Feb 22 22:02:34 localhost kernel: Linux version 5.14.0-681.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-14), GNU ld version 2.35.2-69.el9) #1 SMP PREEMPT_DYNAMIC Wed Feb 11 20:19:22 UTC 2026 Feb 22 22:02:34 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Feb 22 22:02:34 localhost kernel: Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 root=UUID=9d578f93-c4e9-4172-8459-ef150e54751c ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Feb 22 22:02:34 localhost kernel: BIOS-provided physical RAM map: Feb 22 22:02:34 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 22 22:02:34 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 22 22:02:34 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 22 22:02:34 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Feb 22 22:02:34 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Feb 22 22:02:34 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 22 22:02:34 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 22 22:02:34 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable Feb 22 22:02:34 localhost kernel: NX (Execute Disable) protection: active Feb 22 22:02:34 localhost kernel: APIC: Static calls initialized Feb 22 22:02:34 localhost kernel: SMBIOS 2.8 present. Feb 22 22:02:34 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Feb 22 22:02:34 localhost kernel: Hypervisor detected: KVM Feb 22 22:02:34 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 22 22:02:34 localhost kernel: kvm-clock: using sched offset of 7858547215 cycles Feb 22 22:02:34 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 22 22:02:34 localhost kernel: tsc: Detected 2799.998 MHz processor Feb 22 22:02:34 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 22 22:02:34 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 22 22:02:34 localhost kernel: last_pfn = 0x240000 max_arch_pfn = 0x400000000 Feb 22 22:02:34 localhost kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Feb 22 22:02:34 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 22 22:02:34 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Feb 22 22:02:34 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Feb 22 22:02:34 localhost kernel: Using GB pages for direct mapping Feb 22 22:02:34 localhost kernel: RAMDISK: [mem 0x1b6f6000-0x29b72fff] Feb 22 22:02:34 localhost kernel: ACPI: Early table checksum verification disabled Feb 22 22:02:34 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Feb 22 22:02:34 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 22 22:02:34 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 22 22:02:34 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 22 22:02:34 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Feb 22 22:02:34 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 22 22:02:34 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 22 22:02:34 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Feb 22 22:02:34 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Feb 22 22:02:34 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Feb 22 22:02:34 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Feb 22 22:02:34 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Feb 22 22:02:34 localhost kernel: No NUMA configuration found Feb 22 22:02:34 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000023fffffff] Feb 22 22:02:34 localhost kernel: NODE_DATA(0) allocated [mem 0x23ffd5000-0x23fffffff] Feb 22 22:02:34 localhost kernel: crashkernel reserved: 0x00000000af000000 - 0x00000000bf000000 (256 MB) Feb 22 22:02:34 localhost kernel: Zone ranges: Feb 22 22:02:34 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 22 22:02:34 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 22 22:02:34 localhost kernel: Normal [mem 0x0000000100000000-0x000000023fffffff] Feb 22 22:02:34 localhost kernel: Device empty Feb 22 22:02:34 localhost kernel: Movable zone start for each node Feb 22 22:02:34 localhost kernel: Early memory node ranges Feb 22 22:02:34 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 22 22:02:34 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Feb 22 22:02:34 localhost kernel: node 0: [mem 0x0000000100000000-0x000000023fffffff] Feb 22 22:02:34 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000023fffffff] Feb 22 22:02:34 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 22 22:02:34 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 22 22:02:34 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Feb 22 22:02:34 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Feb 22 22:02:34 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 22 22:02:34 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 22 22:02:34 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 22 22:02:34 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 22 22:02:34 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 22 22:02:34 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 22 22:02:34 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 22 22:02:34 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 22 22:02:34 localhost kernel: TSC deadline timer available Feb 22 22:02:34 localhost kernel: CPU topo: Max. logical packages: 8 Feb 22 22:02:34 localhost kernel: CPU topo: Max. logical dies: 8 Feb 22 22:02:34 localhost kernel: CPU topo: Max. dies per package: 1 Feb 22 22:02:34 localhost kernel: CPU topo: Max. threads per core: 1 Feb 22 22:02:34 localhost kernel: CPU topo: Num. cores per package: 1 Feb 22 22:02:34 localhost kernel: CPU topo: Num. threads per package: 1 Feb 22 22:02:34 localhost kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Feb 22 22:02:34 localhost kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Feb 22 22:02:34 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Feb 22 22:02:34 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Feb 22 22:02:34 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Feb 22 22:02:34 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Feb 22 22:02:34 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Feb 22 22:02:34 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Feb 22 22:02:34 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Feb 22 22:02:34 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Feb 22 22:02:34 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Feb 22 22:02:34 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Feb 22 22:02:34 localhost kernel: Booting paravirtualized kernel on KVM Feb 22 22:02:34 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 22 22:02:34 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Feb 22 22:02:34 localhost kernel: percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 Feb 22 22:02:34 localhost kernel: pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 Feb 22 22:02:34 localhost kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Feb 22 22:02:34 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Feb 22 22:02:34 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 root=UUID=9d578f93-c4e9-4172-8459-ef150e54751c ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Feb 22 22:02:34 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64", will be passed to user space. Feb 22 22:02:34 localhost kernel: random: crng init done Feb 22 22:02:34 localhost kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 22 22:02:34 localhost kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 22 22:02:34 localhost kernel: Fallback order for Node 0: 0 Feb 22 22:02:34 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 2064091 Feb 22 22:02:34 localhost kernel: Policy zone: Normal Feb 22 22:02:34 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 22 22:02:34 localhost kernel: software IO TLB: area num 8. Feb 22 22:02:34 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Feb 22 22:02:34 localhost kernel: ftrace: allocating 49565 entries in 194 pages Feb 22 22:02:34 localhost kernel: ftrace: allocated 194 pages with 3 groups Feb 22 22:02:34 localhost kernel: Dynamic Preempt: voluntary Feb 22 22:02:34 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Feb 22 22:02:34 localhost kernel: rcu: RCU event tracing is enabled. Feb 22 22:02:34 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Feb 22 22:02:34 localhost kernel: Trampoline variant of Tasks RCU enabled. Feb 22 22:02:34 localhost kernel: Rude variant of Tasks RCU enabled. Feb 22 22:02:34 localhost kernel: Tracing variant of Tasks RCU enabled. Feb 22 22:02:34 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 22 22:02:34 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Feb 22 22:02:34 localhost kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Feb 22 22:02:34 localhost kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Feb 22 22:02:34 localhost kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Feb 22 22:02:34 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Feb 22 22:02:34 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Feb 22 22:02:34 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Feb 22 22:02:34 localhost kernel: Console: colour VGA+ 80x25 Feb 22 22:02:34 localhost kernel: printk: console [ttyS0] enabled Feb 22 22:02:34 localhost kernel: ACPI: Core revision 20230331 Feb 22 22:02:34 localhost kernel: APIC: Switch to symmetric I/O mode setup Feb 22 22:02:34 localhost kernel: x2apic enabled Feb 22 22:02:34 localhost kernel: APIC: Switched APIC routing to: physical x2apic Feb 22 22:02:34 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 22 22:02:34 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Feb 22 22:02:34 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 22 22:02:34 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 22 22:02:34 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 22 22:02:34 localhost kernel: mitigations: Enabled attack vectors: user_kernel, user_user, guest_host, guest_guest, SMT mitigations: auto Feb 22 22:02:34 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Feb 22 22:02:34 localhost kernel: Spectre V2 : Mitigation: Retpolines Feb 22 22:02:34 localhost kernel: RETBleed: Mitigation: untrained return thunk Feb 22 22:02:34 localhost kernel: Speculative Return Stack Overflow: Mitigation: SMT disabled Feb 22 22:02:34 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 22 22:02:34 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Feb 22 22:02:34 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 22 22:02:34 localhost kernel: active return thunk: retbleed_return_thunk Feb 22 22:02:34 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 22 22:02:34 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 22 22:02:34 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 22 22:02:34 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 22 22:02:34 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 22 22:02:34 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Feb 22 22:02:34 localhost kernel: Freeing SMP alternatives memory: 40K Feb 22 22:02:34 localhost kernel: pid_max: default: 32768 minimum: 301 Feb 22 22:02:34 localhost kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf Feb 22 22:02:34 localhost kernel: landlock: Up and running. Feb 22 22:02:34 localhost kernel: Yama: becoming mindful. Feb 22 22:02:34 localhost kernel: SELinux: Initializing. Feb 22 22:02:34 localhost kernel: LSM support for eBPF active Feb 22 22:02:34 localhost kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 22 22:02:34 localhost kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 22 22:02:34 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 22 22:02:34 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 22 22:02:34 localhost kernel: ... version: 0 Feb 22 22:02:34 localhost kernel: ... bit width: 48 Feb 22 22:02:34 localhost kernel: ... generic registers: 6 Feb 22 22:02:34 localhost kernel: ... value mask: 0000ffffffffffff Feb 22 22:02:34 localhost kernel: ... max period: 00007fffffffffff Feb 22 22:02:34 localhost kernel: ... fixed-purpose events: 0 Feb 22 22:02:34 localhost