/logs Jan 22 13:31:57 np0005592561.novalocal sudo[97568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97568]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97571]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/horizon /var/log/weirdo-project/logs Jan 22 13:31:57 np0005592561.novalocal sudo[97571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97571]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97574]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/keystone /var/log/weirdo-project/logs/etc/ Jan 22 13:31:57 np0005592561.novalocal sudo[97574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97574]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97577]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/keystone /var/log/weirdo-project/logs Jan 22 13:31:57 np0005592561.novalocal sudo[97577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97577]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97580]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/manila /var/log/weirdo-project/logs/etc/ Jan 22 13:31:57 np0005592561.novalocal sudo[97580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97580]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97583]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/manila /var/log/weirdo-project/logs Jan 22 13:31:57 np0005592561.novalocal sudo[97583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97583]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97586]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/neutron /var/log/weirdo-project/logs/etc/ Jan 22 13:31:57 np0005592561.novalocal sudo[97586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97586]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97589]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/neutron /var/log/weirdo-project/logs Jan 22 13:31:57 np0005592561.novalocal sudo[97589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97589]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97592]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/nova /var/log/weirdo-project/logs/etc/ Jan 22 13:31:57 np0005592561.novalocal sudo[97592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97592]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97597]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/nova /var/log/weirdo-project/logs Jan 22 13:31:57 np0005592561.novalocal sudo[97597]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97597]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97600]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/octavia /var/log/weirdo-project/logs/etc/ Jan 22 13:31:57 np0005592561.novalocal sudo[97600]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97600]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97603]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/octavia /var/log/weirdo-project/logs Jan 22 13:31:57 np0005592561.novalocal sudo[97603]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97603]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97606]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ovn /var/log/weirdo-project/logs/etc/ Jan 22 13:31:57 np0005592561.novalocal sudo[97606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97606]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97609]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/ovn /var/log/weirdo-project/logs Jan 22 13:31:57 np0005592561.novalocal sudo[97609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97609]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97612]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/placement /var/log/weirdo-project/logs/etc/ Jan 22 13:31:57 np0005592561.novalocal sudo[97612]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97612]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97615]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/placement /var/log/weirdo-project/logs Jan 22 13:31:57 np0005592561.novalocal sudo[97615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97615]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97618]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/tempest /var/log/weirdo-project/logs/etc/ Jan 22 13:31:57 np0005592561.novalocal sudo[97618]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97618]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97621]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/puppet/puppet.conf /var/log/weirdo-project/logs/ Jan 22 13:31:57 np0005592561.novalocal sudo[97621]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97621]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97625]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/journalctl --no-pager Jan 22 13:31:57 np0005592561.novalocal sudo[97625]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97625]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97628]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rsyslog.d /var/log/weirdo-project/logs/etc/ Jan 22 13:31:57 np0005592561.novalocal sudo[97628]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97628]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:57 np0005592561.novalocal sudo[97631]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyslog.conf /var/log/weirdo-project/logs/etc/ Jan 22 13:31:57 np0005592561.novalocal sudo[97631]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:57 np0005592561.novalocal sudo[97631]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97634]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/network-scripts /var/log/weirdo-project/logs/etc/sysconfig/ Jan 22 13:31:58 np0005592561.novalocal sudo[97634]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97634]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97637]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rabbitmq /var/log/weirdo-project/logs/etc/ Jan 22 13:31:58 np0005592561.novalocal sudo[97637]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97637]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97640]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/rabbitmq /var/log/weirdo-project/logs Jan 22 13:31:58 np0005592561.novalocal sudo[97640]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97640]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97643]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/my.cnf /var/log/weirdo-project/logs/etc/ Jan 22 13:31:58 np0005592561.novalocal sudo[97643]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97643]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97646]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/my.cnf.d /var/log/weirdo-project/logs/etc/ Jan 22 13:31:58 np0005592561.novalocal sudo[97646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97646]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97649]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/mariadb /var/log/weirdo-project/logs/ Jan 22 13:31:58 np0005592561.novalocal sudo[97649]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97649]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97652]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/iscsi /var/log/weirdo-project/logs/etc/ Jan 22 13:31:58 np0005592561.novalocal sudo[97652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97652]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97655]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dstat.log /var/log/weirdo-project/logs/ Jan 22 13:31:58 np0005592561.novalocal sudo[97655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97655]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97658]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iostat.log /var/log/weirdo-project/logs/ Jan 22 13:31:58 np0005592561.novalocal sudo[97658]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97658]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97661]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iotop.log /var/log/weirdo-project/logs/ Jan 22 13:31:58 np0005592561.novalocal sudo[97661]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97661]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97664]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/libvirt /var/log/weirdo-project/logs/ Jan 22 13:31:58 np0005592561.novalocal sudo[97664]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97664]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97667]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/virsh net-list --all Jan 22 13:31:58 np0005592561.novalocal sudo[97667]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal virtqemud[94122]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Jan 22 13:31:58 np0005592561.novalocal sudo[97667]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97671]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/libvirt /var/log/weirdo-project/logs/etc/ Jan 22 13:31:58 np0005592561.novalocal sudo[97671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97671]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97674]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig Jan 22 13:31:58 np0005592561.novalocal sudo[97674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97674]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97677]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openvswitch /var/log/weirdo-project/logs/etc/ Jan 22 13:31:58 np0005592561.novalocal sudo[97677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97677]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97680]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/openvswitch /var/log/weirdo-project/logs/ Jan 22 13:31:58 np0005592561.novalocal sudo[97680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97680]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97684]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Jan 22 13:31:58 np0005592561.novalocal sudo[97684]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97684]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97687]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Jan 22 13:31:58 np0005592561.novalocal sudo[97687]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97687]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97690]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-ssl Jan 22 13:31:58 np0005592561.novalocal sudo[97690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97690]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97693]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Jan 22 13:31:58 np0005592561.novalocal sudo[97693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97693]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97696]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Jan 22 13:31:58 np0005592561.novalocal sudo[97696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97696]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:58 np0005592561.novalocal sudo[97699]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-ssl Jan 22 13:31:58 np0005592561.novalocal sudo[97699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:58 np0005592561.novalocal sudo[97699]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97702]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ Jan 22 13:31:59 np0005592561.novalocal sudo[97702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97702]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97705]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ Jan 22 13:31:59 np0005592561.novalocal sudo[97705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97705]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97708]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sudoers.d /var/log/weirdo-project/logs/ Jan 22 13:31:59 np0005592561.novalocal sudo[97708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97708]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97711]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sudoers /var/log/weirdo-project/logs/sudoers.txt Jan 22 13:31:59 np0005592561.novalocal sudo[97711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97711]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97715]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/magic /etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ Jan 22 13:31:59 np0005592561.novalocal sudo[97715]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97715]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97719]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.d/10-cinder_wsgi.conf /etc/httpd/conf.d/10-glance_wsgi.conf /etc/httpd/conf.d/10-keystone_wsgi.conf /etc/httpd/conf.d/10-manila_wsgi.conf /etc/httpd/conf.d/10-neutron_wsgi.conf /etc/httpd/conf.d/10-nova_api_wsgi.conf /etc/httpd/conf.d/10-nova_metadata_wsgi.conf /etc/httpd/conf.d/10-octavia_wsgi.conf /etc/httpd/conf.d/10-placement_wsgi.conf /etc/httpd/conf.d/15-horizon_ssl_vhost.conf /etc/httpd/conf.d/15-horizon_vhost.conf /etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/ Jan 22 13:31:59 np0005592561.novalocal sudo[97719]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97719]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97723]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.modules.d/alias.conf /etc/httpd/conf.modules.d/alias.load /etc/httpd/conf.modules.d/authz_core.load /etc/httpd/conf.modules.d/authz_host.load /etc/httpd/conf.modules.d/filter.load /etc/httpd/conf.modules.d/log_config.load /etc/httpd/conf.modules.d/mime.conf /etc/httpd/conf.modules.d/mime.load /etc/httpd/conf.modules.d/prefork.conf /etc/httpd/conf.modules.d/prefork.load /etc/httpd/conf.modules.d/setenvif.conf /etc/httpd/conf.modules.d/setenvif.load /etc/httpd/conf.modules.d/socache_shmcb.load /etc/httpd/conf.modules.d/ssl.conf /etc/httpd/conf.modules.d/ssl.load /etc/httpd/conf.modules.d/systemd.load /etc/httpd/conf.modules.d/unixd.load /etc/httpd/conf.modules.d/wsgi.conf /etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ Jan 22 13:31:59 np0005592561.novalocal sudo[97723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97723]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97726]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/httpd /var/log/weirdo-project/logs/apache Jan 22 13:31:59 np0005592561.novalocal sudo[97726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97726]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97729]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/redis /var/log/weirdo-project/logs/ Jan 22 13:31:59 np0005592561.novalocal sudo[97729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97729]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97732]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/redis /var/log/weirdo-project/logs/etc/ Jan 22 13:31:59 np0005592561.novalocal sudo[97732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97732]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97735]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/audit/audit.log /var/log/weirdo-project/logs/audit.log.txt Jan 22 13:31:59 np0005592561.novalocal sudo[97735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97735]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97738]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/spool/cron /var/log/weirdo-project/logs/ Jan 22 13:31:59 np0005592561.novalocal sudo[97738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97738]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97741]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/etc/tempest.conf /var/log/weirdo-project/logs/tempest.conf.txt Jan 22 13:31:59 np0005592561.novalocal sudo[97741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97741]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97744]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack-dashboard /var/log/weirdo-project/logs/etc/openstack-dashboard Jan 22 13:31:59 np0005592561.novalocal sudo[97744]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97744]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97748]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt Jan 22 13:31:59 np0005592561.novalocal sudo[97748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97748]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97751]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt Jan 22 13:31:59 np0005592561.novalocal sudo[97751]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97751]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97754]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt Jan 22 13:31:59 np0005592561.novalocal sudo[97754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97754]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97757]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt Jan 22 13:31:59 np0005592561.novalocal sudo[97757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97757]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97760]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt Jan 22 13:31:59 np0005592561.novalocal sudo[97760]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97760]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97763]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt Jan 22 13:31:59 np0005592561.novalocal sudo[97763]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97763]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97766]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt Jan 22 13:31:59 np0005592561.novalocal sudo[97766]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97766]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97769]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt Jan 22 13:31:59 np0005592561.novalocal sudo[97769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97769]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97772]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt Jan 22 13:31:59 np0005592561.novalocal sudo[97772]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97772]: pam_unix(sudo:session): session closed for user root Jan 22 13:31:59 np0005592561.novalocal sudo[97775]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt Jan 22 13:31:59 np0005592561.novalocal sudo[97775]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:31:59 np0005592561.novalocal sudo[97775]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:00 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:32:00 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:32:00 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:32:00 np0005592561.novalocal sudo[97778]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt Jan 22 13:32:00 np0005592561.novalocal sudo[97778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:00 np0005592561.novalocal sudo[97778]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:00 np0005592561.novalocal sudo[97782]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt Jan 22 13:32:00 np0005592561.novalocal sudo[97782]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:00 np0005592561.novalocal sudo[97782]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:00 np0005592561.novalocal sudo[97786]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf Jan 22 13:32:00 np0005592561.novalocal sudo[97786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:00 np0005592561.novalocal sudo[97786]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:00 np0005592561.novalocal sudo[97793]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf repolist -v Jan 22 13:32:00 np0005592561.novalocal sudo[97793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:02 np0005592561.novalocal sudo[97793]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:02 np0005592561.novalocal sudo[97797]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf list installed Jan 22 13:32:02 np0005592561.novalocal sudo[97797]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:03 np0005592561.novalocal sudo[97797]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:03 np0005592561.novalocal sudo[97800]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf module list Jan 22 13:32:03 np0005592561.novalocal sudo[97800]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:04 np0005592561.novalocal sudo[97800]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:04 np0005592561.novalocal sudo[97804]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/yum.repos.d /var/log/weirdo-project/logs/etc/yum.repos.d Jan 22 13:32:04 np0005592561.novalocal sudo[97804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:04 np0005592561.novalocal sudo[97804]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:04 np0005592561.novalocal sudo[97808]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.log /var/log/weirdo-project/logs/dnf Jan 22 13:32:04 np0005592561.novalocal sudo[97808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:04 np0005592561.novalocal sudo[97808]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:04 np0005592561.novalocal sudo[97811]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.rpm.log /var/log/weirdo-project/logs/dnf Jan 22 13:32:04 np0005592561.novalocal sudo[97811]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:04 np0005592561.novalocal sudo[97811]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:04 np0005592561.novalocal sudo[97817]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/passwd /var/log/weirdo-project/logs/etc Jan 22 13:32:04 np0005592561.novalocal sudo[97817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:04 np0005592561.novalocal sudo[97817]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:04 np0005592561.novalocal sudo[97820]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/group /var/log/weirdo-project/logs/etc Jan 22 13:32:04 np0005592561.novalocal sudo[97820]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:04 np0005592561.novalocal sudo[97820]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:04 np0005592561.novalocal sudo[97823]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack /var/log/weirdo-project/logs/etc Jan 22 13:32:04 np0005592561.novalocal sudo[97823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:04 np0005592561.novalocal sudo[97823]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:04 np0005592561.novalocal sudo[97826]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml Jan 22 13:32:04 np0005592561.novalocal sudo[97826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:04 np0005592561.novalocal sudo[97826]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:04 np0005592561.novalocal sudo[97833]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ps -eo user,pid,ppid,lwp,%cpu,%mem,size,rss,cmd Jan 22 13:32:04 np0005592561.novalocal sudo[97833]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:05 np0005592561.novalocal sudo[97833]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:05 np0005592561.novalocal sudo[97836]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/ip -d address Jan 22 13:32:05 np0005592561.novalocal sudo[97836]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:05 np0005592561.novalocal sudo[97836]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:05 np0005592561.novalocal sudo[97842]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl list open_vswitch Jan 22 13:32:05 np0005592561.novalocal sudo[97842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:05 np0005592561.novalocal sudo[97842]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:05 np0005592561.novalocal sudo[97845]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl show Jan 22 13:32:05 np0005592561.novalocal sudo[97845]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:05 np0005592561.novalocal sudo[97845]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:05 np0005592561.novalocal sudo[97849]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Jan 22 13:32:05 np0005592561.novalocal sudo[97849]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:05 np0005592561.novalocal sudo[97849]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:05 np0005592561.novalocal sudo[97852]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl list connection Jan 22 13:32:05 np0005592561.novalocal sudo[97852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:05 np0005592561.novalocal sudo[97852]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:05 np0005592561.novalocal sudo[97855]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Jan 22 13:32:05 np0005592561.novalocal sudo[97855]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:05 np0005592561.novalocal sudo[97855]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:05 np0005592561.novalocal sudo[97859]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Jan 22 13:32:05 np0005592561.novalocal sudo[97859]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:05 np0005592561.novalocal sudo[97859]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:05 np0005592561.novalocal sudo[97862]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl list connection Jan 22 13:32:05 np0005592561.novalocal sudo[97862]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:05 np0005592561.novalocal sudo[97862]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:05 np0005592561.novalocal sudo[97865]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Jan 22 13:32:05 np0005592561.novalocal sudo[97865]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:05 np0005592561.novalocal sudo[97865]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:05 np0005592561.novalocal sudo[97868]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/netstat -tulpn Jan 22 13:32:05 np0005592561.novalocal sudo[97868]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:05 np0005592561.novalocal sudo[97868]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:05 np0005592561.novalocal sudo[97871]: root : PWD=/tmp/puppet-openstack ; USER=root ; ENV=LC_CTYPE=C SYSTEMD_COLORS=false ; COMMAND=/bin/systemctl status --all --no-pager Jan 22 13:32:05 np0005592561.novalocal sudo[97871]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:07 np0005592561.novalocal sudo[97871]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:07 np0005592561.novalocal sudo[97876]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t raw -vnxL Jan 22 13:32:07 np0005592561.novalocal sudo[97876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:07 np0005592561.novalocal sudo[97876]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:07 np0005592561.novalocal sudo[97879]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t filter -vnxL Jan 22 13:32:07 np0005592561.novalocal sudo[97879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:07 np0005592561.novalocal sudo[97879]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:07 np0005592561.novalocal sudo[97882]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t nat -vnxL Jan 22 13:32:07 np0005592561.novalocal sudo[97882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:07 np0005592561.novalocal sudo[97882]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:07 np0005592561.novalocal sudo[97885]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t mangle -vnxL Jan 22 13:32:07 np0005592561.novalocal sudo[97885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:07 np0005592561.novalocal sudo[97885]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:07 np0005592561.novalocal sudo[97888]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/fstab /var/log/weirdo-project/logs/etc/ Jan 22 13:32:07 np0005592561.novalocal sudo[97888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:07 np0005592561.novalocal sudo[97888]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:07 np0005592561.novalocal sudo[97891]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mount Jan 22 13:32:07 np0005592561.novalocal sudo[97891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:07 np0005592561.novalocal sudo[97891]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:07 np0005592561.novalocal sudo[97894]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/losetup -al Jan 22 13:32:07 np0005592561.novalocal sudo[97894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:07 np0005592561.novalocal sudo[97894]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:07 np0005592561.novalocal sudo[97897]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/pvs Jan 22 13:32:07 np0005592561.novalocal sudo[97897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:07 np0005592561.novalocal sudo[97897]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:07 np0005592561.novalocal sudo[97900]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/vgs Jan 22 13:32:07 np0005592561.novalocal sudo[97900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:08 np0005592561.novalocal sudo[97900]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:08 np0005592561.novalocal sudo[97903]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/lvs Jan 22 13:32:08 np0005592561.novalocal sudo[97903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:08 np0005592561.novalocal sudo[97903]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:08 np0005592561.novalocal sudo[97907]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/semanage boolean --list Jan 22 13:32:08 np0005592561.novalocal sudo[97907]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:08 np0005592561.novalocal sudo[97907]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:13 np0005592561.novalocal sudo[97954]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_cells --verbose Jan 22 13:32:13 np0005592561.novalocal sudo[97954]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Jan 22 13:32:15 np0005592561.novalocal sudo[97954]: pam_unix(sudo:session): session closed for user nova Jan 22 13:32:15 np0005592561.novalocal sudo[97961]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_hosts Jan 22 13:32:15 np0005592561.novalocal sudo[97961]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Jan 22 13:32:17 np0005592561.novalocal sudo[97961]: pam_unix(sudo:session): session closed for user nova Jan 22 13:32:20 np0005592561.novalocal sudo[97976]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 13:32:20 np0005592561.novalocal systemd[1]: Started Session c94 of User root. Jan 22 13:32:20 np0005592561.novalocal sudo[97976]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:32:20 np0005592561.novalocal sudo[97976]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:20 np0005592561.novalocal systemd[1]: session-c94.scope: Deactivated successfully. Jan 22 13:32:20 np0005592561.novalocal sudo[97980]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:32:20 np0005592561.novalocal systemd[1]: Started Session c95 of User root. Jan 22 13:32:20 np0005592561.novalocal sudo[97980]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:32:20 np0005592561.novalocal sudo[97980]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:20 np0005592561.novalocal systemd[1]: session-c95.scope: Deactivated successfully. Jan 22 13:32:20 np0005592561.novalocal sudo[97984]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 13:32:20 np0005592561.novalocal systemd[1]: Started Session c96 of User root. Jan 22 13:32:20 np0005592561.novalocal sudo[97984]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:32:21 np0005592561.novalocal sudo[97984]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:21 np0005592561.novalocal systemd[1]: session-c96.scope: Deactivated successfully. Jan 22 13:32:21 np0005592561.novalocal sudo[97988]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 13:32:21 np0005592561.novalocal systemd[1]: Started Session c97 of User root. Jan 22 13:32:21 np0005592561.novalocal sudo[97988]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 13:32:21 np0005592561.novalocal sudo[97988]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:21 np0005592561.novalocal systemd[1]: session-c97.scope: Deactivated successfully. Jan 22 13:32:37 np0005592561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 13:32:38 np0005592561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 13:32:38 np0005592561.novalocal sudo[98028]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type d -execdir sudo chmod 755 {} ; Jan 22 13:32:38 np0005592561.novalocal sudo[98028]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:38 np0005592561.novalocal sudo[98031]: root : PWD=/var/log/weirdo-project ; USER=root ; COMMAND=/bin/chmod 755 ./logs Jan 22 13:32:38 np0005592561.novalocal sudo[98031]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:38 np0005592561.novalocal sudo[98031]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:38 np0005592561.novalocal sudo[98034]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./etc Jan 22 13:32:38 np0005592561.novalocal sudo[98034]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:38 np0005592561.novalocal sudo[98034]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:38 np0005592561.novalocal sudo[98037]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./sysconfig Jan 22 13:32:38 np0005592561.novalocal sudo[98037]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:38 np0005592561.novalocal sudo[98037]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:38 np0005592561.novalocal sudo[98042]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 755 ./network-scripts Jan 22 13:32:38 np0005592561.novalocal sudo[98042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:38 np0005592561.novalocal sudo[98042]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:38 np0005592561.novalocal sudo[98046]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ceph Jan 22 13:32:38 np0005592561.novalocal sudo[98046]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:38 np0005592561.novalocal sudo[98046]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:38 np0005592561.novalocal sudo[98049]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Jan 22 13:32:38 np0005592561.novalocal sudo[98049]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:38 np0005592561.novalocal sudo[98049]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:38 np0005592561.novalocal sudo[98052]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Jan 22 13:32:38 np0005592561.novalocal sudo[98052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:38 np0005592561.novalocal sudo[98052]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:38 np0005592561.novalocal sudo[98056]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./volumes Jan 22 13:32:39 np0005592561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service. Jan 22 13:32:39 np0005592561.novalocal sudo[98056]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98056]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98063]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 13:32:39 np0005592561.novalocal sudo[98063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98063]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98066]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 13:32:39 np0005592561.novalocal sudo[98066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98066]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98069]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./glance Jan 22 13:32:39 np0005592561.novalocal sudo[98069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98069]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98072]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./metadefs Jan 22 13:32:39 np0005592561.novalocal sudo[98072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98072]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98075]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Jan 22 13:32:39 np0005592561.novalocal sudo[98075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98075]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98078]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 13:32:39 np0005592561.novalocal sudo[98078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98078]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98081]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 13:32:39 np0005592561.novalocal sudo[98081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98081]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98085]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Jan 22 13:32:39 np0005592561.novalocal sudo[98085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98085]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98088]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./fernet-keys Jan 22 13:32:39 np0005592561.novalocal sudo[98088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98088]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98091]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./credential-keys Jan 22 13:32:39 np0005592561.novalocal sudo[98091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98091]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98096]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./policy.d Jan 22 13:32:39 np0005592561.novalocal sudo[98096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98096]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98099]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 13:32:39 np0005592561.novalocal sudo[98099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98099]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98102]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 13:32:39 np0005592561.novalocal sudo[98102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98102]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98105]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./manila Jan 22 13:32:39 np0005592561.novalocal sudo[98105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98105]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98108]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 13:32:39 np0005592561.novalocal sudo[98108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98108]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98111]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 13:32:39 np0005592561.novalocal sudo[98111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98111]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98114]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Jan 22 13:32:39 np0005592561.novalocal sudo[98114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98114]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98117]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Jan 22 13:32:39 np0005592561.novalocal sudo[98117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98117]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98120]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Jan 22 13:32:39 np0005592561.novalocal sudo[98120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98120]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98123]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovn-agent Jan 22 13:32:39 np0005592561.novalocal sudo[98123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98123]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98126]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-rpc-server Jan 22 13:32:39 np0005592561.novalocal sudo[98126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98126]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98129]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-dhcp-agent Jan 22 13:32:39 np0005592561.novalocal sudo[98129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98129]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98132]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-l3-agent Jan 22 13:32:39 np0005592561.novalocal sudo[98132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98132]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98135]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-metadata-agent Jan 22 13:32:39 np0005592561.novalocal sudo[98135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98135]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:39 np0005592561.novalocal sudo[98138]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-vpn-agent Jan 22 13:32:39 np0005592561.novalocal sudo[98138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:39 np0005592561.novalocal sudo[98138]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98141]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-netns-cleanup Jan 22 13:32:40 np0005592561.novalocal sudo[98141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98141]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98144]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovs-cleanup Jan 22 13:32:40 np0005592561.novalocal sudo[98144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98144]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98147]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-server Jan 22 13:32:40 np0005592561.novalocal sudo[98147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98147]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98150]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 13:32:40 np0005592561.novalocal sudo[98150]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98150]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98153]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 13:32:40 np0005592561.novalocal sudo[98153]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98153]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98156]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./plugins Jan 22 13:32:40 np0005592561.novalocal sudo[98156]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98156]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98160]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./networking-ovn Jan 22 13:32:40 np0005592561.novalocal sudo[98160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98160]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal setroubleshoot[98025]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l 2c854540-acb6-4131-95ca-37de87219fe9 Jan 22 13:32:40 np0005592561.novalocal sudo[98163]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./ml2 Jan 22 13:32:40 np0005592561.novalocal sudo[98163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98163]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal setroubleshoot[98025]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 13:32:40 np0005592561.novalocal sudo[98166]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./kill_scripts Jan 22 13:32:40 np0005592561.novalocal sudo[98166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98166]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98169]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./nova Jan 22 13:32:40 np0005592561.novalocal sudo[98169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98169]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98172]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 13:32:40 np0005592561.novalocal sudo[98172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98172]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98175]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 13:32:40 np0005592561.novalocal sudo[98175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98175]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98178]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Jan 22 13:32:40 np0005592561.novalocal sudo[98178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98178]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98181]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Jan 22 13:32:40 np0005592561.novalocal sudo[98181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98181]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98184]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Jan 22 13:32:40 np0005592561.novalocal sudo[98184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98184]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98187]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-health-manager Jan 22 13:32:40 np0005592561.novalocal sudo[98187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98187]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98190]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-driver-agent Jan 22 13:32:40 np0005592561.novalocal sudo[98190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98190]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98193]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-worker Jan 22 13:32:40 np0005592561.novalocal sudo[98193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98193]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98196]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-housekeeping Jan 22 13:32:40 np0005592561.novalocal sudo[98196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98196]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98199]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-api Jan 22 13:32:40 np0005592561.novalocal sudo[98199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98199]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98202]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./certs Jan 22 13:32:40 np0005592561.novalocal sudo[98202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98202]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98205]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 13:32:40 np0005592561.novalocal sudo[98205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98205]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98208]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 13:32:40 np0005592561.novalocal sudo[98208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98208]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98211]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Jan 22 13:32:40 np0005592561.novalocal sudo[98211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98211]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98214]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./placement Jan 22 13:32:40 np0005592561.novalocal sudo[98214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98214]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98217]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 13:32:40 np0005592561.novalocal sudo[98217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98217]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98220]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 13:32:40 np0005592561.novalocal sudo[98220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98220]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98223]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./tempest Jan 22 13:32:40 np0005592561.novalocal sudo[98223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98223]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98226]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rsyslog.d Jan 22 13:32:40 np0005592561.novalocal sudo[98226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98226]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98229]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Jan 22 13:32:40 np0005592561.novalocal sudo[98229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98229]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98232]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 13:32:40 np0005592561.novalocal sudo[98232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:40 np0005592561.novalocal sudo[98232]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:40 np0005592561.novalocal sudo[98235]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 13:32:41 np0005592561.novalocal sudo[98235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98235]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98238]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./my.cnf.d Jan 22 13:32:41 np0005592561.novalocal sudo[98238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98238]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98241]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./iscsi Jan 22 13:32:41 np0005592561.novalocal sudo[98241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98241]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98244]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Jan 22 13:32:41 np0005592561.novalocal sudo[98244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98244]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98247]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./nwfilter Jan 22 13:32:41 np0005592561.novalocal sudo[98247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98247]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98250]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./storage Jan 22 13:32:41 np0005592561.novalocal sudo[98250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98250]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98253]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/storage ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Jan 22 13:32:41 np0005592561.novalocal sudo[98253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98253]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98256]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./secrets Jan 22 13:32:41 np0005592561.novalocal sudo[98256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98256]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98259]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Jan 22 13:32:41 np0005592561.novalocal sudo[98259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98259]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98262]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./networks Jan 22 13:32:41 np0005592561.novalocal sudo[98262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98262]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98265]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Jan 22 13:32:41 np0005592561.novalocal sudo[98265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98265]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98268]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Jan 22 13:32:41 np0005592561.novalocal sudo[98268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98268]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98271]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Jan 22 13:32:41 np0005592561.novalocal sudo[98271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98271]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98274]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./httpd Jan 22 13:32:41 np0005592561.novalocal sudo[98274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98274]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98277]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf Jan 22 13:32:41 np0005592561.novalocal sudo[98277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98277]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98280]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Jan 22 13:32:41 np0005592561.novalocal sudo[98280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98280]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98283]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.modules.d Jan 22 13:32:41 np0005592561.novalocal sudo[98283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98283]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98286]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./redis Jan 22 13:32:41 np0005592561.novalocal sudo[98286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98286]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98289]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 13:32:41 np0005592561.novalocal sudo[98289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98289]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98292]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 13:32:41 np0005592561.novalocal sudo[98292]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98292]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98295]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack-dashboard Jan 22 13:32:41 np0005592561.novalocal sudo[98295]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98295]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98298]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./default_policies.txt Jan 22 13:32:41 np0005592561.novalocal sudo[98298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98298]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98301]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./enabled.txt Jan 22 13:32:41 np0005592561.novalocal sudo[98301]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98301]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98304]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./local_settings.d.txt Jan 22 13:32:41 np0005592561.novalocal sudo[98304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98304]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98307]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./nova_policy.d.txt Jan 22 13:32:41 np0005592561.novalocal sudo[98307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98307]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:41 np0005592561.novalocal sudo[98310]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./ssl.txt Jan 22 13:32:41 np0005592561.novalocal sudo[98310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:41 np0005592561.novalocal sudo[98310]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98313]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 13:32:42 np0005592561.novalocal sudo[98313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98313]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98316]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./yum.repos.d Jan 22 13:32:42 np0005592561.novalocal sudo[98316]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98316]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98319]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack Jan 22 13:32:42 np0005592561.novalocal sudo[98319]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98319]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98322]: root : PWD=/var/log/weirdo-project/logs/etc/openstack ; USER=root ; COMMAND=/bin/chmod 755 ./puppet Jan 22 13:32:42 np0005592561.novalocal sudo[98322]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98322]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98325]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Jan 22 13:32:42 np0005592561.novalocal sudo[98325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98325]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98328]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./glance Jan 22 13:32:42 np0005592561.novalocal sudo[98328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98328]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98331]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./horizon Jan 22 13:32:42 np0005592561.novalocal sudo[98331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98331]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98334]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Jan 22 13:32:42 np0005592561.novalocal sudo[98334]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98334]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98337]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./manila Jan 22 13:32:42 np0005592561.novalocal sudo[98337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98337]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98340]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Jan 22 13:32:42 np0005592561.novalocal sudo[98340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98340]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98343]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./nova Jan 22 13:32:42 np0005592561.novalocal sudo[98343]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98343]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98346]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Jan 22 13:32:42 np0005592561.novalocal sudo[98346]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98346]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98349]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Jan 22 13:32:42 np0005592561.novalocal sudo[98349]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98349]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98352]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./placement Jan 22 13:32:42 np0005592561.novalocal sudo[98352]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98352]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98355]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Jan 22 13:32:42 np0005592561.novalocal sudo[98355]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98355]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98358]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./mariadb