kernel: ... event mask: 000000000000003f Feb 22 22:02:34 localhost kernel: signal: max sigframe size: 1776 Feb 22 22:02:34 localhost kernel: rcu: Hierarchical SRCU implementation. Feb 22 22:02:34 localhost kernel: rcu: Max phase no-delay instances is 400. Feb 22 22:02:34 localhost kernel: smp: Bringing up secondary CPUs ... Feb 22 22:02:34 localhost kernel: smpboot: x86: Booting SMP configuration: Feb 22 22:02:34 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Feb 22 22:02:34 localhost kernel: smp: Brought up 1 node, 8 CPUs Feb 22 22:02:34 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Feb 22 22:02:34 localhost kernel: node 0 deferred pages initialised in 9ms Feb 22 22:02:34 localhost kernel: Memory: 7617780K/8388068K available (16384K kernel code, 5795K rwdata, 13948K rodata, 4204K init, 7180K bss, 764372K reserved, 0K cma-reserved) Feb 22 22:02:34 localhost kernel: devtmpfs: initialized Feb 22 22:02:34 localhost kernel: x86/mm: Memory block size: 128MB Feb 22 22:02:34 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 22 22:02:34 localhost kernel: futex hash table entries: 2048 (131072 bytes on 1 NUMA nodes, total 128 KiB, linear). Feb 22 22:02:34 localhost kernel: pinctrl core: initialized pinctrl subsystem Feb 22 22:02:34 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 22 22:02:34 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations Feb 22 22:02:34 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 22 22:02:34 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 22 22:02:34 localhost kernel: audit: initializing netlink subsys (disabled) Feb 22 22:02:34 localhost kernel: audit: type=2000 audit(1771815752.916:1): state=initialized audit_enabled=0 res=1 Feb 22 22:02:34 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Feb 22 22:02:34 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 22 22:02:34 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Feb 22 22:02:34 localhost kernel: cpuidle: using governor menu Feb 22 22:02:34 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 22 22:02:34 localhost kernel: PCI: Using configuration type 1 for base access Feb 22 22:02:34 localhost kernel: PCI: Using configuration type 1 for extended access Feb 22 22:02:34 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 22 22:02:34 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Feb 22 22:02:34 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Feb 22 22:02:34 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Feb 22 22:02:34 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Feb 22 22:02:34 localhost kernel: Demotion targets for Node 0: null Feb 22 22:02:34 localhost kernel: cryptd: max_cpu_qlen set to 1000 Feb 22 22:02:34 localhost kernel: ACPI: Added _OSI(Module Device) Feb 22 22:02:34 localhost kernel: ACPI: Added _OSI(Processor Device) Feb 22 22:02:34 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 22 22:02:34 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 22 22:02:34 localhost kernel: ACPI: Interpreter enabled Feb 22 22:02:34 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Feb 22 22:02:34 localhost kernel: ACPI: Using IOAPIC for interrupt routing Feb 22 22:02:34 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 22 22:02:34 localhost kernel: PCI: Using E820 reservations for host bridge windows Feb 22 22:02:34 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 22 22:02:34 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 22 22:02:34 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Feb 22 22:02:34 localhost kernel: acpiphp: Slot [3] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [4] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [5] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [6] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [7] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [8] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [9] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [10] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [11] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [12] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [13] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [14] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [15] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [16] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [17] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [18] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [19] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [20] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [21] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [22] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [23] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [24] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [25] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [26] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [27] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [28] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [29] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [30] registered Feb 22 22:02:34 localhost kernel: acpiphp: Slot [31] registered Feb 22 22:02:34 localhost kernel: PCI host bridge to bus 0000:00 Feb 22 22:02:34 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 22 22:02:34 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 22 22:02:34 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 22 22:02:34 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Feb 22 22:02:34 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x240000000-0x2bfffffff window] Feb 22 22:02:34 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 22 22:02:34 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Feb 22 22:02:34 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Feb 22 22:02:34 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Feb 22 22:02:34 localhost kernel: pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] Feb 22 22:02:34 localhost kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Feb 22 22:02:34 localhost kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Feb 22 22:02:34 localhost kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Feb 22 22:02:34 localhost kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Feb 22 22:02:34 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Feb 22 22:02:34 localhost kernel: pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] Feb 22 22:02:34 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Feb 22 22:02:34 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 22 22:02:34 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 22 22:02:34 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Feb 22 22:02:34 localhost kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Feb 22 22:02:34 localhost kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Feb 22 22:02:34 localhost kernel: pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] Feb 22 22:02:34 localhost kernel: pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] Feb 22 22:02:34 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 22 22:02:34 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Feb 22 22:02:34 localhost kernel: pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] Feb 22 22:02:34 localhost kernel: pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] Feb 22 22:02:34 localhost kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Feb 22 22:02:34 localhost kernel: pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] Feb 22 22:02:34 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Feb 22 22:02:34 localhost kernel: pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] Feb 22 22:02:34 localhost kernel: pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] Feb 22 22:02:34 localhost kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 22 22:02:34 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Feb 22 22:02:34 localhost kernel: pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] Feb 22 22:02:34 localhost kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 22 22:02:34 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint Feb 22 22:02:34 localhost kernel: pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] Feb 22 22:02:34 localhost kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Feb 22 22:02:34 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 22 22:02:34 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 22 22:02:34 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 22 22:02:34 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 22 22:02:34 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 22 22:02:34 localhost kernel: iommu: Default domain type: Translated Feb 22 22:02:34 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 22 22:02:34 localhost kernel: SCSI subsystem initialized Feb 22 22:02:34 localhost kernel: ACPI: bus type USB registered Feb 22 22:02:34 localhost kernel: usbcore: registered new interface driver usbfs Feb 22 22:02:34 localhost kernel: usbcore: registered new interface driver hub Feb 22 22:02:34 localhost kernel: usbcore: registered new device driver usb Feb 22 22:02:34 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Feb 22 22:02:34 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 22 22:02:34 localhost kernel: PTP clock support registered Feb 22 22:02:34 localhost kernel: EDAC MC: Ver: 3.0.0 Feb 22 22:02:34 localhost kernel: NetLabel: Initializing Feb 22 22:02:34 localhost kernel: NetLabel: domain hash size = 128 Feb 22 22:02:34 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Feb 22 22:02:34 localhost kernel: NetLabel: unlabeled traffic allowed by default Feb 22 22:02:34 localhost kernel: PCI: Using ACPI for IRQ routing Feb 22 22:02:34 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Feb 22 22:02:34 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 22 22:02:34 localhost kernel: e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] Feb 22 22:02:34 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 22 22:02:34 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 22 22:02:34 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 22 22:02:34 localhost kernel: vgaarb: loaded Feb 22 22:02:34 localhost kernel: clocksource: Switched to clocksource kvm-clock Feb 22 22:02:34 localhost kernel: VFS: Disk quotas dquot_6.6.0 Feb 22 22:02:34 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 22 22:02:34 localhost kernel: pnp: PnP ACPI init Feb 22 22:02:34 localhost kernel: pnp 00:03: [dma 2] Feb 22 22:02:34 localhost kernel: pnp: PnP ACPI: found 5 devices Feb 22 22:02:34 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 22 22:02:34 localhost kernel: NET: Registered PF_INET protocol family Feb 22 22:02:34 localhost kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 22 22:02:34 localhost kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 22 22:02:34 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 22 22:02:34 localhost kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 22 22:02:34 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 22 22:02:34 localhost kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 22 22:02:34 localhost kernel: MPTCP token hash table entries: 8192 (order: 5, 196608 bytes, linear) Feb 22 22:02:34 localhost kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 22 22:02:34 localhost kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 22 22:02:34 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 22 22:02:34 localhost kernel: NET: Registered PF_XDP protocol family Feb 22 22:02:34 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 22 22:02:34 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 22 22:02:34 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 22 22:02:34 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Feb 22 22:02:34 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x240000000-0x2bfffffff window] Feb 22 22:02:34 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 