Jan 22 13:32:42 np0005592561.novalocal sudo[98358]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98358]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98361]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Jan 22 13:32:42 np0005592561.novalocal sudo[98361]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98361]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98364]: root : PWD=/var/log/weirdo-project/logs/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Jan 22 13:32:42 np0005592561.novalocal sudo[98364]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98364]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98367]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Jan 22 13:32:42 np0005592561.novalocal sudo[98367]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98367]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98370]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./sudoers.d Jan 22 13:32:42 np0005592561.novalocal sudo[98370]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98370]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98373]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./apache Jan 22 13:32:42 np0005592561.novalocal sudo[98373]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98373]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98376]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./redis Jan 22 13:32:42 np0005592561.novalocal sudo[98376]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98376]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98379]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cron Jan 22 13:32:42 np0005592561.novalocal sudo[98379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98379]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98382]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./dnf Jan 22 13:32:42 np0005592561.novalocal sudo[98382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98382]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98385]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openstack_resources Jan 22 13:32:42 np0005592561.novalocal sudo[98385]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98385]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98028]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98388]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type f -execdir sudo chmod 644 {} ; Jan 22 13:32:42 np0005592561.novalocal sudo[98388]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98391]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20260122_132843.log Jan 22 13:32:42 np0005592561.novalocal sudo[98391]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98391]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98394]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.log Jan 22 13:32:42 np0005592561.novalocal sudo[98394]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98394]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98397]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-eth0 Jan 22 13:32:42 np0005592561.novalocal sudo[98397]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98397]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:42 np0005592561.novalocal sudo[98400]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./readme-ifcfg-rh.txt Jan 22 13:32:42 np0005592561.novalocal sudo[98400]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:42 np0005592561.novalocal sudo[98400]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98403]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-loop1 Jan 22 13:32:43 np0005592561.novalocal sudo[98403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98403]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98406]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-br-ex Jan 22 13:32:43 np0005592561.novalocal sudo[98406]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98406]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98409]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-lo Jan 22 13:32:43 np0005592561.novalocal sudo[98409]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98409]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98412]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown Jan 22 13:32:43 np0005592561.novalocal sudo[98412]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98412]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98415]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-eth Jan 22 13:32:43 np0005592561.novalocal sudo[98415]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98415]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98418]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ipv6 Jan 22 13:32:43 np0005592561.novalocal sudo[98418]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98418]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98421]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ovs Jan 22 13:32:43 np0005592561.novalocal sudo[98421]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98421]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98424]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-post Jan 22 13:32:43 np0005592561.novalocal sudo[98424]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98424]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98428]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-routes Jan 22 13:32:43 np0005592561.novalocal sudo[98428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98428]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98432]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-tunnel Jan 22 13:32:43 np0005592561.novalocal sudo[98432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98432]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98435]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup Jan 22 13:32:43 np0005592561.novalocal sudo[98435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98435]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98438]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-aliases Jan 22 13:32:43 np0005592561.novalocal sudo[98438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98438]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98441]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-eth Jan 22 13:32:43 np0005592561.novalocal sudo[98441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98441]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98444]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ipv6 Jan 22 13:32:43 np0005592561.novalocal sudo[98444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98444]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98447]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ovs Jan 22 13:32:43 np0005592561.novalocal sudo[98447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98447]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98450]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-post Jan 22 13:32:43 np0005592561.novalocal sudo[98450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98450]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98453]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-routes Jan 22 13:32:43 np0005592561.novalocal sudo[98453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98453]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98456]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-tunnel Jan 22 13:32:43 np0005592561.novalocal sudo[98456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98456]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98459]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./init.ipv6-global Jan 22 13:32:43 np0005592561.novalocal sudo[98459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98459]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98462]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions Jan 22 13:32:43 np0005592561.novalocal sudo[98462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98462]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98465]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions-ipv6 Jan 22 13:32:43 np0005592561.novalocal sudo[98465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98465]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98468]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-guests Jan 22 13:32:43 np0005592561.novalocal sudo[98468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98468]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98471]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd Jan 22 13:32:43 np0005592561.novalocal sudo[98471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98471]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98474]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller Jan 22 13:32:43 np0005592561.novalocal sudo[98474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98474]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98477]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 13:32:43 np0005592561.novalocal sudo[98477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98477]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98480]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Jan 22 13:32:43 np0005592561.novalocal sudo[98480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98480]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98483]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.conf Jan 22 13:32:43 np0005592561.novalocal sudo[98483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98483]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98486]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./resource_filters.json Jan 22 13:32:43 np0005592561.novalocal sudo[98486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:43 np0005592561.novalocal sudo[98486]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:43 np0005592561.novalocal sudo[98489]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Jan 22 13:32:44 np0005592561.novalocal sudo[98489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98489]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98492]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592561.novalocal.pem Jan 22 13:32:44 np0005592561.novalocal sudo[98492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98492]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98495]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api-paste.ini Jan 22 13:32:44 np0005592561.novalocal sudo[98495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98495]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98498]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api.conf Jan 22 13:32:44 np0005592561.novalocal sudo[98498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98498]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98501]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-cache.conf Jan 22 13:32:44 np0005592561.novalocal sudo[98501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98501]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98504]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-image-import.conf Jan 22 13:32:44 np0005592561.novalocal sudo[98504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98504]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98507]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-scrubber.conf Jan 22 13:32:44 np0005592561.novalocal sudo[98507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98507]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98510]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-swift.conf Jan 22 13:32:44 np0005592561.novalocal sudo[98510]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98510]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98513]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-processor-allocation-setting-data.json Jan 22 13:32:44 np0005592561.novalocal sudo[98513]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98513]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98516]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-resource-allocation-setting-data.json Jan 22 13:32:44 np0005592561.novalocal sudo[98516]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98516]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98519]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-storage-allocation-setting-data.json Jan 22 13:32:44 np0005592561.novalocal sudo[98519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98519]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98522]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-virtual-system-setting-data.json Jan 22 13:32:44 np0005592561.novalocal sudo[98522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98522]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98525]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-disk-filter.json Jan 22 13:32:44 np0005592561.novalocal sudo[98525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98525]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98528]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-iops-filter.json Jan 22 13:32:44 np0005592561.novalocal sudo[98528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98528]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98531]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-num-instances.json Jan 22 13:32:44 np0005592561.novalocal sudo[98531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98531]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98534]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-mode.json Jan 22 13:32:44 np0005592561.novalocal sudo[98534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98534]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98537]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-pinning.json Jan 22 13:32:44 np0005592561.novalocal sudo[98537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98537]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98540]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-memory-backing.json Jan 22 13:32:44 np0005592561.novalocal sudo[98540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98540]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98544]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-shutdown.json Jan 22 13:32:44 np0005592561.novalocal sudo[98544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98544]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98547]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-host-capabilities.json Jan 22 13:32:44 np0005592561.novalocal sudo[98547]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98547]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98550]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-hypervisor.json Jan 22 13:32:44 np0005592561.novalocal sudo[98550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98550]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98553]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-instance-data.json Jan 22 13:32:44 np0005592561.novalocal sudo[98553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98553]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98556]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt-image.json Jan 22 13:32:44 np0005592561.novalocal sudo[98556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98556]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98559]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt.json Jan 22 13:32:44 np0005592561.novalocal sudo[98559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98559]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:44 np0005592561.novalocal sudo[98562]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-quota.json Jan 22 13:32:44 np0005592561.novalocal sudo[98562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:44 np0005592561.novalocal sudo[98562]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98565]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-randomgen.json Jan 22 13:32:45 np0005592561.novalocal sudo[98565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98565]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98568]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vcputopology.json Jan 22 13:32:45 np0005592561.novalocal sudo[98568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98568]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98571]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-flavor.json Jan 22 13:32:45 np0005592561.novalocal sudo[98571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98571]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98574]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-quota-flavor.json Jan 22 13:32:45 np0005592561.novalocal sudo[98574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98574]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98577]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware.json Jan 22 13:32:45 np0005592561.novalocal sudo[98577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98577]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98580]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm-hw.json Jan 22 13:32:45 np0005592561.novalocal sudo[98580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98580]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98583]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm.json Jan 22 13:32:45 np0005592561.novalocal sudo[98583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98583]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98586]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-watchdog.json Jan 22 13:32:45 np0005592561.novalocal sudo[98586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98586]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98589]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-xenapi.json Jan 22 13:32:45 np0005592561.novalocal sudo[98589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98589]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98592]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./glance-common-image-props.json Jan 22 13:32:45 np0005592561.novalocal sudo[98592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98592]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98595]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./image-signature-verification.json Jan 22 13:32:45 np0005592561.novalocal sudo[98595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98595]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98598]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./operating-system.json Jan 22 13:32:45 np0005592561.novalocal sudo[98598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98598]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98601]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-databases.json Jan 22 13:32:45 np0005592561.novalocal sudo[98601]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98601]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98604]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-runtimes.json Jan 22 13:32:45 np0005592561.novalocal sudo[98604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98604]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98607]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-webservers.json Jan 22 13:32:45 np0005592561.novalocal sudo[98607]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98607]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98610]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./storage-volume-type.json Jan 22 13:32:45 np0005592561.novalocal sudo[98610]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98610]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98613]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Jan 22 13:32:45 np0005592561.novalocal sudo[98613]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98613]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98616]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./schema-image.json Jan 22 13:32:45 np0005592561.novalocal sudo[98616]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98616]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98619]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 13:32:45 np0005592561.novalocal sudo[98619]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98619]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98622]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592561.novalocal.pem Jan 22 13:32:45 np0005592561.novalocal sudo[98622]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98622]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98625]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Jan 22 13:32:45 np0005592561.novalocal sudo[98625]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98625]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98628]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./2 Jan 22 13:32:45 np0005592561.novalocal sudo[98628]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98628]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98631]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Jan 22 13:32:45 np0005592561.novalocal sudo[98631]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98631]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98634]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Jan 22 13:32:45 np0005592561.novalocal sudo[98634]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98634]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98637]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Jan 22 13:32:45 np0005592561.novalocal sudo[98637]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98637]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98640]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 13:32:45 np0005592561.novalocal sudo[98640]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98640]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98643]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.conf Jan 22 13:32:45 np0005592561.novalocal sudo[98643]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98643]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:45 np0005592561.novalocal sudo[98646]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf Jan 22 13:32:45 np0005592561.novalocal sudo[98646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:45 np0005592561.novalocal sudo[98646]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98649]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./sso_callback_template.html Jan 22 13:32:46 np0005592561.novalocal sudo[98649]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98649]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98652]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592561.novalocal.pem Jan 22 13:32:46 np0005592561.novalocal sudo[98652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98652]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98655]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592561.novalocal.pem Jan 22 13:32:46 np0005592561.novalocal sudo[98655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98655]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98658]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Jan 22 13:32:46 np0005592561.novalocal sudo[98658]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98658]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98661]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila.conf Jan 22 13:32:46 np0005592561.novalocal sudo[98661]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98661]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98664]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Jan 22 13:32:46 np0005592561.novalocal sudo[98664]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98664]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98667]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 13:32:46 np0005592561.novalocal sudo[98667]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98667]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98670]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./README Jan 22 13:32:46 np0005592561.novalocal sudo[98670]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98670]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98673]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592561.novalocal.pem Jan 22 13:32:46 np0005592561.novalocal sudo[98673]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98673]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98676]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Jan 22 13:32:46 np0005592561.novalocal sudo[98676]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98676]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98679]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Jan 22 13:32:46 np0005592561.novalocal sudo[98679]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98679]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98682]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Jan 22 13:32:46 np0005592561.novalocal sudo[98682]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98682]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98685]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Jan 22 13:32:46 np0005592561.novalocal sudo[98685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98685]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98688]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Jan 22 13:32:46 np0005592561.novalocal sudo[98688]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98688]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98691]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.conf Jan 22 13:32:46 np0005592561.novalocal sudo[98691]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98691]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98694]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ml2_conf.ini Jan 22 13:32:46 np0005592561.novalocal sudo[98694]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98694]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98697]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_agent.ini Jan 22 13:32:46 np0005592561.novalocal sudo[98697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98697]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98700]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./sriov_agent.ini Jan 22 13:32:46 np0005592561.novalocal sudo[98700]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98700]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98703]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Jan 22 13:32:46 np0005592561.novalocal sudo[98703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98703]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98706]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Jan 22 13:32:46 np0005592561.novalocal sudo[98706]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98706]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98709]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./dhcp_agent.ini Jan 22 13:32:46 np0005592561.novalocal sudo[98709]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98709]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98712]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./l3_agent.ini Jan 22 13:32:46 np0005592561.novalocal sudo[98712]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98712]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98715]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./metadata_agent.ini Jan 22 13:32:46 np0005592561.novalocal sudo[98715]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98715]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98718]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_vpn_agent.ini Jan 22 13:32:46 np0005592561.novalocal sudo[98718]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98718]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98721]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_vpnaas.conf Jan 22 13:32:46 np0005592561.novalocal sudo[98721]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:46 np0005592561.novalocal sudo[98721]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:46 np0005592561.novalocal sudo[98724]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./vpn_agent.ini Jan 22 13:32:47 np0005592561.novalocal sudo[98724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98724]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98727]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 13:32:47 np0005592561.novalocal sudo[98727]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98727]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98730]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592561.novalocal.pem Jan 22 13:32:47 np0005592561.novalocal sudo[98730]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98730]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98733]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Jan 22 13:32:47 np0005592561.novalocal sudo[98733]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98733]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98736]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova.conf Jan 22 13:32:47 np0005592561.novalocal sudo[98736]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98736]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98739]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./release Jan 22 13:32:47 np0005592561.novalocal sudo[98739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98739]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98742]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Jan 22 13:32:47 np0005592561.novalocal sudo[98742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98742]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98745]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.conf Jan 22 13:32:47 np0005592561.novalocal sudo[98745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98745]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98748]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 13:32:47 np0005592561.novalocal sudo[98748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98748]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98751]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.conf Jan 22 13:32:47 np0005592561.novalocal sudo[98751]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98751]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98754]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 13:32:47 np0005592561.novalocal sudo[98754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98754]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98757]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Jan 22 13:32:47 np0005592561.novalocal sudo[98757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98757]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98761]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Jan 22 13:32:47 np0005592561.novalocal sudo[98761]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98761]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98765]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Jan 22 13:32:47 np0005592561.novalocal sudo[98765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98765]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98768]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Jan 22 13:32:47 np0005592561.novalocal sudo[98768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98768]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98771]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Jan 22 13:32:47 np0005592561.novalocal sudo[98771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98771]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98774]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.cert.pem Jan 22 13:32:47 np0005592561.novalocal sudo[98774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98774]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98777]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.key.pem Jan 22 13:32:47 np0005592561.novalocal sudo[98777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98777]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98780]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client_ca.cert.pem Jan 22 13:32:47 np0005592561.novalocal sudo[98780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98780]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98783]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client.cert-and-key.pem Jan 22 13:32:47 np0005592561.novalocal sudo[98783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98783]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98786]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592561.novalocal.pem Jan 22 13:32:47 np0005592561.novalocal sudo[98786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98786]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98789]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 13:32:47 np0005592561.novalocal sudo[98789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98789]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98792]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.conf Jan 22 13:32:47 np0005592561.novalocal sudo[98792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98792]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98795]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592561.novalocal.pem Jan 22 13:32:47 np0005592561.novalocal sudo[98795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98795]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98798]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./accounts.yaml.sample Jan 22 13:32:47 np0005592561.novalocal sudo[98798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98798]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:47 np0005592561.novalocal sudo[98801]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./allow-list.yaml Jan 22 13:32:47 np0005592561.novalocal sudo[98801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:47 np0005592561.novalocal sudo[98801]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98804]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf.sample Jan 22 13:32:48 np0005592561.novalocal sudo[98804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98804]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98807]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./rbac-persona-accounts.yaml.sample Jan 22 13:32:48 np0005592561.novalocal sudo[98807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98807]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98810]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf Jan 22 13:32:48 np0005592561.novalocal sudo[98810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98810]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98813]: root : PWD=/var/log/weirdo-project/logs/etc/rsyslog.d ; USER=root ; COMMAND=/bin/chmod 644 ./21-cloudinit.conf Jan 22 13:32:48 np0005592561.novalocal sudo[98813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98813]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98816]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyslog.conf Jan 22 13:32:48 np0005592561.novalocal sudo[98816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98816]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98819]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmqadmin.conf Jan 22 13:32:48 np0005592561.novalocal sudo[98819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98819]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98822]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./enabled_plugins Jan 22 13:32:48 np0005592561.novalocal sudo[98822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98822]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98825]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq-env.conf Jan 22 13:32:48 np0005592561.novalocal sudo[98825]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98825]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98828]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./inetrc Jan 22 13:32:48 np0005592561.novalocal sudo[98828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98828]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98831]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.config Jan 22 13:32:48 np0005592561.novalocal sudo[98831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98831]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98834]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.conf Jan 22 13:32:48 np0005592561.novalocal sudo[98834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98834]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98837]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592561.novalocal.pem Jan 22 13:32:48 np0005592561.novalocal sudo[98837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98837]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98840]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./my.cnf Jan 22 13:32:48 np0005592561.novalocal sudo[98840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98840]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98843]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_gssapi.cnf Jan 22 13:32:48 np0005592561.novalocal sudo[98843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98843]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98846]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./enable_encryption.preset Jan 22 13:32:48 np0005592561.novalocal sudo[98846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98846]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98849]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb-server.cnf Jan 22 13:32:48 np0005592561.novalocal sudo[98849]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98849]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98852]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./spider.cnf Jan 22 13:32:48 np0005592561.novalocal sudo[98852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98852]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98855]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mysql-clients.cnf Jan 22 13:32:48 np0005592561.novalocal sudo[98855]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98855]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98858]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./server.cnf Jan 22 13:32:48 np0005592561.novalocal sudo[98858]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98858]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98861]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./client.cnf Jan 22 13:32:48 np0005592561.novalocal sudo[98861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98861]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98864]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592561.novalocal.pem Jan 22 13:32:48 np0005592561.novalocal sudo[98864]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98864]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98867]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./iscsid.conf Jan 22 13:32:48 np0005592561.novalocal sudo[98867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98867]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98870]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./initiatorname.iscsi Jan 22 13:32:48 np0005592561.novalocal sudo[98870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98870]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98873]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlockd.conf Jan 22 13:32:48 np0005592561.novalocal sudo[98873]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98873]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98876]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlogd.conf Jan 22 13:32:48 np0005592561.novalocal sudo[98876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98876]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98879]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtproxyd.conf Jan 22 13:32:48 np0005592561.novalocal sudo[98879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98879]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:48 np0005592561.novalocal sudo[98882]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-admin.conf Jan 22 13:32:48 np0005592561.novalocal sudo[98882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:48 np0005592561.novalocal sudo[98882]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98885]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt.conf Jan 22 13:32:49 np0005592561.novalocal sudo[98885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98885]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98888]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtstoraged.conf Jan 22 13:32:49 np0005592561.novalocal sudo[98888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98888]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98891]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirtd.conf Jan 22 13:32:49 np0005592561.novalocal sudo[98891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98891]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98895]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtinterfaced.conf Jan 22 13:32:49 np0005592561.novalocal sudo[98895]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98895]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98898]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./network.conf Jan 22 13:32:49 np0005592561.novalocal sudo[98898]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98898]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98901]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnetworkd.conf Jan 22 13:32:49 np0005592561.novalocal sudo[98901]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98901]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98904]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnodedevd.conf Jan 22 13:32:49 np0005592561.novalocal sudo[98904]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98904]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98907]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnwfilterd.conf Jan 22 13:32:49 np0005592561.novalocal sudo[98907]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98907]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98910]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-lockd.conf Jan 22 13:32:49 np0005592561.novalocal sudo[98910]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98910]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98913]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu.conf Jan 22 13:32:49 np0005592561.novalocal sudo[98913]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98913]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98916]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtqemud.conf Jan 22 13:32:49 np0005592561.novalocal sudo[98916]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98916]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98919]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtsecretd.conf Jan 22 13:32:49 np0005592561.novalocal sudo[98919]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98919]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98922]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 644 ./default.xml Jan 22 13:32:49 np0005592561.novalocal sudo[98922]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98922]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98925]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Jan 22 13:32:49 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Deactivated successfully. Jan 22 13:32:49 np0005592561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Consumed 1.171s CPU time. Jan 22 13:32:49 np0005592561.novalocal sudo[98925]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98925]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98928]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Jan 22 13:32:49 np0005592561.novalocal sudo[98928]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98928]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98931]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-privkey.pem Jan 22 13:32:49 np0005592561.novalocal sudo[98931]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98931]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98934]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./default.conf Jan 22 13:32:49 np0005592561.novalocal sudo[98934]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98934]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98937]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./.conf.db.~lock~ Jan 22 13:32:49 np0005592561.novalocal sudo[98937]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98937]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98940]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./conf.db Jan 22 13:32:49 np0005592561.novalocal sudo[98940]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98940]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98943]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./system-id.conf Jan 22 13:32:49 np0005592561.novalocal sudo[98943]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98943]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98946]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-req.pem Jan 22 13:32:49 np0005592561.novalocal sudo[98946]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98946]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98949]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Jan 22 13:32:49 np0005592561.novalocal sudo[98949]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98949]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98952]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-req.pem Jan 22 13:32:49 np0005592561.novalocal sudo[98952]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98952]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98955]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Jan 22 13:32:49 np0005592561.novalocal sudo[98955]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98955]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98958]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-req.pem Jan 22 13:32:49 np0005592561.novalocal sudo[98958]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98958]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:49 np0005592561.novalocal sudo[98961]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-cert.pem Jan 22 13:32:49 np0005592561.novalocal sudo[98961]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:49 np0005592561.novalocal sudo[98961]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[98964]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./httpd.conf Jan 22 13:32:50 np0005592561.novalocal sudo[98964]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[98964]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[98967]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./magic Jan 22 13:32:50 np0005592561.novalocal sudo[98967]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[98967]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[98970]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./ports.conf Jan 22 13:32:50 np0005592561.novalocal sudo[98970]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[98970]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[98973]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-cinder_wsgi.conf Jan 22 13:32:50 np0005592561.novalocal sudo[98973]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[98973]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[98976]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-glance_wsgi.conf Jan 22 13:32:50 np0005592561.novalocal sudo[98976]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[98976]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[98979]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-keystone_wsgi.conf Jan 22 13:32:50 np0005592561.novalocal sudo[98979]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[98979]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[98982]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-manila_wsgi.conf Jan 22 13:32:50 np0005592561.novalocal sudo[98982]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[98982]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[98985]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-neutron_wsgi.conf Jan 22 13:32:50 np0005592561.novalocal sudo[98985]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[98985]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[98988]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_api_wsgi.conf Jan 22 13:32:50 np0005592561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 13:32:50 np0005592561.novalocal systemd[1]: setroubleshootd.service: Consumed 1.324s CPU time. Jan 22 13:32:50 np0005592561.novalocal sudo[98988]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[98988]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[98991]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_metadata_wsgi.conf Jan 22 13:32:50 np0005592561.novalocal sudo[98991]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[98991]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[98994]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-octavia_wsgi.conf Jan 22 13:32:50 np0005592561.novalocal sudo[98994]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[98994]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[98998]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-placement_wsgi.conf Jan 22 13:32:50 np0005592561.novalocal sudo[98998]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[98998]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[99001]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_ssl_vhost.conf Jan 22 13:32:50 np0005592561.novalocal sudo[99001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[99001]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[99004]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_vhost.conf Jan 22 13:32:50 np0005592561.novalocal sudo[99004]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[99004]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[99007]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./openstack-dashboard.conf Jan 22 13:32:50 np0005592561.novalocal sudo[99007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[99007]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[99010]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.conf Jan 22 13:32:50 np0005592561.novalocal sudo[99010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[99010]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[99013]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.load Jan 22 13:32:50 np0005592561.novalocal sudo[99013]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[99013]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[99016]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_core.load Jan 22 13:32:50 np0005592561.novalocal sudo[99016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[99016]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[99019]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_host.load Jan 22 13:32:50 np0005592561.novalocal sudo[99019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[99019]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[99022]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./filter.load Jan 22 13:32:50 np0005592561.novalocal sudo[99022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[99022]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[99025]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./log_config.load Jan 22 13:32:50 np0005592561.novalocal sudo[99025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[99025]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[99028]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.conf Jan 22 13:32:50 np0005592561.novalocal sudo[99028]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[99028]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[99031]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.load Jan 22 13:32:50 np0005592561.novalocal sudo[99031]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[99031]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[99034]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.conf Jan 22 13:32:50 np0005592561.novalocal sudo[99034]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[99034]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[99037]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.load Jan 22 13:32:50 np0005592561.novalocal sudo[99037]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[99037]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[99041]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.conf Jan 22 13:32:50 np0005592561.novalocal sudo[99041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[99041]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:50 np0005592561.novalocal sudo[99044]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.load Jan 22 13:32:50 np0005592561.novalocal sudo[99044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:50 np0005592561.novalocal sudo[99044]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99047]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./socache_shmcb.load Jan 22 13:32:51 np0005592561.novalocal sudo[99047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99047]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99050]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.conf Jan 22 13:32:51 np0005592561.novalocal sudo[99050]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99050]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99053]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.load Jan 22 13:32:51 np0005592561.novalocal sudo[99053]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99053]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99056]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./systemd.load Jan 22 13:32:51 np0005592561.novalocal sudo[99056]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99056]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99059]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./unixd.load Jan 22 13:32:51 np0005592561.novalocal sudo[99059]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99059]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99062]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.conf Jan 22 13:32:51 np0005592561.novalocal sudo[99062]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99062]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99065]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.load Jan 22 13:32:51 np0005592561.novalocal sudo[99065]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99065]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99068]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592561.novalocal.pem Jan 22 13:32:51 np0005592561.novalocal sudo[99068]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99068]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99071]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf Jan 22 13:32:51 np0005592561.novalocal sudo[99071]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99071]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99074]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf Jan 22 13:32:51 np0005592561.novalocal sudo[99074]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99074]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99077]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf.puppet Jan 22 13:32:51 np0005592561.novalocal sudo[99077]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99077]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99080]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf.puppet Jan 22 13:32:51 np0005592561.novalocal sudo[99080]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99080]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99083]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./.secret_key_store Jan 22 13:32:51 np0005592561.novalocal sudo[99083]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99083]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99086]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_policy.yaml.txt Jan 22 13:32:51 np0005592561.novalocal sudo[99086]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99086]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99089]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./README.txt Jan 22 13:32:51 np0005592561.novalocal