22 22:02:34 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 22 22:02:34 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 22 22:02:34 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x160 took 34541 usecs Feb 22 22:02:34 localhost kernel: PCI: CLS 0 bytes, default 64 Feb 22 22:02:34 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 22 22:02:34 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Feb 22 22:02:34 localhost kernel: ACPI: bus type thunderbolt registered Feb 22 22:02:34 localhost kernel: Trying to unpack rootfs image as initramfs... Feb 22 22:02:34 localhost kernel: Initialise system trusted keyrings Feb 22 22:02:34 localhost kernel: Key type blacklist registered Feb 22 22:02:34 localhost kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 Feb 22 22:02:34 localhost kernel: zbud: loaded Feb 22 22:02:34 localhost kernel: integrity: Platform Keyring initialized Feb 22 22:02:34 localhost kernel: integrity: Machine keyring initialized Feb 22 22:02:34 localhost kernel: Freeing initrd memory: 233972K Feb 22 22:02:34 localhost kernel: NET: Registered PF_ALG protocol family Feb 22 22:02:34 localhost kernel: xor: automatically using best checksumming function avx Feb 22 22:02:34 localhost kernel: Key type asymmetric registered Feb 22 22:02:34 localhost kernel: Asymmetric key parser 'x509' registered Feb 22 22:02:34 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Feb 22 22:02:34 localhost kernel: io scheduler mq-deadline registered Feb 22 22:02:34 localhost kernel: io scheduler kyber registered Feb 22 22:02:34 localhost kernel: io scheduler bfq registered Feb 22 22:02:34 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Feb 22 22:02:34 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Feb 22 22:02:34 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Feb 22 22:02:34 localhost kernel: ACPI: button: Power Button [PWRF] Feb 22 22:02:34 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 22 22:02:34 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 22 22:02:34 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 22 22:02:34 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 22 22:02:34 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 22 22:02:34 localhost kernel: Non-volatile memory driver v1.3 Feb 22 22:02:34 localhost kernel: rdac: device handler registered Feb 22 22:02:34 localhost kernel: hp_sw: device handler registered Feb 22 22:02:34 localhost kernel: emc: device handler registered Feb 22 22:02:34 localhost kernel: alua: device handler registered Feb 22 22:02:34 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Feb 22 22:02:34 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Feb 22 22:02:34 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Feb 22 22:02:34 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Feb 22 22:02:34 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Feb 22 22:02:34 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Feb 22 22:02:34 localhost kernel: usb usb1: Product: UHCI Host Controller Feb 22 22:02:34 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-681.el9.x86_64 uhci_hcd Feb 22 22:02:34 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Feb 22 22:02:34 localhost kernel: hub 1-0:1.0: USB hub found Feb 22 22:02:34 localhost kernel: hub 1-0:1.0: 2 ports detected Feb 22 22:02:34 localhost kernel: usbcore: registered new interface driver usbserial_generic Feb 22 22:02:34 localhost kernel: usbserial: USB Serial support registered for generic Feb 22 22:02:34 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 22 22:02:34 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 22 22:02:34 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 22 22:02:34 localhost kernel: mousedev: PS/2 mouse device common for all mice Feb 22 22:02:34 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Feb 22 22:02:34 localhost kernel: rtc_cmos 00:04: registered as rtc0 Feb 22 22:02:34 localhost kernel: rtc_cmos 00:04: setting system clock to 2026-02-23T03:02:33 UTC (1771815753) Feb 22 22:02:34 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Feb 22 22:02:34 localhost kernel: amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled Feb 22 22:02:34 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Feb 22 22:02:34 localhost kernel: usbcore: registered new interface driver usbhid Feb 22 22:02:34 localhost kernel: usbhid: USB HID core driver Feb 22 22:02:34 localhost kernel: drop_monitor: Initializing network drop monitor service Feb 22 22:02:34 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Feb 22 22:02:34 localhost kernel: Initializing XFRM netlink socket Feb 22 22:02:34 localhost kernel: NET: Registered PF_INET6 protocol family Feb 22 22:02:34 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Feb 22 22:02:34 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Feb 22 22:02:34 localhost kernel: Segment Routing with IPv6 Feb 22 22:02:34 localhost kernel: NET: Registered PF_PACKET protocol family Feb 22 22:02:34 localhost kernel: mpls_gso: MPLS GSO support Feb 22 22:02:34 localhost kernel: IPI shorthand broadcast: enabled Feb 22 22:02:34 localhost kernel: AVX2 version of gcm_enc/dec engaged. Feb 22 22:02:34 localhost kernel: AES CTR mode by8 optimization enabled Feb 22 22:02:34 localhost kernel: sched_clock: Marking stable (1069005958, 144991172)->(1332248415, -118251285) Feb 22 22:02:34 localhost kernel: registered taskstats version 1 Feb 22 22:02:34 localhost kernel: Loading compiled-in X.509 certificates Feb 22 22:02:34 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 4fde1469d8033882223ec575c1a1c1b88c9a497b' Feb 22 22:02:34 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Feb 22 22:02:34 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Feb 22 22:02:34 localhost kernel: Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' Feb 22 22:02:34 localhost kernel: Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' Feb 22 22:02:34 localhost kernel: Demotion targets for Node 0: null Feb 22 22:02:34 localhost kernel: page_owner is disabled Feb 22 22:02:34 localhost kernel: Key type .fscrypt registered Feb 22 22:02:34 localhost kernel: Key type fscrypt-provisioning registered Feb 22 22:02:34 localhost kernel: Key type big_key registered Feb 22 22:02:34 localhost kernel: Key type encrypted registered Feb 22 22:02:34 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Feb 22 22:02:34 localhost kernel: Loading compiled-in module X.509 certificates Feb 22 22:02:34 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 4fde1469d8033882223ec575c1a1c1b88c9a497b' Feb 22 22:02:34 localhost kernel: ima: Allocated hash algorithm: sha256 Feb 22 22:02:34 localhost kernel: ima: No architecture policies found Feb 22 22:02:34 localhost kernel: evm: Initialising EVM extended attributes: Feb 22 22:02:34 localhost kernel: evm: security.selinux Feb 22 22:02:34 localhost kernel: evm: security.SMACK64 (disabled) Feb 22 22:02:34 localhost kernel: evm: security.SMACK64EXEC (disabled) Feb 22 22:02:34 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Feb 22 22:02:34 localhost kernel: evm: security.SMACK64MMAP (disabled) Feb 22 22:02:34 localhost kernel: evm: security.apparmor (disabled) Feb 22 22:02:34 localhost kernel: evm: security.ima Feb 22 22:02:34 localhost kernel: evm: security.capability Feb 22 22:02:34 localhost kernel: evm: HMAC attrs: 0x1 Feb 22 22:02:34 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Feb 22 22:02:34 localhost kernel: Running certificate verification RSA selftest Feb 22 22:02:34 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Feb 22 22:02:34 localhost kernel: Running certificate verification ECDSA selftest Feb 22 22:02:34 localhost kernel: Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' Feb 22 22:02:34 localhost kernel: clk: Disabling unused clocks Feb 22 22:02:34 localhost kernel: Freeing unused decrypted memory: 2028K Feb 22 22:02:34 localhost kernel: Freeing unused kernel image (initmem) memory: 4204K Feb 22 22:02:34 localhost kernel: Write protecting the kernel read-only data: 30720k Feb 22 22:02:34 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 388K Feb 22 22:02:34 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Feb 22 22:02:34 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Feb 22 22:02:34 localhost kernel: usb 1-1: Product: QEMU USB Tablet Feb 22 22:02:34 localhost kernel: usb 1-1: Manufacturer: QEMU Feb 22 22:02:34 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Feb 22 22:02:34 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Feb 22 22:02:34 localhost kernel: Run /init as init process Feb 22 22:02:34 localhost kernel: with arguments: Feb 22 22:02:34 localhost kernel: /init Feb 22 22:02:34 localhost kernel: with environment: Feb 22 22:02:34 localhost kernel: HOME=/ Feb 22 22:02:34 localhost kernel: TERM=linux Feb 22 22:02:34 localhost kernel: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 Feb 22 22:02:34 localhost systemd[1]: systemd 252-64.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 22 22:02:34 localhost systemd[1]: Detected virtualization kvm. Feb 22 22:02:34 localhost systemd[1]: Detected architecture x86-64. Feb 22 22:02:34 localhost systemd[1]: Running in initrd. Feb 22 22:02:34 localhost systemd[1]: No hostname configured, using default hostname. Feb 22 22:02:34 localhost systemd[1]: Hostname set to . Feb 22 22:02:34 localhost systemd[1]: Initializing machine ID from VM UUID. Feb 22 22:02:34 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Feb 22 22:02:34 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Feb 22 22:02:34 localhost systemd[1]: Queued start job for default target Initrd Default Target. Feb 22 22:02:34 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Feb 22 22:02:34 localhost systemd[1]: Reached target Local Encrypted Volumes. Feb 22 22:02:34 localhost systemd[1]: Reached target Initrd /usr File System. Feb 22 22:02:34 localhost systemd[1]: Reached target Local File Systems. Feb 22 22:02:34 localhost systemd[1]: Reached target Path Units. Feb 22 22:02:34 localhost systemd[1]: Reached target Slice Units. Feb 22 22:02:34 localhost systemd[1]: Reached target Swaps. Feb 22 22:02:34 localhost systemd[1]: Reached target Timer Units. Feb 22 22:02:34 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Feb 22 22:02:34 localhost systemd[1]: Listening on Journal Socket (/dev/log). Feb 22 22:02:34 localhost systemd[1]: Listening on Journal Socket. Feb 22 22:02:34 localhost systemd[1]: Listening on udev Control Socket. Feb 22 22:02:34 localhost systemd[1]: Listening on udev Kernel Socket. Feb 22 22:02:34 localhost systemd[1]: Reached target Socket Units. Feb 22 22:02:34 localhost systemd[1]: Starting Create List of Static Device Nodes... Feb 22 22:02:34 localhost systemd[1]: Starting Journal Service... Feb 22 22:02:34 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Feb 22 22:02:34 localhost systemd[1]: Starting Apply Kernel Variables... Feb 22 22:02:34 localhost systemd[1]: Starting Create System Users... Feb 22 22:02:34 localhost systemd[1]: Starting Setup Virtual Console... Feb 22 22:02:34 localhost systemd[1]: Finished Create List of Static Device Nodes. Feb 22 22:02:34 localhost systemd[1]: Finished Apply Kernel Variables. Feb 22 22:02:34 localhost systemd-journald[307]: Journal started Feb 22 22:02:34 localhost systemd-journald[307]: Runtime Journal (/run/log/journal/128e54baaf654b38b79e501fdb19de81) is 8.0M, max 153.6M, 145.6M free. Feb 22 22:02:34 localhost systemd[1]: Started Journal Service. Feb 22 22:02:34 localhost systemd-sysusers[311]: Creating group 'users' with GID 100. Feb 22 22:02:34 localhost systemd-sysusers[311]: Creating group 'dbus' with GID 81. Feb 22 22:02:34 localhost systemd-sysusers[311]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Feb 22 22:02:34 localhost systemd[1]: Finished Create System Users. Feb 22 22:02:34 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Feb 22 22:02:34 localhost systemd[1]: Starting Create Volatile Files and Directories... Feb 22 22:02:34 