sudo[99089]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99089]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99092]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.yaml Jan 22 13:32:51 np0005592561.novalocal sudo[99092]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99092]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99095]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./glance.yaml Jan 22 13:32:51 np0005592561.novalocal sudo[99095]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99095]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99098]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.yaml Jan 22 13:32:51 np0005592561.novalocal sudo[99098]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99098]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99101]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.yaml Jan 22 13:32:51 np0005592561.novalocal sudo[99101]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99101]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99104]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./nova.yaml Jan 22 13:32:51 np0005592561.novalocal sudo[99104]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99104]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99107]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./manila.yaml Jan 22 13:32:51 np0005592561.novalocal sudo[99107]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99107]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99110]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./glance_policy.yaml.txt Jan 22 13:32:51 np0005592561.novalocal sudo[99110]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99110]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99113]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_policy.yaml.txt Jan 22 13:32:51 np0005592561.novalocal sudo[99113]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99113]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:51 np0005592561.novalocal sudo[99116]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./local_settings.txt Jan 22 13:32:51 np0005592561.novalocal sudo[99116]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:51 np0005592561.novalocal sudo[99116]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99119]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_90_manila_shares.py Jan 22 13:32:52 np0005592561.novalocal sudo[99119]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99119]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99122]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_10_set_custom_theme.py.example Jan 22 13:32:52 np0005592561.novalocal sudo[99122]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99122]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99125]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_11_toggle_angular_features.py.example Jan 22 13:32:52 np0005592561.novalocal sudo[99125]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99125]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99128]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_2010_integration_tests_deprecated.py.example Jan 22 13:32:52 np0005592561.novalocal sudo[99128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99128]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99131]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_20_integration_tests_scaffolds.py.example Jan 22 13:32:52 np0005592561.novalocal sudo[99131]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99131]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99134]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_9030_profiler_settings.py.example Jan 22 13:32:52 np0005592561.novalocal sudo[99134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99134]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99137]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./manila_policy.yaml.txt Jan 22 13:32:52 np0005592561.novalocal sudo[99137]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99137]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99140]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_policy.yaml.txt Jan 22 13:32:52 np0005592561.novalocal sudo[99140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99140]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99143]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./api-extensions.yaml Jan 22 13:32:52 np0005592561.novalocal sudo[99143]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99143]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99146]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./nova_policy.yaml.txt Jan 22 13:32:52 np0005592561.novalocal sudo[99146]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99146]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99149]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592561.novalocal.pem Jan 22 13:32:52 np0005592561.novalocal sudo[99149]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99149]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99152]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyncd.conf Jan 22 13:32:52 np0005592561.novalocal sudo[99152]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99152]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99155]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./redhat.repo Jan 22 13:32:52 np0005592561.novalocal sudo[99155]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99155]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99158]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos-addons.repo Jan 22 13:32:52 np0005592561.novalocal sudo[99158]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99158]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99161]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos.repo Jan 22 13:32:52 np0005592561.novalocal sudo[99161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99161]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99164]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean-deps.repo Jan 22 13:32:52 np0005592561.novalocal sudo[99164]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99164]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99167]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean.repo Jan 22 13:32:52 np0005592561.novalocal sudo[99167]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99167]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99170]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-Messaging-rabbitmq.repo Jan 22 13:32:52 np0005592561.novalocal sudo[99170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99170]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99173]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./passwd Jan 22 13:32:52 np0005592561.novalocal sudo[99173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99173]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99176]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./group Jan 22 13:32:52 np0005592561.novalocal sudo[99176]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99176]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99179]: root : PWD=/var/log/weirdo-project/logs/etc/openstack/puppet ; USER=root ; COMMAND=/bin/chmod 644 ./admin-clouds.yaml Jan 22 13:32:52 np0005592561.novalocal sudo[99179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99179]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99182]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./fstab Jan 22 13:32:52 np0005592561.novalocal sudo[99182]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99182]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99185]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./backup.log Jan 22 13:32:52 np0005592561.novalocal sudo[99185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99185]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99188]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-api.log Jan 22 13:32:52 np0005592561.novalocal sudo[99188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99188]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:52 np0005592561.novalocal sudo[99191]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-manage.log Jan 22 13:32:52 np0005592561.novalocal sudo[99191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:52 np0005592561.novalocal sudo[99191]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99194]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Jan 22 13:32:53 np0005592561.novalocal sudo[99194]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99194]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99197]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./volume.log Jan 22 13:32:53 np0005592561.novalocal sudo[99197]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99197]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99200]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./api.log Jan 22 13:32:53 np0005592561.novalocal sudo[99200]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99200]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99203]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./cache.log Jan 22 13:32:53 np0005592561.novalocal sudo[99203]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99203]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99206]: root : PWD=/var/log/weirdo-project/logs/horizon ; USER=root ; COMMAND=/bin/chmod 644 ./horizon.log Jan 22 13:32:53 np0005592561.novalocal sudo[99206]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99206]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99209]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone-manage.log Jan 22 13:32:53 np0005592561.novalocal sudo[99209]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99209]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99212]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.log Jan 22 13:32:53 np0005592561.novalocal sudo[99212]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99212]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99215]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-manage.log Jan 22 13:32:53 np0005592561.novalocal sudo[99215]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99215]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99218]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Jan 22 13:32:53 np0005592561.novalocal sudo[99218]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99218]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99221]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./share.log Jan 22 13:32:53 np0005592561.novalocal sudo[99221]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99221]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99224]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Jan 22 13:32:53 np0005592561.novalocal sudo[99224]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99224]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99227]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./data.log Jan 22 13:32:53 np0005592561.novalocal sudo[99227]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99227]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99230]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rpc-server.log Jan 22 13:32:53 np0005592561.novalocal sudo[99230]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99230]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99233]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./periodic-workers.log Jan 22 13:32:53 np0005592561.novalocal sudo[99233]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99233]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99236]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron-ovn-agent.log Jan 22 13:32:53 np0005592561.novalocal sudo[99236]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99236]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99239]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-vpn-agent.log Jan 22 13:32:53 np0005592561.novalocal sudo[99239]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99239]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99242]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-maintenance-worker.log Jan 22 13:32:53 np0005592561.novalocal sudo[99242]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99242]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99245]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Jan 22 13:32:53 np0005592561.novalocal sudo[99245]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99245]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99248]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./app.log Jan 22 13:32:53 np0005592561.novalocal sudo[99248]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99248]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99251]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-manage.log Jan 22 13:32:53 np0005592561.novalocal sudo[99251]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99251]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99254]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-novncproxy.log Jan 22 13:32:53 np0005592561.novalocal sudo[99254]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99254]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99257]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-conductor.log Jan 22 13:32:53 np0005592561.novalocal sudo[99257]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99257]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99260]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.log Jan 22 13:32:53 np0005592561.novalocal sudo[99260]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99260]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99263]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-scheduler.log Jan 22 13:32:53 np0005592561.novalocal sudo[99263]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99263]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99266]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-api.log Jan 22 13:32:53 np0005592561.novalocal sudo[99266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:53 np0005592561.novalocal sudo[99266]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:53 np0005592561.novalocal sudo[99269]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./driver-agent.log Jan 22 13:32:54 np0005592561.novalocal sudo[99269]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99269]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99272]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./health-manager.log Jan 22 13:32:54 np0005592561.novalocal sudo[99272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99272]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99275]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./housekeeping.log Jan 22 13:32:54 np0005592561.novalocal sudo[99275]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99275]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99278]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./worker.log Jan 22 13:32:54 np0005592561.novalocal sudo[99278]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99278]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99281]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-nb.log Jan 22 13:32:54 np0005592561.novalocal sudo[99281]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99281]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99284]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-sb.log Jan 22 13:32:54 np0005592561.novalocal sudo[99284]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99284]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99287]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller.log Jan 22 13:32:54 np0005592561.novalocal sudo[99287]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99287]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99290]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd.log Jan 22 13:32:54 np0005592561.novalocal sudo[99290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99290]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99293]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Jan 22 13:32:54 np0005592561.novalocal sudo[99293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99293]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99297]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-connection.txt Jan 22 13:32:54 np0005592561.novalocal sudo[99297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99297]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99300]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-ssl.txt Jan 22 13:32:54 np0005592561.novalocal sudo[99300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99300]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99303]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Jan 22 13:32:54 np0005592561.novalocal sudo[99303]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99303]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99306]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-connection.txt Jan 22 13:32:54 np0005592561.novalocal sudo[99306]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99306]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99309]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-ssl.txt Jan 22 13:32:54 np0005592561.novalocal sudo[99309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99309]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99312]: root : PWD=/var/log/weirdo-project/logs/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.log Jan 22 13:32:54 np0005592561.novalocal sudo[99312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99312]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99315]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.conf Jan 22 13:32:54 np0005592561.novalocal sudo[99315]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99315]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99318]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./syslog.txt Jan 22 13:32:54 np0005592561.novalocal sudo[99318]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99318]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99321]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6.log Jan 22 13:32:54 np0005592561.novalocal sudo[99321]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99321]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99324]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6_upgrade.log Jan 22 13:32:54 np0005592561.novalocal sudo[99324]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99324]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99327]: root : PWD=/var/log/weirdo-project/logs/mariadb ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb.log Jan 22 13:32:54 np0005592561.novalocal sudo[99327]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99327]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99330]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./dstat.log Jan 22 13:32:54 np0005592561.novalocal sudo[99330]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99330]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99333]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iostat.log Jan 22 13:32:54 np0005592561.novalocal sudo[99333]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99333]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99336]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iotop.log Jan 22 13:32:54 np0005592561.novalocal sudo[99336]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99336]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99339]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./virsh-net-list.txt Jan 22 13:32:54 np0005592561.novalocal sudo[99339]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99339]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99342]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vswitchd.log Jan 22 13:32:54 np0005592561.novalocal sudo[99342]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99342]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99345]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-pki.log Jan 22 13:32:54 np0005592561.novalocal sudo[99345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99345]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99348]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server.log Jan 22 13:32:54 np0005592561.novalocal sudo[99348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99348]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:54 np0005592561.novalocal sudo[99351]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./90-cloud-init-users Jan 22 13:32:54 np0005592561.novalocal sudo[99351]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:54 np0005592561.novalocal sudo[99351]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99354]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./zuul Jan 22 13:32:55 np0005592561.novalocal sudo[99354]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99354]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99357]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./glance Jan 22 13:32:55 np0005592561.novalocal sudo[99357]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99357]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99360]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./manila Jan 22 13:32:55 np0005592561.novalocal sudo[99360]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99360]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99363]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./neutron Jan 22 13:32:55 np0005592561.novalocal sudo[99363]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99363]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99366]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./nova Jan 22 13:32:55 np0005592561.novalocal sudo[99366]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99366]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99369]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Jan 22 13:32:55 np0005592561.novalocal sudo[99369]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99369]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99372]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./sudoers.txt Jan 22 13:32:55 np0005592561.novalocal sudo[99372]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99372]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99375]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./error_log Jan 22 13:32:55 np0005592561.novalocal sudo[99375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99375]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99378]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_error.log Jan 22 13:32:55 np0005592561.novalocal sudo[99378]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99378]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99381]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_error.log Jan 22 13:32:55 np0005592561.novalocal sudo[99381]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99381]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99384]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_error_ssl.log Jan 22 13:32:55 np0005592561.novalocal sudo[99384]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99384]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99387]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_error_ssl.log Jan 22 13:32:55 np0005592561.novalocal sudo[99387]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99387]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99390]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_error_ssl.log Jan 22 13:32:55 np0005592561.novalocal sudo[99390]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99390]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99393]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_error_ssl.log Jan 22 13:32:55 np0005592561.novalocal sudo[99393]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99393]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99396]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_wsgi_error_ssl.log Jan 22 13:32:55 np0005592561.novalocal sudo[99396]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99396]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99399]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_error_ssl.log Jan 22 13:32:55 np0005592561.novalocal sudo[99399]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99399]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99402]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_error_ssl.log Jan 22 13:32:55 np0005592561.novalocal sudo[99402]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99402]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99405]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_error_ssl.log Jan 22 13:32:55 np0005592561.novalocal sudo[99405]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99405]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99408]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_error_ssl.log Jan 22 13:32:55 np0005592561.novalocal sudo[99408]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99408]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99411]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_access.log Jan 22 13:32:55 np0005592561.novalocal sudo[99411]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99411]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99414]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_access.log Jan 22 13:32:55 np0005592561.novalocal sudo[99414]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99414]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99417]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_access_ssl.log Jan 22 13:32:55 np0005592561.novalocal sudo[99417]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99417]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99420]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_access_ssl.log Jan 22 13:32:55 np0005592561.novalocal sudo[99420]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99420]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99423]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_access_ssl.log Jan 22 13:32:55 np0005592561.novalocal sudo[99423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99423]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99426]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_access_ssl.log Jan 22 13:32:55 np0005592561.novalocal sudo[99426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:55 np0005592561.novalocal sudo[99426]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:55 np0005592561.novalocal sudo[99429]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_wsgi_access_ssl.log Jan 22 13:32:55 np0005592561.novalocal sudo[99429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99429]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99432]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_access_ssl.log Jan 22 13:32:56 np0005592561.novalocal sudo[99432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99432]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99435]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_access_ssl.log Jan 22 13:32:56 np0005592561.novalocal sudo[99435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99435]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99438]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_access_ssl.log Jan 22 13:32:56 np0005592561.novalocal sudo[99438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99438]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99441]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_access_ssl.log Jan 22 13:32:56 np0005592561.novalocal sudo[99441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99441]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99444]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.log Jan 22 13:32:56 np0005592561.novalocal sudo[99444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99444]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99447]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.log Jan 22 13:32:56 np0005592561.novalocal sudo[99447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99447]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99450]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./audit.log.txt Jan 22 13:32:56 np0005592561.novalocal sudo[99450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99450]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99453]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Jan 22 13:32:56 np0005592561.novalocal sudo[99453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99453]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99456]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./nova Jan 22 13:32:56 np0005592561.novalocal sudo[99456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99456]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99459]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./manila Jan 22 13:32:56 np0005592561.novalocal sudo[99459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99459]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99462]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./glance Jan 22 13:32:56 np0005592561.novalocal sudo[99462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99462]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99465]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./keystone Jan 22 13:32:56 np0005592561.novalocal sudo[99465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99465]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99468]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf.txt Jan 22 13:32:56 np0005592561.novalocal sudo[99468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99468]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99471]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./rpm-qa.txt Jan 22 13:32:56 np0005592561.novalocal sudo[99471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99471]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99474]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./repolist.txt Jan 22 13:32:56 np0005592561.novalocal sudo[99474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99474]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99477]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./installed-packages.txt Jan 22 13:32:56 np0005592561.novalocal sudo[99477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99477]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99480]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./modulelist.txt Jan 22 13:32:56 np0005592561.novalocal sudo[99480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99480]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99483]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.log Jan 22 13:32:56 np0005592561.novalocal sudo[99483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99483]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99486]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.rpm.log Jan 22 13:32:56 np0005592561.novalocal sudo[99486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99486]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99489]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./gem-list.txt Jan 22 13:32:56 np0005592561.novalocal sudo[99489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99489]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99492]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./df.txt Jan 22 13:32:56 np0005592561.novalocal sudo[99492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99492]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99495]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./free.txt Jan 22 13:32:56 np0005592561.novalocal sudo[99495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99495]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:56 np0005592561.novalocal sudo[99498]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lsmod.txt Jan 22 13:32:56 np0005592561.novalocal sudo[99498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:56 np0005592561.novalocal sudo[99498]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99501]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./cpuinfo.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99501]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99504]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ps.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99504]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99507]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ip_-d_address.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99507]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99510]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./brctl_show.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99510]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99510]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99513]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99513]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99513]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99516]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99516]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99516]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99519]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99519]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99522]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./netstat.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99522]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99525]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./systemctl.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99525]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99528]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iptables.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99528]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99531]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./mount.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99531]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99534]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./losetup_-al.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99534]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99537]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lvm.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99537]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99540]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./semanage-boolean-list.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99540]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99545]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99545]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99548]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./nova.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99548]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99551]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./placement.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99551]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99554]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99554]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99557]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./glance.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99557]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99560]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99560]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99563]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./manila.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99563]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99566]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99566]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99569]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./nova-cell_v2.txt Jan 22 13:32:57 np0005592561.novalocal sudo[99569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99569]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[98388]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99574]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chown -R 0:0 /var/log/weirdo-project/logs Jan 22 13:32:57 np0005592561.novalocal sudo[99574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:57 np0005592561.novalocal sudo[99574]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:57 np0005592561.novalocal sudo[99577]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type l -execdir sudo rm -f {} ; Jan 22 13:32:57 np0005592561.novalocal sudo[99577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99580]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Jan 22 13:32:58 np0005592561.novalocal sudo[99580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99580]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99583]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./glance_cinder_store.filters Jan 22 13:32:58 np0005592561.novalocal sudo[99583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99583]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99586]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Jan 22 13:32:58 np0005592561.novalocal sudo[99586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99586]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99589]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./plugin.ini Jan 22 13:32:58 np0005592561.novalocal sudo[99589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99589]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99592]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./ovn.ini Jan 22 13:32:58 np0005592561.novalocal sudo[99592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99592]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99595]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn.ini Jan 22 13:32:58 np0005592561.novalocal sudo[99595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99595]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99598]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks/autostart ; USER=root ; COMMAND=/bin/rm -f ./default.xml Jan 22 13:32:58 np0005592561.novalocal sudo[99598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99598]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99601]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_admin_add_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99601]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99601]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99604]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_project_add_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99604]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99607]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_admin_add_shares_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99607]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99607]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99610]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_project_add_shares_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99610]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99610]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99613]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_admin_add_share_snapshots_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99613]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99613]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99616]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_project_add_share_snapshots_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99616]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99616]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99619]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9030_manila_admin_add_share_types_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99619]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99619]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99622]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_admin_add_share_networks_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99622]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99622]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99625]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_project_add_share_networks_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99625]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99625]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99628]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_admin_add_security_services_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99628]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99628]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99631]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_project_add_security_services_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99631]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99631]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99634]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9060_manila_admin_add_share_servers_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99634]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99634]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99637]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9070_manila_admin_add_share_instances_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99637]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99637]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99640]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_admin_add_share_groups_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99640]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99640]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99643]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_project_add_share_groups_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99643]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99643]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99646]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_admin_add_share_group_snapshots_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99646]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99649]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_project_add_share_group_snapshots_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99649]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99649]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99652]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9090_manila_admin_add_share_group_types_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99652]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:58 np0005592561.novalocal sudo[99655]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_admin_add_user_messages_panel_to_share_panel_group.py Jan 22 13:32:58 np0005592561.novalocal sudo[99655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:58 np0005592561.novalocal sudo[99655]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99658]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_project_add_user_messages_panel_to_share_panel_group.py Jan 22 13:32:59 np0005592561.novalocal sudo[99658]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99658]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99577]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99662]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20260122_132843.log /var/log/weirdo-project/logs/puppet-20260122_132843.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99662]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99665]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet.log /var/log/weirdo-project/logs/puppet.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99665]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99668]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/backup.log /var/log/weirdo-project/logs/cinder/backup.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99668]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99671]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-api.log /var/log/weirdo-project/logs/cinder/cinder-api.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99671]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99674]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-manage.log /var/log/weirdo-project/logs/cinder/cinder-manage.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99674]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99677]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/scheduler.log /var/log/weirdo-project/logs/cinder/scheduler.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99677]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99680]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/volume.log /var/log/weirdo-project/logs/cinder/volume.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99680]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99683]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/api.log /var/log/weirdo-project/logs/glance/api.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99683]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99686]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/cache.log /var/log/weirdo-project/logs/glance/cache.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99686]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99689]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/horizon/horizon.log /var/log/weirdo-project/logs/horizon/horizon.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99689]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99689]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99692]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone-manage.log /var/log/weirdo-project/logs/keystone/keystone-manage.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99692]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99692]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99695]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone.log /var/log/weirdo-project/logs/keystone/keystone.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99695]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99695]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99698]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-manage.log /var/log/weirdo-project/logs/manila/manila-manage.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99698]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99698]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99701]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/scheduler.log /var/log/weirdo-project/logs/manila/scheduler.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99701]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99701]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99704]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/share.log /var/log/weirdo-project/logs/manila/share.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99704]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99704]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99707]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/privsep-helper.log /var/log/weirdo-project/logs/manila/privsep-helper.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99707]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99707]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99710]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/data.log /var/log/weirdo-project/logs/manila/data.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99710]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99713]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/rpc-server.log /var/log/weirdo-project/logs/neutron/rpc-server.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99713]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99716]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/periodic-workers.log /var/log/weirdo-project/logs/neutron/periodic-workers.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99716]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99716]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99719]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.log /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99719]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99719]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99722]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.log /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99722]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99722]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99725]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-maintenance-worker.log /var/log/weirdo-project/logs/neutron/ovn-maintenance-worker.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99725]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99725]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99728]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/privsep-helper.log /var/log/weirdo-project/logs/neutron/privsep-helper.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99728]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99728]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99731]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/app.log /var/log/weirdo-project/logs/neutron/app.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99731]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99731]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99734]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-manage.log /var/log/weirdo-project/logs/nova/nova-manage.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99734]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99734]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99737]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-novncproxy.log /var/log/weirdo-project/logs/nova/nova-novncproxy.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99737]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99737]: pam_unix(sudo:session): session closed for user root Jan 22 13:32:59 np0005592561.novalocal sudo[99740]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-conductor.log /var/log/weirdo-project/logs/nova/nova-conductor.txt Jan 22 13:32:59 np0005592561.novalocal sudo[99740]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:32:59 np0005592561.novalocal sudo[99740]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 13:33:00 np0005592561.novalocal sudo[99743]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-compute.log /var/log/weirdo-project/logs/nova/nova-compute.txt Jan 22 13:33:00 np0005592561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 13:33:00 np0005592561.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 13:33:00 np0005592561.novalocal sudo[99743]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99743]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99747]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-scheduler.log /var/log/weirdo-project/logs/nova/nova-scheduler.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99747]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99747]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99750]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-api.log /var/log/weirdo-project/logs/nova/nova-api.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99750]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99750]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99753]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/driver-agent.log /var/log/weirdo-project/logs/octavia/driver-agent.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99753]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99756]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/health-manager.log /var/log/weirdo-project/logs/octavia/health-manager.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99756]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99759]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/housekeeping.log /var/log/weirdo-project/logs/octavia/housekeeping.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99759]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99762]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/worker.log /var/log/weirdo-project/logs/octavia/worker.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99762]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99765]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99765]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99768]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99768]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99771]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-controller.log /var/log/weirdo-project/logs/ovn/ovn-controller.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99771]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99774]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-northd.log /var/log/weirdo-project/logs/ovn/ovn-northd.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99774]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99777]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/placement/placement.log /var/log/weirdo-project/logs/placement/placement.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99777]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99780]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99780]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99783]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99783]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99786]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/mariadb/mariadb.log /var/log/weirdo-project/logs/mariadb/mariadb.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99786]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99789]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dstat.log /var/log/weirdo-project/logs/dstat.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99789]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99792]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iostat.log /var/log/weirdo-project/logs/iostat.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99792]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99795]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iotop.log /var/log/weirdo-project/logs/iotop.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99795]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99798]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.log /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99798]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99801]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-pki.log /var/log/weirdo-project/logs/openvswitch/ovs-pki.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99801]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99804]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovsdb-server.log /var/log/weirdo-project/logs/openvswitch/ovsdb-server.