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Feb 22 22:02:34 localhost systemd[1]: Finished Setup Virtual Console. Feb 22 22:02:34 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Feb 22 22:02:34 localhost systemd[1]: Starting dracut cmdline hook... Feb 22 22:02:34 localhost dracut-cmdline[327]: dracut-9 dracut-057-110.git20260130.el9 Feb 22 22:02:34 localhost systemd[1]: Finished Create Volatile Files and Directories. Feb 22 22:02:34 localhost dracut-cmdline[327]: Using kernel command line parameters: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 root=UUID=9d578f93-c4e9-4172-8459-ef150e54751c ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Feb 22 22:02:34 localhost systemd[1]: Finished dracut cmdline hook. Feb 22 22:02:34 localhost systemd[1]: Starting dracut pre-udev hook... Feb 22 22:02:34 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 22 22:02:34 localhost kernel: device-mapper: uevent: version 1.0.3 Feb 22 22:02:34 localhost kernel: device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev Feb 22 22:02:34 localhost kernel: RPC: Registered named UNIX socket transport module. Feb 22 22:02:34 localhost kernel: RPC: Registered udp transport module. Feb 22 22:02:34 localhost kernel: RPC: Registered tcp transport module. Feb 22 22:02:34 localhost kernel: RPC: Registered tcp-with-tls transport module. Feb 22 22:02:34 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 22 22:02:34 localhost rpc.statd[443]: Version 2.5.4 starting Feb 22 22:02:34 localhost rpc.statd[443]: Initializing NSM state Feb 22 22:02:34 localhost rpc.idmapd[448]: Setting log level to 0 Feb 22 22:02:34 localhost systemd[1]: Finished dracut pre-udev hook. Feb 22 22:02:34 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Feb 22 22:02:34 localhost systemd-udevd[461]: Using default interface naming scheme 'rhel-9.0'. Feb 22 22:02:34 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Feb 22 22:02:34 localhost systemd[1]: Starting dracut pre-trigger hook... Feb 22 22:02:34 localhost systemd[1]: Finished dracut pre-trigger hook. Feb 22 22:02:34 localhost systemd[1]: Starting Coldplug All udev Devices... Feb 22 22:02:34 localhost systemd[1]: Created slice Slice /system/modprobe. Feb 22 22:02:34 localhost systemd[1]: Starting Load Kernel Module configfs... Feb 22 22:02:34 localhost systemd[1]: Finished Coldplug All udev Devices. Feb 22 22:02:34 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 22 22:02:34 localhost systemd[1]: Finished Load Kernel Module configfs. Feb 22 22:02:34 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Feb 22 22:02:34 localhost systemd[1]: Reached target Network. Feb 22 22:02:34 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Feb 22 22:02:34 localhost systemd[1]: Starting dracut initqueue hook... Feb 22 22:02:34 localhost kernel: virtio_blk virtio2: 8/0/0 default/read/poll queues Feb 22 22:02:35 localhost kernel: virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) Feb 22 22:02:35 localhost kernel: vda: vda1 Feb 22 22:02:35 localhost kernel: ACPI: bus type drm_connector registered Feb 22 22:02:35 localhost systemd-udevd[488]: Network interface NamePolicy= disabled on kernel command line. Feb 22 22:02:35 localhost kernel: libata version 3.00 loaded. Feb 22 22:02:35 localhost kernel: ata_piix 0000:00:01.1: version 2.13 Feb 22 22:02:35 localhost kernel: scsi host0: ata_piix Feb 22 22:02:35 localhost kernel: scsi host1: ata_piix Feb 22 22:02:35 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 Feb 22 22:02:35 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 Feb 22 22:02:35 localhost systemd[1]: Found device /dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c. Feb 22 22:02:35 localhost systemd[1]: Reached target Initrd Root Device. Feb 22 22:02:35 localhost systemd[1]: Mounting Kernel Configuration File System... Feb 22 22:02:35 localhost systemd[1]: Mounted Kernel Configuration File System. Feb 22 22:02:35 localhost systemd[1]: Reached target System Initialization. Feb 22 22:02:35 localhost systemd[1]: Reached target Basic System. Feb 22 22:02:35 localhost kernel: ata1: found unknown device (class 0) Feb 22 22:02:35 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 22 22:02:35 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 22 22:02:35 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Feb 22 22:02:35 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Feb 22 22:02:35 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Feb 22 22:02:35 localhost kernel: Console: switching to colour dummy device 80x25 Feb 22 22:02:35 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Feb 22 22:02:35 localhost kernel: [drm] features: -context_init Feb 22 22:02:35 localhost kernel: [drm] number of scanouts: 1 Feb 22 22:02:35 localhost kernel: [drm] number of cap sets: 0 Feb 22 22:02:35 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Feb 22 22:02:35 localhost kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Feb 22 22:02:35 localhost kernel: Console: switching to colour frame buffer device 128x48 Feb 22 22:02:35 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 22 22:02:35 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 22 22:02:35 localhost kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Feb 22 22:02:35 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 Feb 22 22:02:35 localhost systemd[1]: Finished dracut initqueue hook. Feb 22 22:02:35 localhost systemd[1]: Reached target Preparation for Remote File Systems. Feb 22 22:02:35 localhost systemd[1]: Reached target Remote Encrypted Volumes. Feb 22 22:02:35 localhost systemd[1]: Reached target Remote File Systems. Feb 22 22:02:35 localhost systemd[1]: Starting dracut pre-mount hook... Feb 22 22:02:35 localhost systemd[1]: Finished dracut pre-mount hook. Feb 22 22:02:35 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c... Feb 22 22:02:35 localhost systemd-fsck[564]: /usr/sbin/fsck.xfs: XFS file system. Feb 22 22:02:35 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c. Feb 22 22:02:35 localhost systemd[1]: Mounting /sysroot... Feb 22 22:02:35 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Feb 22 22:02:35 localhost kernel: XFS (vda1): Mounting V5 Filesystem 9d578f93-c4e9-4172-8459-ef150e54751c Feb 22 22:02:35 localhost kernel: XFS (vda1): Ending clean mount Feb 22 22:02:35 localhost systemd[1]: Mounted /sysroot. Feb 22 22:02:35 localhost systemd[1]: Reached target Initrd Root File System. Feb 22 22:02:35 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Feb 22 22:02:35 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 22 22:02:35 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Feb 22 22:02:35 localhost systemd[1]: Reached target Initrd File Systems. Feb 22 22:02:35 localhost systemd[1]: Reached target Initrd Default Target. Feb 22 22:02:35 localhost systemd[1]: Starting dracut mount hook... Feb 22 22:02:36 localhost systemd[1]: Finished dracut mount hook. Feb 22 22:02:36 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Feb 22 22:02:36 localhost rpc.idmapd[448]: exiting on signal 15 Feb 22 22:02:36 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Feb 22 22:02:36 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Feb 22 22:02:36 localhost systemd[1]: Stopped target Network. Feb 22 22:02:36 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Feb 22 22:02:36 localhost systemd[1]: Stopped target Timer Units. Feb 22 22:02:36 localhost systemd[1]: dbus.socket: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Feb 22 22:02:36 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Feb 22 22:02:36 localhost systemd[1]: Stopped target Initrd Default Target. Feb 22 22:02:36 localhost systemd[1]: Stopped target Basic System. Feb 22 22:02:36 localhost systemd[1]: Stopped target Initrd Root Device. Feb 22 22:02:36 localhost systemd[1]: Stopped target Initrd /usr File System. Feb 22 22:02:36 localhost systemd[1]: Stopped target Path Units. Feb 22 22:02:36 localhost systemd[1]: Stopped target Remote File Systems. Feb 22 22:02:36 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Feb 22 22:02:36 localhost systemd[1]: Stopped target Slice Units. Feb 22 22:02:36 localhost systemd[1]: Stopped target Socket Units. Feb 22 22:02:36 localhost systemd[1]: Stopped target System Initialization. Feb 22 22:02:36 localhost systemd[1]: Stopped target Local File Systems. Feb 22 22:02:36 localhost systemd[1]: Stopped target Swaps. Feb 22 22:02:36 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped dracut mount hook. Feb 22 22:02:36 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped dracut pre-mount hook. Feb 22 22:02:36 localhost systemd[1]: Stopped target Local Encrypted Volumes. Feb 22 22:02:36 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Feb 22 22:02:36 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped dracut initqueue hook. Feb 22 22:02:36 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped Apply Kernel Variables. Feb 22 22:02:36 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped Create Volatile Files and Directories. Feb 22 22:02:36 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped Coldplug All udev Devices. Feb 22 22:02:36 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped dracut pre-trigger hook. Feb 22 22:02:36 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Feb 22 22:02:36 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped Setup Virtual Console. Feb 22 22:02:36 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Feb 22 22:02:36 localhost systemd[1]: systemd-udevd.service: Consumed 1.013s CPU time. Feb 22 22:02:36 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Closed udev Control Socket. Feb 22 22:02:36 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Closed udev Kernel Socket. Feb 22 22:02:36 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped dracut pre-udev hook. Feb 22 22:02:36 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped dracut cmdline hook. Feb 22 22:02:36 localhost systemd[1]: Starting Cleanup udev Database... Feb 22 22:02:36 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Feb 22 22:02:36 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped Create List of Static Device Nodes. Feb 22 22:02:36 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Stopped Create System Users. Feb 22 22:02:36 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Feb 22 22:02:36 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 22 22:02:36 localhost systemd[1]: Finished Cleanup udev Database. Feb 22 22:02:36 localhost systemd[1]: Reached target Switch Root. Feb 22 22:02:36 localhost systemd[1]: Starting Switch Root... Feb 22 22:02:36 localhost systemd[1]: Switching root. Feb 22 22:02:36 localhost systemd-journald[307]: Journal stopped Feb 22 22:02:37 localhost systemd-journald[307]: Received SIGTERM from PID 1 (systemd). Feb 22 22:02:37 localhost kernel: audit: type=1404 audit(1771815756.421:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Feb 22 22:02:37 localhost kernel: SELinux: policy capability network_peer_controls=1 Feb 22 22:02:37 localhost kernel: SELinux: policy capability open_perms=1 Feb 22 22:02:37 localhost kernel: SELinux: policy capability extended_socket_class=1 Feb 22 22:02:37 localhost kernel: SELinux: policy capability always_check_network=0 Feb 22 22:02:37 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 22:02:37 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 22:02:37 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 22:02:37 localhost kernel: audit: type=1403 audit(1771815756.558:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 22 22:02:37 localhost systemd[1]: Successfully loaded SELinux policy in 144.986ms. Feb 22 22:02:37 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 31.357ms. Feb 22 22:02:37 localhost systemd[1]: systemd 252-64.