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99804]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:00 np0005592561.novalocal sudo[99807]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_error.log /var/log/weirdo-project/logs/apache/horizon_error.txt Jan 22 13:33:00 np0005592561.novalocal sudo[99807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:00 np0005592561.novalocal sudo[99807]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:01 np0005592561.novalocal sudo[99810]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_error.log /var/log/weirdo-project/logs/apache/horizon_ssl_error.txt Jan 22 13:33:01 np0005592561.novalocal sudo[99810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:01 np0005592561.novalocal sudo[99810]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:01 np0005592561.novalocal sudo[99813]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.txt Jan 22 13:33:01 np0005592561.novalocal sudo[99813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:01 np0005592561.novalocal sudo[99813]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:01 np0005592561.novalocal sudo[99817]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.txt Jan 22 13:33:01 np0005592561.novalocal sudo[99817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:01 np0005592561.novalocal sudo[99817]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:01 np0005592561.novalocal sudo[99821]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.txt Jan 22 13:33:01 np0005592561.novalocal sudo[99821]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:01 np0005592561.novalocal sudo[99821]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:01 np0005592561.novalocal sudo[99824]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.txt Jan 22 13:33:01 np0005592561.novalocal sudo[99824]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:01 np0005592561.novalocal sudo[99824]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:01 np0005592561.novalocal sudo[99827]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/neutron_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/neutron_wsgi_error_ssl.txt Jan 22 13:33:01 np0005592561.novalocal sudo[99827]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:01 np0005592561.novalocal sudo[99827]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:01 np0005592561.novalocal sudo[99830]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.txt Jan 22 13:33:01 np0005592561.novalocal sudo[99830]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:01 np0005592561.novalocal sudo[99830]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:01 np0005592561.novalocal sudo[99833]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.txt Jan 22 13:33:01 np0005592561.novalocal sudo[99833]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:01 np0005592561.novalocal sudo[99833]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99836]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99836]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99836]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99839]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99839]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99839]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99842]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_access.log /var/log/weirdo-project/logs/apache/horizon_access.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99842]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99845]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_access.log /var/log/weirdo-project/logs/apache/horizon_ssl_access.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99845]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99845]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99848]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99848]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99848]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99851]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99851]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99851]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99854]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99854]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99857]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99857]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99860]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/neutron_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/neutron_wsgi_access_ssl.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99860]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99863]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99863]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99863]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99866]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99866]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99869]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99869]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99872]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99872]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99875]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/redis.log /var/log/weirdo-project/logs/redis/redis.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99875]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99878]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/sentinel.log /var/log/weirdo-project/logs/redis/sentinel.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99878]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99881]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.log /var/log/weirdo-project/logs/dnf/dnf.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99881]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99884]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.rpm.log /var/log/weirdo-project/logs/dnf/dnf.rpm.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99884]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99888]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99888]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99891]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/zuul /var/log/weirdo-project/logs/sudoers.d/zuul.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99891]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99894]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/glance /var/log/weirdo-project/logs/sudoers.d/glance.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99894]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99897]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/manila /var/log/weirdo-project/logs/sudoers.d/manila.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99897]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99900]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/neutron /var/log/weirdo-project/logs/sudoers.d/neutron.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99900]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99903]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/nova /var/log/weirdo-project/logs/sudoers.d/nova.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99903]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:02 np0005592561.novalocal sudo[99906]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/cinder /var/log/weirdo-project/logs/sudoers.d/cinder.txt Jan 22 13:33:02 np0005592561.novalocal sudo[99906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:02 np0005592561.novalocal sudo[99906]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99909]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99909]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99912]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99912]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99915]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99915]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99918]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99918]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99921]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99921]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99924]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99924]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99927]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99927]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99927]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99930]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99930]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99930]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99933]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99933]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99933]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99936]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99936]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99936]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99939]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99939]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99942]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99942]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99945]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99945]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99948]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99948]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99951]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99951]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99954]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99954]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99957]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99957]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99960]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99960]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99963]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99963]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99966]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99966]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99969]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99969]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99972]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99972]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99975]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99975]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99978]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99978]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99981]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99981]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99984]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99984]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:03 np0005592561.novalocal sudo[99987]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/policy.yaml /var/log/weirdo-project/logs/etc/cinder/policy.yaml.txt Jan 22 13:33:03 np0005592561.novalocal sudo[99987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:03 np0005592561.novalocal sudo[99987]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[99990]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/api-paste.ini /var/log/weirdo-project/logs/etc/cinder/api-paste.ini.txt Jan 22 13:33:04 np0005592561.novalocal sudo[99990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[99990]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[99993]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/cinder.conf /var/log/weirdo-project/logs/etc/cinder/cinder.conf.txt Jan 22 13:33:04 np0005592561.novalocal sudo[99993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[99993]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[99996]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/resource_filters.json /var/log/weirdo-project/logs/etc/cinder/resource_filters.json.txt Jan 22 13:33:04 np0005592561.novalocal sudo[99996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[99996]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[99999]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf.txt Jan 22 13:33:04 np0005592561.novalocal sudo[99999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[99999]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100003]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005592561.novalocal.pem /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005592561.novalocal.pem.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100003]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100006]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100006]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100009]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api.conf /var/log/weirdo-project/logs/etc/glance/glance-api.conf.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100009]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100012]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-cache.conf /var/log/weirdo-project/logs/etc/glance/glance-cache.conf.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100012]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100015]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100015]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100018]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100018]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100021]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-swift.conf /var/log/weirdo-project/logs/etc/glance/glance-swift.conf.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100021]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100024]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100024]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100024]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100027]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100027]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100027]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100030]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100030]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100033]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100033]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100036]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100036]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100039]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100039]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100042]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100042]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100045]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100045]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100048]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100048]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100051]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100051]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100054]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100054]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100057]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100057]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100060]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100060]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:04 np0005592561.novalocal sudo[100063]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json.txt Jan 22 13:33:04 np0005592561.novalocal sudo[100063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:04 np0005592561.novalocal sudo[100063]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100066]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100066]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100069]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100069]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100072]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100072]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100075]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100075]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100078]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100078]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100081]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100081]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100084]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100084]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100087]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100087]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100087]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100090]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100090]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100093]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100093]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100096]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100096]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100099]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100099]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100102]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100102]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100105]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100105]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100108]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100108]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100111]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100111]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100114]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100114]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100117]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100117]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100120]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100120]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100123]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/rootwrap.conf /var/log/weirdo-project/logs/etc/glance/rootwrap.conf.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100123]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100126]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/schema-image.json /var/log/weirdo-project/logs/etc/glance/schema-image.json.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100126]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100129]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/policy.yaml /var/log/weirdo-project/logs/etc/glance/policy.yaml.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100129]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:05 np0005592561.novalocal sudo[100132]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005592561.novalocal.pem /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005592561.novalocal.pem.txt Jan 22 13:33:05 np0005592561.novalocal sudo[100132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:05 np0005592561.novalocal sudo[100132]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100135]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100135]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100138]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100138]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100141]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100141]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100144]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/1 /var/log/weirdo-project/logs/etc/keystone/credential-keys/1.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100144]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100147]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/0 /var/log/weirdo-project/logs/etc/keystone/credential-keys/0.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100147]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100150]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.yaml /var/log/weirdo-project/logs/etc/keystone/policy.yaml.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100150]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100150]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100153]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/keystone.conf /var/log/weirdo-project/logs/etc/keystone/keystone.conf.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100153]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100153]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100156]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/logging.conf /var/log/weirdo-project/logs/etc/keystone/logging.conf.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100156]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100156]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100159]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100159]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100159]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100162]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005592561.novalocal.pem /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005592561.novalocal.pem.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100162]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100162]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100165]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005592561.novalocal.pem /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005592561.novalocal.pem.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100165]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100168]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/api-paste.ini /var/log/weirdo-project/logs/etc/manila/api-paste.ini.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100168]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100168]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100171]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/manila.conf /var/log/weirdo-project/logs/etc/manila/manila.conf.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100171]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100174]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/rootwrap.conf /var/log/weirdo-project/logs/etc/manila/rootwrap.conf.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100174]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100177]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/policy.yaml /var/log/weirdo-project/logs/etc/manila/policy.yaml.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100177]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100177]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100180]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/conf.d/README /var/log/weirdo-project/logs/etc/neutron/conf.d/README.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100180]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100180]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100183]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005592561.novalocal.pem /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005592561.novalocal.pem.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100183]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100186]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100186]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100189]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100189]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100192]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100192]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100195]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100195]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100198]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100198]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:06 np0005592561.novalocal sudo[100201]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron.conf /var/log/weirdo-project/logs/etc/neutron/neutron.conf.txt Jan 22 13:33:06 np0005592561.novalocal sudo[100201]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:06 np0005592561.novalocal sudo[100201]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100204]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100204]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100207]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100207]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100207]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100210]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100210]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100213]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100213]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100216]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/api-paste.ini /var/log/weirdo-project/logs/etc/neutron/api-paste.ini.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100216]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100219]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100219]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100222]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100222]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100225]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100225]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100228]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100228]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100231]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100231]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100234]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100234]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100237]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/policy.yaml /var/log/weirdo-project/logs/etc/neutron/policy.yaml.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100237]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100240]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005592561.novalocal.pem /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005592561.novalocal.pem.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100240]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100245]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/api-paste.ini /var/log/weirdo-project/logs/etc/nova/api-paste.ini.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100245]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100245]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100248]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova.conf /var/log/weirdo-project/logs/etc/nova/nova.conf.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100248]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100248]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100251]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/release /var/log/weirdo-project/logs/etc/nova/release.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100251]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100251]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100254]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/rootwrap.conf /var/log/weirdo-project/logs/etc/nova/rootwrap.conf.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100254]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100254]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100257]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova-compute.conf /var/log/weirdo-project/logs/etc/nova/nova-compute.conf.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100257]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100257]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100260]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.yaml /var/log/weirdo-project/logs/etc/nova/policy.yaml.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100260]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100260]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100263]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/octavia.conf /var/log/weirdo-project/logs/etc/octavia/octavia.conf.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100263]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100263]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100266]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/policy.yaml /var/log/weirdo-project/logs/etc/octavia/policy.yaml.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100266]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100269]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100269]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100269]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100272]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100272]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:07 np0005592561.novalocal sudo[100275]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem.txt Jan 22 13:33:07 np0005592561.novalocal sudo[100275]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:07 np0005592561.novalocal sudo[100275]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100278]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100278]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100278]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100281]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100281]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100281]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100284]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100284]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100284]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100287]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100287]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100287]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100290]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100290]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100293]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100293]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100296]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005592561.novalocal.pem /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005592561.novalocal.pem.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100296]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100299]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.yaml /var/log/weirdo-project/logs/etc/placement/policy.yaml.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100299]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100302]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/placement.conf /var/log/weirdo-project/logs/etc/placement/placement.conf.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100302]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100305]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005592561.novalocal.pem /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005592561.novalocal.pem.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100305]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100308]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100308]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100308]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100311]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100311]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100314]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100314]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100317]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100317]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100320]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/tempest.conf /var/log/weirdo-project/logs/etc/tempest/tempest.conf.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100320]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100323]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100323]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100326]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.conf /var/log/weirdo-project/logs/etc/rsyslog.conf.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100326]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100329]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100329]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100332]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100332]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100335]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100335]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100338]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/inetrc /var/log/weirdo-project/logs/etc/rabbitmq/inetrc.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100338]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:08 np0005592561.novalocal sudo[100341]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config.txt Jan 22 13:33:08 np0005592561.novalocal sudo[100341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:08 np0005592561.novalocal sudo[100341]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100344]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100344]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100347]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005592561.novalocal.pem /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005592561.novalocal.pem.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100347]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100350]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf /var/log/weirdo-project/logs/etc/my.cnf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100350]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100353]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100353]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100356]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100356]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100359]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100359]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100362]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100362]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100365]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100365]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100369]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100369]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100369]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100372]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100372]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100372]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100375]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/np0005592561.novalocal.pem /var/log/weirdo-project/logs/etc/my.cnf.d/np0005592561.novalocal.pem.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100375]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100382]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100382]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100389]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100389]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100420]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100420]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100420]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100423]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100423]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100426]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100426]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100429]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100429]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100432]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100432]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100435]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100435]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100438]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100438]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100441]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100441]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100444]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/network.conf /var/log/weirdo-project/logs/etc/libvirt/network.conf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100444]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100447]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100447]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100450]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf.txt Jan 22 13:33:09 np0005592561.novalocal sudo[100450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:09 np0005592561.novalocal sudo[100450]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:09 np0005592561.novalocal sudo[100453]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100453]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100456]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100456]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100459]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu.conf /var/log/weirdo-project/logs/etc/libvirt/qemu.conf.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100459]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100462]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100462]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100465]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100465]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100468]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100468]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100471]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100471]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100474]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100474]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100477]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100477]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100480]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/default.conf /var/log/weirdo-project/logs/etc/openvswitch/default.conf.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100480]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100483]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~ /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100483]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100486]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/conf.db /var/log/weirdo-project/logs/etc/openvswitch/conf.db.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100486]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100489]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100489]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100492]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100492]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100495]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100495]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100498]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100498]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100501]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100501]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100504]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100504]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100507]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100507]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100510]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100510]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100510]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100513]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/magic /var/log/weirdo-project/logs/etc/httpd/conf/magic.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100513]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100513]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100516]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100516]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100516]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100519]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100519]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:10 np0005592561.novalocal sudo[100522]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf.txt Jan 22 13:33:10 np0005592561.novalocal sudo[100522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:10 np0005592561.novalocal sudo[100522]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100525]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100525]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100528]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100528]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100531]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-neutron_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-neutron_wsgi.conf.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100531]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100534]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100534]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100537]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100537]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100540]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100540]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100543]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100543]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100546]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100546]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100549]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100549]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100552]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100552]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100555]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100555]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100555]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100558]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100558]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100558]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100561]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100561]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100564]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100564]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100564]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100567]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100567]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100567]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100570]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100570]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100570]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100573]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100573]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100573]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100576]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100576]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100576]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100579]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100579]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100579]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100582]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100582]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100582]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100585]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100585]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100585]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100588]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100588]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100588]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100591]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load.txt Jan 22 13:33:11 np0005592561.novalocal sudo[100591]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:11 np0005592561.novalocal sudo[100591]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:11 np0005592561.novalocal sudo[100594]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100594]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100594]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100597]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100597]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100597]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100600]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100600]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100600]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100603]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100603]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100603]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100606]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100606]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100609]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100609]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100612]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005592561.novalocal.pem /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005592561.novalocal.pem.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100612]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100612]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100615]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf /var/log/weirdo-project/logs/etc/redis/sentinel.conf.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100615]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100618]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf /var/log/weirdo-project/logs/etc/redis/redis.conf.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100618]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100618]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100621]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100621]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100621]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100624]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100624]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100624]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100627]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100627]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100630]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100630]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100630]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100633]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100633]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100633]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100636]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100636]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100639]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100639]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100639]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100642]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100642]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100645]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100645]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100645]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100648]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100648]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100651]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100651]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100651]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100654]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100654]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100654]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100657]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100657]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100657]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100660]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100660]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100660]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100663]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100663]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100663]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100666]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100666]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100666]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100669]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100669]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100669]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:12 np0005592561.novalocal sudo[100672]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example.txt Jan 22 13:33:12 np0005592561.novalocal sudo[100672]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:12 np0005592561.novalocal sudo[100672]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100675]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100675]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100675]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100678]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100678]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100678]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100681]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100681]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100681]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100684]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100684]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100684]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100687]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100687]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100687]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100690]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100690]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100693]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005592561.novalocal.pem /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005592561.novalocal.pem.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100693]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100696]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100696]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100699]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100699]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100702]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100702]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100705]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100705]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100708]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100708]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100711]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100711]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100714]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100714]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100717]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/passwd /var/log/weirdo-project/logs/etc/passwd.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100717]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100720]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/group /var/log/weirdo-project/logs/etc/group.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100720]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100723]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100723]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100726]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/fstab /var/log/weirdo-project/logs/etc/fstab.txt Jan 22 13:33:13 np0005592561.novalocal sudo[100726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 13:33:13 np0005592561.novalocal sudo[100726]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[97431]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:13 np0005592561.novalocal sudo[100832]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-luuqputqmlvrrsuydzxhmnijgkespvug ; /usr/bin/python3' Jan 22 13:33:13 np0005592561.novalocal sudo[100832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:33:14 np0005592561.novalocal python3[100834]: ansible-command Invoked with creates=/var/log/weirdo/cpuinfo.txt _raw_params=cat /proc/cpuinfo >/var/log/weirdo/cpuinfo.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 13:33:14 np0005592561.novalocal sudo[100832]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:14 np0005592561.novalocal sudo[100840]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-thjnmjgnygrdskuuobbwyngdpxkqstck ; /usr/bin/python3' Jan 22 13:33:14 np0005592561.novalocal sudo[100840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:33:14 np0005592561.novalocal python3[100842]: ansible-command Invoked with creates=/var/log/weirdo/df.txt _raw_params=df -h >/var/log/weirdo/df.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 13:33:14 np0005592561.novalocal sudo[100840]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:14 np0005592561.novalocal sudo[100847]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fzoahmgfsodohxynrudkgcexcpzhwygw ; /usr/bin/python3' Jan 22 13:33:14 np0005592561.novalocal sudo[100847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:33:14 np0005592561.novalocal python3[100849]: ansible-command Invoked with creates=/var/log/weirdo/dmesg.txt _raw_params=dmesg -T >/var/log/weirdo/dmesg.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 13:33:14 np0005592561.novalocal sudo[100847]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:14 np0005592561.novalocal sudo[100854]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cmdoqvhqpwlvvfgfockupxftcxsbczvq ; /usr/bin/python3' Jan 22 13:33:14 np0005592561.novalocal sudo[100854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:33:14 np0005592561.novalocal python3[100856]: ansible-command Invoked with creates=/var/log/weirdo/fdisk.txt _raw_params=fdisk -l >/var/log/weirdo/fdisk.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 13:33:14 np0005592561.novalocal sudo[100854]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:14 np0005592561.novalocal sudo[100861]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-frtoewtmofdvrwnsqgjxljfdckurcfmt ; /usr/bin/python3' Jan 22 13:33:14 np0005592561.novalocal sudo[100861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:33:15 np0005592561.novalocal python3[100863]: ansible-command Invoked with creates=/var/log/weirdo/getenforce.txt _raw_params=getenforce >/var/log/weirdo/getenforce.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 13:33:15 np0005592561.novalocal sudo[100861]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:15 np0005592561.novalocal sudo[100868]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nhgxumgzloxoanvzfqxuhnroheedvhgg ; /usr/bin/python3' Jan 22 13:33:15 np0005592561.novalocal sudo[100868]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:33:15 np0005592561.novalocal python3[100870]: ansible-command Invoked with creates=/var/log/weirdo/hosts.txt _raw_params=cat /etc/hosts >/var/log/weirdo/hosts.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 13:33:15 np0005592561.novalocal sudo[100868]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:15 np0005592561.novalocal sudo[100875]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-oykotegvvdmmczcpkcsdrpkscvjpynko ; /usr/bin/python3' Jan 22 13:33:15 np0005592561.novalocal sudo[100875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:33:15 np0005592561.novalocal python3[100877]: ansible-command Invoked with creates=/var/log/weirdo/ip.txt _raw_params=ip a >/var/log/weirdo/ip.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 13:33:15 np0005592561.novalocal sudo[100875]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:15 np0005592561.novalocal sudo[100882]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xpkrowtisqoelypfzilemnoxfrujjhjk ; /usr/bin/python3' Jan 22 13:33:15 np0005592561.novalocal sudo[100882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:33:15 np0005592561.novalocal python3[100884]: ansible-command Invoked with creates=/var/log/weirdo/iptables.txt _raw_params=iptables -vnL >/var/log/weirdo/iptables.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 13:33:15 np0005592561.novalocal sudo[100882]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:15 np0005592561.novalocal sudo[100889]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wudoihuqyzusoijeuyhibqqiqrclgjno ; /usr/bin/python3' Jan 22 13:33:15 np0005592561.novalocal sudo[100889]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:33:16 np0005592561.novalocal python3[100891]: ansible-command Invoked with creates=/var/log/weirdo/iptables_nat.txt _raw_params=iptables -vnL -t nat >/var/log/weirdo/iptables_nat.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 13:33:16 np0005592561.novalocal sudo[100889]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:16 np0005592561.novalocal sudo[100896]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dgilwhgveujxtptrmbruyatcdebznrus ; /usr/bin/python3' Jan 22 13:33:16 np0005592561.novalocal sudo[100896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:33:16 np0005592561.novalocal python3[100898]: ansible-command Invoked with creates=/var/log/weirdo/iptables_mangle.txt _raw_params=iptables -vnL -t mangle >/var/log/weirdo/iptables_mangle.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 13:33:16 np0005592561.novalocal sudo[100896]: pam_unix(sudo:session): session closed for user root Jan 22 13:33:16 np0005592561.novalocal sudo[100903]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qscfidhhxnysipohvxfnwnjfbvnajmco ; /usr/bin/python3' Jan 22 13:33:16 np0005592561.novalocal sudo[100903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 13:33:16 np0005592561.novalocal python3[100905]: ansible-command Invoked with creates=/var/log/weirdo/journalctl.txt _raw_params=journalctl --no-pager >/var/log/weirdo/journalctl.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None