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 22 22:02:37 localhost systemd[1]: Detected virtualization kvm. Feb 22 22:02:37 localhost systemd[1]: Detected architecture x86-64. Feb 22 22:02:37 localhost systemd-rc-local-generator[646]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:02:37 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 22 22:02:37 localhost systemd[1]: Stopped Switch Root. Feb 22 22:02:37 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 22 22:02:37 localhost systemd[1]: Created slice Slice /system/getty. Feb 22 22:02:37 localhost systemd[1]: Created slice Slice /system/serial-getty. Feb 22 22:02:37 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Feb 22 22:02:37 localhost systemd[1]: Created slice User and Session Slice. Feb 22 22:02:37 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Feb 22 22:02:37 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Feb 22 22:02:37 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Feb 22 22:02:37 localhost systemd[1]: Reached target Local Encrypted Volumes. Feb 22 22:02:37 localhost systemd[1]: Stopped target Switch Root. Feb 22 22:02:37 localhost systemd[1]: Stopped target Initrd File Systems. Feb 22 22:02:37 localhost systemd[1]: Stopped target Initrd Root File System. Feb 22 22:02:37 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Feb 22 22:02:37 localhost systemd[1]: Reached target Path Units. Feb 22 22:02:37 localhost systemd[1]: Reached target rpc_pipefs.target. Feb 22 22:02:37 localhost systemd[1]: Reached target Slice Units. Feb 22 22:02:37 localhost systemd[1]: Reached target Swaps. Feb 22 22:02:37 localhost systemd[1]: Reached target Local Verity Protected Volumes. Feb 22 22:02:37 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Feb 22 22:02:37 localhost systemd[1]: Reached target RPC Port Mapper. Feb 22 22:02:37 localhost systemd[1]: Listening on Process Core Dump Socket. Feb 22 22:02:37 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Feb 22 22:02:37 localhost systemd[1]: Listening on udev Control Socket. Feb 22 22:02:37 localhost systemd[1]: Listening on udev Kernel Socket. Feb 22 22:02:37 localhost systemd[1]: Mounting Huge Pages File System... Feb 22 22:02:37 localhost systemd[1]: Mounting POSIX Message Queue File System... Feb 22 22:02:37 localhost systemd[1]: Mounting Kernel Debug File System... Feb 22 22:02:37 localhost systemd[1]: Mounting Kernel Trace File System... Feb 22 22:02:37 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Feb 22 22:02:37 localhost systemd[1]: Starting Create List of Static Device Nodes... Feb 22 22:02:37 localhost systemd[1]: Starting Load Kernel Module configfs... Feb 22 22:02:37 localhost systemd[1]: Starting Load Kernel Module drm... Feb 22 22:02:37 localhost systemd[1]: Starting Load Kernel Module efi_pstore... Feb 22 22:02:37 localhost systemd[1]: Starting Load Kernel Module fuse... Feb 22 22:02:37 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Feb 22 22:02:37 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 22 22:02:37 localhost systemd[1]: Stopped File System Check on Root Device. Feb 22 22:02:37 localhost systemd[1]: Stopped Journal Service. Feb 22 22:02:37 localhost kernel: fuse: init (API version 7.37) Feb 22 22:02:37 localhost systemd[1]: Starting Journal Service... Feb 22 22:02:37 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Feb 22 22:02:37 localhost systemd[1]: Starting Generate network units from Kernel command line... Feb 22 22:02:37 localhost systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 22 22:02:37 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Feb 22 22:02:37 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Feb 22 22:02:37 localhost systemd[1]: Starting Apply Kernel Variables... Feb 22 22:02:37 localhost systemd-journald[694]: Journal started Feb 22 22:02:37 localhost systemd-journald[694]: Runtime Journal (/run/log/journal/621707288f5710e1387f73ed6d90e964) is 8.0M, max 153.6M, 145.6M free. Feb 22 22:02:36 localhost systemd[1]: Queued start job for default target Multi-User System. Feb 22 22:02:36 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Feb 22 22:02:37 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Feb 22 22:02:37 localhost systemd[1]: Starting Coldplug All udev Devices... Feb 22 22:02:37 localhost systemd[1]: Started Journal Service. Feb 22 22:02:37 localhost systemd[1]: Mounted Huge Pages File System. Feb 22 22:02:37 localhost systemd[1]: Mounted POSIX Message Queue File System. Feb 22 22:02:37 localhost systemd[1]: Mounted Kernel Debug File System. Feb 22 22:02:37 localhost systemd[1]: Mounted Kernel Trace File System. Feb 22 22:02:37 localhost systemd[1]: Finished Create List of Static Device Nodes. Feb 22 22:02:37 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 22 22:02:37 localhost systemd[1]: Finished Load Kernel Module configfs. Feb 22 22:02:37 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 22 22:02:37 localhost systemd[1]: Finished Load Kernel Module drm. Feb 22 22:02:37 localhost systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 22 22:02:37 localhost systemd[1]: Finished Load Kernel Module efi_pstore. Feb 22 22:02:37 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 22 22:02:37 localhost systemd[1]: Finished Load Kernel Module fuse. Feb 22 22:02:37 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Feb 22 22:02:37 localhost systemd[1]: Finished Generate network units from Kernel command line. Feb 22 22:02:37 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Feb 22 22:02:37 localhost systemd[1]: Finished Apply Kernel Variables. Feb 22 22:02:37 localhost systemd[1]: Mounting FUSE Control File System... Feb 22 22:02:37 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Feb 22 22:02:37 localhost systemd[1]: Starting Rebuild Hardware Database... Feb 22 22:02:37 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Feb 22 22:02:37 localhost systemd[1]: Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 22 22:02:37 localhost systemd[1]: Starting Load/Save OS Random Seed... Feb 22 22:02:37 localhost systemd[1]: Starting Create System Users... Feb 22 22:02:37 localhost systemd[1]: Mounted FUSE Control File System. Feb 22 22:02:37 localhost systemd[1]: Finished Coldplug All udev Devices. Feb 22 22:02:37 localhost systemd-journald[694]: Runtime Journal (/run/log/journal/621707288f5710e1387f73ed6d90e964) is 8.0M, max 153.6M, 145.6M free. Feb 22 22:02:37 localhost systemd-journald[694]: Received client request to flush runtime journal. Feb 22 22:02:37 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Feb 22 22:02:37 localhost systemd[1]: Finished Load/Save OS Random Seed. Feb 22 22:02:37 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Feb 22 22:02:37 localhost systemd[1]: Finished Create System Users. Feb 22 22:02:37 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Feb 22 22:02:37 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Feb 22 22:02:37 localhost systemd[1]: Reached target Preparation for Local File Systems. Feb 22 22:02:37 localhost systemd[1]: Reached target Local File Systems. Feb 22 22:02:37 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Feb 22 22:02:37 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Feb 22 22:02:37 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Feb 22 22:02:37 localhost systemd[1]: Update Boot Loader Random Seed was skipped because no trigger condition checks were met. Feb 22 22:02:37 localhost systemd[1]: Starting Automatic Boot Loader Update... Feb 22 22:02:37 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Feb 22 22:02:37 localhost systemd[1]: Starting Create Volatile Files and Directories... Feb 22 22:02:37 localhost bootctl[713]: Couldn't find EFI system partition, skipping. Feb 22 22:02:37 localhost systemd[1]: Finished Automatic Boot Loader Update. Feb 22 22:02:37 localhost systemd[1]: Finished Create Volatile Files and Directories. Feb 22 22:02:37 localhost systemd[1]: Starting Security Auditing Service... Feb 22 22:02:37 localhost systemd[1]: Starting RPC Bind... Feb 22 22:02:37 localhost systemd[1]: Starting Rebuild Journal Catalog... Feb 22 22:02:37 localhost auditd[719]: audit dispatcher initialized with q_depth=2000 and 1 active plugins Feb 22 22:02:37 localhost auditd[719]: Init complete, auditd 3.1.5 listening for events (startup state enable) Feb 22 22:02:37 localhost systemd[1]: Finished Rebuild Journal Catalog. Feb 22 22:02:37 localhost systemd[1]: Started RPC Bind. Feb 22 22:02:37 localhost augenrules[724]: /sbin/augenrules: No change Feb 22 22:02:37 localhost augenrules[739]: No rules Feb 22 22:02:37 localhost augenrules[739]: enabled 1 Feb 22 22:02:37 localhost augenrules[739]: failure 1 Feb 22 22:02:37 localhost augenrules[739]: pid 719 Feb 22 22:02:37 localhost augenrules[739]: rate_limit 0 Feb 22 22:02:37 localhost augenrules[739]: backlog_limit 8192 Feb 22 22:02:37 localhost augenrules[739]: lost 0 Feb 22 22:02:37 localhost augenrules[739]: backlog 2 Feb 22 22:02:37 localhost augenrules[739]: backlog_wait_time 60000 Feb 22 22:02:37 localhost augenrules[739]: backlog_wait_time_actual 0 Feb 22 22:02:37 localhost augenrules[739]: enabled 1 Feb 22 22:02:37 localhost augenrules[739]: failure 1 Feb 22 22:02:37 localhost augenrules[739]: pid 719 Feb 22 22:02:37 localhost augenrules[739]: rate_limit 0 Feb 22 22:02:37 localhost augenrules[739]: backlog_limit 8192 Feb 22 22:02:37 localhost augenrules[739]: lost 0 Feb 22 22:02:37 localhost augenrules[739]: backlog 0 Feb 22 22:02:37 localhost augenrules[739]: backlog_wait_time 60000 Feb 22 22:02:37 localhost augenrules[739]: backlog_wait_time_actual 0 Feb 22 22:02:37 localhost augenrules[739]: enabled 1 Feb 22 22:02:37 localhost augenrules[739]: failure 1 Feb 22 22:02:37 localhost augenrules[739]: pid 719 Feb 22 22:02:37 localhost augenrules[739]: rate_limit 0 Feb 22 22:02:37 localhost augenrules[739]: backlog_limit 8192 Feb 22 22:02:37 localhost augenrules[739]: lost 0 Feb 22 22:02:37 localhost augenrules[739]: backlog 3 Feb 22 22:02:37 localhost augenrules[739]: backlog_wait_time 60000 Feb 22 22:02:37 localhost augenrules[739]: backlog_wait_time_actual 0 Feb 22 22:02:37 localhost systemd[1]: Started Security Auditing Service. Feb 22 22:02:37 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Feb 22 22:02:37 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Feb 22 22:02:37 localhost systemd[1]: Finished Rebuild Hardware Database. Feb 22 22:02:37 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Feb 22 22:02:37 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Feb 22 22:02:37 localhost systemd[1]: Starting Update is Completed... Feb 22 22:02:37 localhost systemd-udevd[747]: Using default interface naming scheme 'rhel-9.0'. Feb 22 22:02:37 localhost systemd[1]: Finished Update is Completed. Feb 22 22:02:37 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Feb 22 22:02:37 localhost systemd[1]: Reached target System Initialization. Feb 22 22:02:37 localhost systemd[1]: Started dnf makecache --timer. Feb 22 22:02:37 localhost systemd[1]: Started Daily rotation of log files. Feb 22 22:02:37 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Feb 22 22:02:37 localhost systemd[1]: Reached target Timer Units. Feb 22 22:02:37 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Feb 22 22:02:37 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Feb 22 22:02:37 localhost systemd[1]: Reached target Socket Units. Feb 22 22:02:37 localhost systemd[1]: Starting D-Bus System Message Bus... Feb 22 22:02:37 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 22 22:02:37 localhost systemd[1]: Starting Load Kernel Module configfs... Feb 22 22:02:37 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Feb 22 22:02:37 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 22 22:02:37 localhost systemd[1]: Finished Load Kernel Module configfs. Feb 22 22:02:37 localhost systemd-udevd[754]: Network interface NamePolicy= disabled on kernel command line. Feb 22 22:02:37 localhost systemd[1]: Started D-Bus System Message Bus. Feb 22 22:02:37 localhost systemd[1]: Reached target Basic System. Feb 22 22:02:37 localhost dbus-broker-lau[758]: Ready Feb 22 22:02:37 localhost systemd[1]: Starting NTP client/server... Feb 22 22:02:37 localhost systemd[1]: Starting Cloud-init: Local Stage (pre-network)... Feb 22 22:02:38 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Feb 22 22:02:38 localhost chronyd[796]: chronyd version 4.8 starting (+CMDMON +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +NTS +SECHASH +IPV6 +DEBUG) Feb 22 22:02:38 localhost chronyd[796]: Loaded 0 symmetric keys Feb 22 22:02:38 localhost chronyd[796]: Using right/UTC timezone to obtain leap second data Feb 22 22:02:38 localhost chronyd[796]: Loaded seccomp filter (level 2) Feb 22 22:02:38 localhost systemd[1]: Starting IPv4 firewall with iptables... Feb 22 22:02:38 localhost systemd[1]: Started irqbalance daemon. Feb 22 22:02:38 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Feb 22 22:02:38 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Feb 22 22:02:38 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 22 22:02:38 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 22 22:02:38 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 22 22:02:38 localhost systemd[1]: Reached target sshd-keygen.target. Feb 22 22:02:38 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Feb 22 22:02:38 localhost systemd[1]: Reached target User and Group Name Lookups. Feb 22 22:02:38 localhost systemd[1]: Starting User Login Management... Feb 22 22:02:38 localhost systemd[1]: Started NTP client/server. Feb 22 22:02:38 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Feb 22 22:02:38 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 22 22:02:38 localhost kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Feb 22 22:02:38 localhost kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Feb 22 22:02:38 localhost systemd-logind[811]: New seat seat0. Feb 22 22:02:38 localhost systemd-logind[811]: Watching system buttons on /dev/input/event0 (Power Button) Feb 22 22:02:38 localhost systemd-logind[811]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 22 22:02:38 localhost systemd[1]: Started User Login Management. Feb 22 22:02:38 localhost kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Feb 22 22:02:38 localhost kernel: Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled Feb 22 22:02:38 localhost kernel: kvm_amd: TSC scaling supported Feb 22 22:02:38 localhost kernel: kvm_amd: Nested Virtualization enabled Feb 22 22:02:38 localhost kernel: kvm_amd: Nested Paging enabled Feb 22 22:02:38 localhost kernel: kvm_amd: LBR virtualization supported Feb 22 22:02:38 localhost iptables.init[801]: iptables: Applying firewall rules: [ OK ] Feb 22 22:02:38 localhost systemd[1]: Finished IPv4 firewall with iptables. Feb 22 22:02:38 localhost cloud-init[850]: Cloud-init v. 24.4-8.el9 running 'init-local' at Mon, 23 Feb 2026 03:02:38 +0000. Up 6.12 seconds. Feb 22 22:02:38 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3 Feb 22 22:02:38 localhost kernel: ISO 9660 Extensions: RRIP_1991A Feb 22 22:02:38 localhost systemd[1]: run-cloud\x2dinit-tmp-tmpdi2mn66a.mount: Deactivated successfully. Feb 22 22:02:38 localhost systemd[1]: Starting Hostname Service... Feb 22 22:02:38 localhost systemd[1]: Started Hostname Service. Feb 22 22:02:38 np0005626394.novalocal systemd-hostnamed[864]: Hostname set to (static) Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Finished Cloud-init: Local Stage (pre-network). Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Reached target Preparation for Network. Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Starting Network Manager... Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.1912] NetworkManager (version 1.54.3-2.el9) is starting... (boot:94c60006-6563-4caf-aa1a-0780eeba4d82) Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.1919] Read config: /etc/NetworkManager/NetworkManager.conf, /run/NetworkManager/conf.d/15-carrier-timeout.conf Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2155] manager[0x5580720ac000]: monitoring kernel firmware directory '/lib/firmware'. Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2237] hostname: hostname: using hostnamed Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2238] hostname: static hostname changed from (none) to "np0005626394.novalocal" Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2245] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2375] manager[0x5580720ac000]: rfkill: Wi-Fi hardware radio set enabled Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2376] manager[0x5580720ac000]: rfkill: WWAN hardware radio set enabled Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2468] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-device-plugin-team.so) Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2468] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2469] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2470] manager: Networking is enabled by state file Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2476] settings: Loaded settings plugin: keyfile (internal) Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2516] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-settings-plugin-ifcfg-rh.so") Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2548] Warning: the ifcfg-rh plugin is deprecated, please migrate connections to the keyfile format using "nmcli connection migrate" Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2567] dhcp: init: Using DHCP client 'internal' Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2572] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2594] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2611] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', managed-type: 'external') Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Starting Network Manager Script Dispatcher Service... Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2633] device (lo): Activation: starting connection 'lo' (2afc286c-9735-4c53-8245-873a6f96f44f) Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2646] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2651] device (eth0): state change: unmanaged -> unavailable (reason 'managed', managed-type: 'external') Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Started Network Manager. Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2687] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2693] device (lo): state change: disconnected -> prepare (reason 'none', managed-type: 'external') Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2697] device (lo): state change: prepare -> config (reason 'none', managed-type: 'external') Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2700] device (lo): state change: config -> ip-config (reason 'none', managed-type: 'external') Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2703] device (eth0): carrier: link connected Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Reached target Network. Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2708] device (lo): state change: ip-config -> ip-check (reason 'none', managed-type: 'external') Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2720] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', managed-type: 'full') Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2730] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Starting Network Manager Wait Online... Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2739] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2742] device (eth0): state change: disconnected -> prepare (reason 'none', managed-type: 'full') Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2748] manager: NetworkManager state is now CONNECTING Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2752] device (eth0): state change: prepare -> config (reason 'none', managed-type: 'full') Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2763] device (eth0): state change: config -> ip-config (reason 'none', managed-type: 'full') Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2768] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Started Network Manager Script Dispatcher Service. Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2816] dhcp4 (eth0): state changed new lease, address=38.102.83.115 Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2826] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2855] device (eth0): state change: ip-config -> ip-check (reason 'none', managed-type: 'full') Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2865] device (lo): state change: ip-check -> secondaries (reason 'none', managed-type: 'external') Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2868] device (lo): state change: secondaries -> activated (reason 'none', managed-type: 'external') Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2876] device (lo): Activation: successful, device activated. Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2892] device (eth0): state change: ip-check -> secondaries (reason 'none', managed-type: 'full') Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2895] device (eth0): state change: secondaries -> activated (reason 'none', managed-type: 'full') Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2900] manager: NetworkManager state is now CONNECTED_SITE Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2905] device (eth0): Activation: successful, device activated. Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2912] manager: NetworkManager state is now CONNECTED_GLOBAL Feb 22 22:02:39 np0005626394.novalocal NetworkManager[868]: [1771815759.2916] manager: startup complete Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Feb 22 22:02:39 np0005626394.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Reached target NFS client services. Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Reached target Preparation for Remote File Systems. Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Reached target Remote File Systems. Feb 22 22:02:39 np0005626394.novalocal systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Finished Network Manager Wait Online. Feb 22 22:02:39 np0005626394.novalocal systemd[1]: Starting Cloud-init: Network Stage... Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: Cloud-init v. 24.4-8.el9 running 'init' at Mon, 23 Feb 2026 03:02:39 +0000. Up 7.08 seconds. Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: | eth0 | True | 38.102.83.115 | 255.255.255.0 | global | fa:16:3e:e5:e2:b1 | Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: | eth0 | True | fe80::f816:3eff:fee5:e2b1/64 | . | link | fa:16:3e:e5:e2:b1 | Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: | lo | True | ::1/128 | . | host | . | Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: +-------+-------------+---------+-----------+-------+ Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: | Route | Destination | Gateway | Interface | Flags | Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: +-------+-------------+---------+-----------+-------+ Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: | 3 | multicast | :: | eth0 | U | Feb 22 22:02:39 np0005626394.novalocal cloud-init[932]: ci-info: +-------+-------------+---------+-----------+-------+ Feb 22 22:02:40 np0005626394.novalocal useradd[998]: new group: name=cloud-user, GID=1001 Feb 22 22:02:40 np0005626394.novalocal useradd[998]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Feb 22 22:02:40 np0005626394.novalocal useradd[998]: add 'cloud-user' to group 'adm' Feb 22 22:02:40 np0005626394.novalocal useradd[998]: add 'cloud-user' to group 'systemd-journal' Feb 22 22:02:40 np0005626394.novalocal useradd[998]: add 'cloud-user' to shadow group 'adm' Feb 22 22:02:40 np0005626394.novalocal useradd[998]: add 'cloud-user' to shadow group 'systemd-journal' Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: Generating public/private rsa key pair. Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: The key fingerprint is: Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: SHA256:+CJssf9VLs/GYGXjiLB05ydnUUeoUg3e0NFcIfb2C9U root@np0005626394.novalocal Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: The key's randomart image is: Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: +---[RSA 3072]----+ Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: | o*.B=| Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: | .ooB =| Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: | ..o.=E| Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: | o.. o * o .| Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: | ...+S+ *.+ .| Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: | . o... *o= . .| Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: | = . ..oB. . | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: | . o . . +o | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: | ... .o | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: +----[SHA256]-----+ Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: Generating public/private ecdsa key pair. Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: The key fingerprint is: Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: SHA256:t4WcRtcJM8bZIcuLgTqRK0FAj4U/C4ZTB46A87cHtIM root@np0005626394.novalocal Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: The key's randomart image is: Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: +---[ECDSA 256]---+ Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: |o.++o .*o.. | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: |+oo=o . . ooB.. | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: |.=o=o.o . o + o | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: |o E B. + o * . | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: | o o.*+ S B o | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: | o... o o | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: | . . | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: | | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: | | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: +----[SHA256]-----+ Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: Generating public/private ed25519 key pair. Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: The key fingerprint is: Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: SHA256:va31SQjO5uKsIvE1oEc07JIAjAL/ZKxrpKxNcH8ukII root@np0005626394.novalocal Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: The key's randomart image is: Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: +--[ED25519 256]--+ Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: |B . | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: |+o .+ | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: |...++. | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: | o=+ . | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: |o +=.. S o | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: |E==o. o o + . | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: |.o+=.... = + . | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: |.+. +o ..o o o . | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: |. .. oooo.o o | Feb 22 22:02:40 np0005626394.novalocal cloud-init[932]: +----[SHA256]-----+ Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Finished Cloud-init: Network Stage. Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Reached target Cloud-config availability. Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Reached target Network is Online. Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Starting Cloud-init: Config Stage... Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Starting Crash recovery kernel arming... Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Starting Notify NFS peers of a restart... Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Starting System Logging Service... Feb 22 22:02:41 np0005626394.novalocal sm-notify[1014]: Version 2.5.4 starting Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Starting OpenSSH server daemon... Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Starting Permit User Sessions... Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Started Notify NFS peers of a restart. Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Finished Permit User Sessions. Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Started Command Scheduler. Feb 22 22:02:41 np0005626394.novalocal sshd[1016]: Server listening on 0.0.0.0 port 22. Feb 22 22:02:41 np0005626394.novalocal sshd[1016]: Server listening on :: port 22. Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Started Getty on tty1. Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Started Serial Getty on ttyS0. Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Reached target Login Prompts. Feb 22 22:02:41 np0005626394.novalocal crond[1019]: (CRON) STARTUP (1.5.7) Feb 22 22:02:41 np0005626394.novalocal crond[1019]: (CRON) INFO (Syslog will be used instead of sendmail.) Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Started OpenSSH server daemon. Feb 22 22:02:41 np0005626394.novalocal crond[1019]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 85% if used.) Feb 22 22:02:41 np0005626394.novalocal crond[1019]: (CRON) INFO (running with inotify support) Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Started System Logging Service. Feb 22 22:02:41 np0005626394.novalocal rsyslogd[1015]: [origin software="rsyslogd" swVersion="8.2510.0-2.el9" x-pid="1015" x-info="https://www.rsyslog.com"] start Feb 22 22:02:41 np0005626394.novalocal rsyslogd[1015]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2510.0-2.el9 try https://www.rsyslog.com/e/2040 ] Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Reached target Multi-User System. Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Starting Record Runlevel Change in UTMP... Feb 22 22:02:41 np0005626394.novalocal systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Finished Record Runlevel Change in UTMP. Feb 22 22:02:41 np0005626394.novalocal sshd-session[1043]: Unable to negotiate with 38.102.83.114 port 51574: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Feb 22 22:02:41 np0005626394.novalocal sshd-session[1080]: Unable to negotiate with 38.102.83.114 port 51598: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Feb 22 22:02:41 np0005626394.novalocal sshd-session[1090]: Unable to negotiate with 38.102.83.114 port 51612: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Feb 22 22:02:41 np0005626394.novalocal rsyslogd[1015]: imjournal: journal files changed, reloading... [v8.2510.0-2.el9 try https://www.rsyslog.com/e/0 ] Feb 22 22:02:41 np0005626394.novalocal sshd-session[1121]: Connection reset by 38.102.83.114 port 51626 [preauth] Feb 22 22:02:41 np0005626394.novalocal sshd-session[1132]: Unable to negotiate with 38.102.83.114 port 51632: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth] Feb 22 22:02:41 np0005626394.novalocal sshd-session[1021]: Connection closed by 38.102.83.114 port 51560 [preauth] Feb 22 22:02:41 np0005626394.novalocal sshd-session[1145]: Unable to negotiate with 38.102.83.114 port 51640: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Feb 22 22:02:41 np0005626394.novalocal sshd-session[1061]: Connection closed by 38.102.83.114 port 51590 [preauth] Feb 22 22:02:41 np0005626394.novalocal sshd-session[1101]: Connection closed by 38.102.83.114 port 51624 [preauth] Feb 22 22:02:41 np0005626394.novalocal kdumpctl[1028]: kdump: No kdump initial ramdisk found. Feb 22 22:02:41 np0005626394.novalocal kdumpctl[1028]: kdump: Rebuilding /boot/initramfs-5.14.0-681.el9.x86_64kdump.img Feb 22 22:02:41 np0005626394.novalocal cloud-init[1201]: Cloud-init v. 24.4-8.el9 running 'modules:config' at Mon, 23 Feb 2026 03:02:41 +0000. Up 8.83 seconds. Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Finished Cloud-init: Config Stage. Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Starting Cloud-init: Final Stage... Feb 22 22:02:41 np0005626394.novalocal cloud-init[1446]: Cloud-init v. 24.4-8.el9 running 'modules:final' at Mon, 23 Feb 2026 03:02:41 +0000. Up 9.19 seconds. Feb 22 22:02:41 np0005626394.novalocal cloud-init[1477]: ############################################################# Feb 22 22:02:41 np0005626394.novalocal cloud-init[1481]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Feb 22 22:02:41 np0005626394.novalocal cloud-init[1490]: 256 SHA256:t4WcRtcJM8bZIcuLgTqRK0FAj4U/C4ZTB46A87cHtIM root@np0005626394.novalocal (ECDSA) Feb 22 22:02:41 np0005626394.novalocal cloud-init[1498]: 256 SHA256:va31SQjO5uKsIvE1oEc07JIAjAL/ZKxrpKxNcH8ukII root@np0005626394.novalocal (ED25519) Feb 22 22:02:41 np0005626394.novalocal cloud-init[1503]: 3072 SHA256:+CJssf9VLs/GYGXjiLB05ydnUUeoUg3e0NFcIfb2C9U root@np0005626394.novalocal (RSA) Feb 22 22:02:41 np0005626394.novalocal cloud-init[1505]: -----END SSH HOST KEY FINGERPRINTS----- Feb 22 22:02:41 np0005626394.novalocal cloud-init[1507]: ############################################################# Feb 22 22:02:41 np0005626394.novalocal cloud-init[1446]: Cloud-init v. 24.4-8.el9 finished at Mon, 23 Feb 2026 03:02:41 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 9.38 seconds Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Finished Cloud-init: Final Stage. Feb 22 22:02:41 np0005626394.novalocal systemd[1]: Reached target Cloud-init target. Feb 22 22:02:41 np0005626394.novalocal dracut[1538]: dracut-057-110.git20260130.el9 Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics --mount "/dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device --add-confdir /lib/kdump/dracut.conf.d -f /boot/initramfs-5.14.0-681.el9.x86_64kdump.img 5.14.0-681.el9.x86_64 Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: Module 'ifcfg' will not be installed, because it's in the list to be omitted! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: Module 'plymouth' will not be installed, because it's in the list to be omitted! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: Module 'resume' will not be installed, because it's in the list to be omitted! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Feb 22 22:02:42 np0005626394.novalocal dracut[1540]: Module 'earlykdump' will not be installed, because it's in the list to be omitted! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: memstrack is not available Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: memstrack is not available Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: *** Including module: systemd *** Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: *** Including module: fips *** Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: *** Including module: systemd-initrd *** Feb 22 22:02:43 np0005626394.novalocal dracut[1540]: *** Including module: i18n *** Feb 22 22:02:44 np0005626394.novalocal dracut[1540]: *** Including module: drm *** Feb 22 22:02:44 np0005626394.novalocal chronyd[796]: Selected source 158.69.247.84 (2.centos.pool.ntp.org) Feb 22 22:02:44 np0005626394.novalocal chronyd[796]: System clock TAI offset set to 37 seconds Feb 22 22:02:44 np0005626394.novalocal dracut[1540]: *** Including module: prefixdevname *** Feb 22 22:02:44 np0005626394.novalocal dracut[1540]: *** Including module: kernel-modules *** Feb 22 22:02:44 np0005626394.novalocal kernel: block vda: the capability attribute has been deprecated. Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: *** Including module: kernel-modules-extra *** Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: kernel-modules-extra: configuration source "/run/depmod.d" does not exist Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: kernel-modules-extra: configuration source "/lib/depmod.d" does not exist Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: kernel-modules-extra: parsing configuration file "/etc/depmod.d/dist.conf" Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: kernel-modules-extra: /etc/depmod.d/dist.conf: added "updates extra built-in weak-updates" to the list of search directories Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: *** Including module: qemu *** Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: *** Including module: fstab-sys *** Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: *** Including module: rootfs-block *** Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: *** Including module: terminfo *** Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: *** Including module: udev-rules *** Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: Skipping udev rule: 91-permissions.rules Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: Skipping udev rule: 80-drivers-modprobe.rules Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: *** Including module: virtiofs *** Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: *** Including module: dracut-systemd *** Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: *** Including module: usrmount *** Feb 22 22:02:45 np0005626394.novalocal dracut[1540]: *** Including module: base *** Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: *** Including module: fs-lib *** Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: *** Including module: kdumpbase *** Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: *** Including module: microcode_ctl-fw_dir_override *** Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl module: mangling fw_dir Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware" Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: configuration "intel" is ignored Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: configuration "intel-06-2d-07" is ignored Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: configuration "intel-06-4e-03" is ignored Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: configuration "intel-06-4f-01" is ignored Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: configuration "intel-06-55-04" is ignored Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: configuration "intel-06-5e-03" is ignored Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: configuration "intel-06-8c-01" is ignored Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8f-08"... Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: configuration "intel-06-8f-08" is ignored Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: microcode_ctl: final fw_dir: "/lib/firmware/updates /lib/firmware" Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: *** Including module: openssl *** Feb 22 22:02:46 np0005626394.novalocal dracut[1540]: *** Including module: shutdown *** Feb 22 22:02:47 np0005626394.novalocal dracut[1540]: *** Including module: squash *** Feb 22 22:02:47 np0005626394.novalocal dracut[1540]: *** Including modules done *** Feb 22 22:02:47 np0005626394.novalocal dracut[1540]: *** Installing kernel module dependencies *** Feb 22 22:02:47 np0005626394.novalocal dracut[1540]: *** Installing kernel module dependencies done *** Feb 22 22:02:47 np0005626394.novalocal dracut[1540]: *** Resolving executable dependencies *** Feb 22 22:02:48 np0005626394.novalocal irqbalance[808]: Cannot change IRQ 35 affinity: Operation not permitted Feb 22 22:02:48 np0005626394.novalocal irqbalance[808]: IRQ 35 affinity is now unmanaged Feb 22 22:02:48 np0005626394.novalocal irqbalance[808]: Cannot change IRQ 33 affinity: Operation not permitted Feb 22 22:02:48 np0005626394.novalocal irqbalance[808]: IRQ 33 affinity is now unmanaged Feb 22 22:02:48 np0005626394.novalocal irqbalance[808]: Cannot change IRQ 31 affinity: Operation not permitted Feb 22 22:02:48 np0005626394.novalocal irqbalance[808]: IRQ 31 affinity is now unmanaged Feb 22 22:02:48 np0005626394.novalocal irqbalance[808]: Cannot change IRQ 26 affinity: Operation not permitted Feb 22 22:02:48 np0005626394.novalocal irqbalance[808]: IRQ 26 affinity is now unmanaged Feb 22 22:02:48 np0005626394.novalocal irqbalance[808]: Cannot change IRQ 34 affinity: Operation not permitted Feb 22 22:02:48 np0005626394.novalocal irqbalance[808]: IRQ 34 affinity is now unmanaged Feb 22 22:02:48 np0005626394.novalocal irqbalance[808]: Cannot change IRQ 32 affinity: Operation not permitted Feb 22 22:02:48 np0005626394.novalocal irqbalance[808]: IRQ 32 affinity is now unmanaged Feb 22 22:02:48 np0005626394.novalocal sshd-session[3755]: Accepted publickey for zuul-worker from 38.102.83.114 port 53342 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Feb 22 22:02:49 np0005626394.novalocal systemd[1]: Created slice User Slice of UID 1000. Feb 22 22:02:49 np0005626394.novalocal systemd[1]: Starting User Runtime Directory /run/user/1000... Feb 22 22:02:49 np0005626394.novalocal systemd-logind[811]: New session 1 of user zuul-worker. Feb 22 22:02:49 np0005626394.novalocal systemd[1]: Finished User Runtime Directory /run/user/1000. Feb 22 22:02:49 np0005626394.novalocal systemd[1]: Starting User Manager for UID 1000... Feb 22 22:02:49 np0005626394.novalocal systemd[3876]: pam_unix(systemd-user:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Feb 22 22:02:49 np0005626394.novalocal systemd[3876]: Queued start job for default target Main User Target. Feb 22 22:02:49 np0005626394.novalocal systemd[3876]: Created slice User Application Slice. Feb 22 22:02:49 np0005626394.novalocal systemd[3876]: Started Mark boot as successful after the user session has run 2 minutes. Feb 22 22:02:49 np0005626394.novalocal systemd[3876]: Started Daily Cleanup of User's Temporary Directories. Feb 22 22:02:49 np0005626394.novalocal systemd[3876]: Reached target Paths. Feb 22 22:02:49 np0005626394.novalocal systemd[3876]: Reached target Timers. Feb 22 22:02:49 np0005626394.novalocal systemd[3876]: Starting D-Bus User Message Bus Socket... Feb 22 22:02:49 np0005626394.novalocal systemd[3876]: Starting Create User's Volatile Files and Directories... Feb 22 22:02:49 np0005626394.novalocal systemd[3876]: Finished Create User's Volatile Files and Directories. Feb 22 22:02:49 np0005626394.novalocal systemd[3876]: Listening on D-Bus User Message Bus Socket. Feb 22 22:02:49 np0005626394.novalocal systemd[3876]: Reached target Sockets. Feb 22 22:02:49 np0005626394.novalocal systemd[3876]: Reached target Basic System. Feb 22 22:02:49 np0005626394.novalocal systemd[3876]: Reached target Main User Target. Feb 22 22:02:49 np0005626394.novalocal systemd[3876]: Startup finished in 114ms. Feb 22 22:02:49 np0005626394.novalocal systemd[1]: Started User Manager for UID 1000. Feb 22 22:02:49 np0005626394.novalocal systemd[1]: Started Session 1 of User zuul-worker. Feb 22 22:02:49 np0005626394.novalocal sshd-session[3755]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Feb 22 22:02:49 np0005626394.novalocal systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Feb 22 22:02:49 np0005626394.novalocal python3[4252]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 22 22:02:49 np0005626394.novalocal dracut[1540]: *** Resolving executable dependencies done *** Feb 22 22:02:49 np0005626394.novalocal dracut[1540]: *** Generating early-microcode cpio image *** Feb 22 22:02:49 np0005626394.novalocal dracut[1540]: *** Store current command line parameters *** Feb 22 22:02:49 np0005626394.novalocal dracut[1540]: Stored kernel commandline: Feb 22 22:02:49 np0005626394.novalocal dracut[1540]: No dracut internal kernel commandline stored in the initramfs Feb 22 22:02:49 np0005626394.novalocal dracut[1540]: *** Install squash loader *** Feb 22 22:02:50 np0005626394.novalocal dracut[1540]: *** Squashing the files inside the initramfs *** Feb 22 22:02:51 np0005626394.novalocal python3[4696]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 22 22:02:51 np0005626394.novalocal dracut[1540]: *** Squashing the files inside the initramfs done *** Feb 22 22:02:51 np0005626394.novalocal dracut[1540]: *** Creating image file '/boot/initramfs-5.14.0-681.el9.x86_64kdump.img' *** Feb 22 22:02:51 np0005626394.novalocal dracut[1540]: *** Hardlinking files *** Feb 22 22:02:51 np0005626394.novalocal dracut[1540]: Mode: real Feb 22 22:02:51 np0005626394.novalocal dracut[1540]: Files: 50 Feb 22 22:02:51 np0005626394.novalocal dracut[1540]: Linked: 0 files Feb 22 22:02:51 np0005626394.novalocal dracut[1540]: Compared: 0 xattrs Feb 22 22:02:51 np0005626394.novalocal dracut[1540]: Compared: 0 files Feb 22 22:02:51 np0005626394.novalocal dracut[1540]: Saved: 0 B Feb 22 22:02:51 np0005626394.novalocal dracut[1540]: Duration: 0.000391 seconds Feb 22 22:02:51 np0005626394.novalocal dracut[1540]: *** Hardlinking files done *** Feb 22 22:02:52 np0005626394.novalocal dracut[1540]: *** Creating initramfs image file '/boot/initramfs-5.14.0-681.el9.x86_64kdump.img' done *** Feb 22 22:02:52 np0005626394.novalocal kdumpctl[1028]: kdump: kexec: loaded kdump kernel Feb 22 22:02:52 np0005626394.novalocal kdumpctl[1028]: kdump: Starting kdump: [OK] Feb 22 22:02:52 np0005626394.novalocal systemd[1]: Finished Crash recovery kernel arming. Feb 22 22:02:52 np0005626394.novalocal systemd[1]: Startup finished in 1.402s (kernel) + 2.507s (initrd) + 16.502s (userspace) = 20.412s. Feb 22 22:02:55 np0005626394.novalocal python3[4969]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 22 22:02:55 np0005626394.novalocal python3[5009]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Feb 22 22:02:57 np0005626394.novalocal python3[5035]: ansible-authorized_key Invoked with user=zuul-worker state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 22 22:02:57 np0005626394.novalocal python3[5059]: ansible-file Invoked with state=directory path=/home/zuul-worker/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:02:58 np0005626394.novalocal python3[5158]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 22 22:02:58 np0005626394.novalocal python3[5229]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771815777.8365211-163-236353827400708/source dest=/home/zuul-worker/.ssh/id_rsa mode=384 force=False _original_basename=b98a5f061e694f92972256067b87c028_id_rsa follow=False checksum=948e50d23be2710464c0f29a7ef2d6d8d45db99b backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:02:58 np0005626394.novalocal python3[5352]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 22 22:02:59 np0005626394.novalocal python3[5423]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771815778.6806352-174-114041056581896/source dest=/home/zuul-worker/.ssh/id_rsa.pub mode=420 force=False _original_basename=b98a5f061e694f92972256067b87c028_id_rsa.pub follow=False checksum=dc4d33d3073a5bfa213fc0083e59930442c83eb5 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:00 np0005626394.novalocal python3[5471]: ansible-ping Invoked with data=pong Feb 22 22:03:01 np0005626394.novalocal python3[5495]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 22 22:03:03 np0005626394.novalocal python3[5553]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Feb 22 22:03:04 np0005626394.novalocal python3[5585]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:05 np0005626394.novalocal python3[5609]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:05 np0005626394.novalocal python3[5633]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:05 np0005626394.novalocal python3[5657]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:05 np0005626394.novalocal python3[5681]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:05 np0005626394.novalocal python3[5705]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:08 np0005626394.novalocal python3[5729]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Feb 22 22:03:09 np0005626394.novalocal sshd-session[5732]: Accepted publickey for zuul-worker from 38.102.83.114 port 40094 ssh2: RSA SHA256:Bngd+R061rsYAbjLnQNpGqpjImZALWmpKRNKihXVYLc Feb 22 22:03:09 np0005626394.novalocal systemd-logind[811]: New session 3 of user zuul-worker. Feb 22 22:03:09 np0005626394.novalocal systemd[1]: Started Session 3 of User zuul-worker. Feb 22 22:03:09 np0005626394.novalocal sshd-session[5732]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Feb 22 22:03:09 np0005626394.novalocal systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 22 22:03:11 np0005626394.novalocal sshd-session[5735]: Received disconnect from 38.102.83.114 port 40094:11: disconnected by user Feb 22 22:03:11 np0005626394.novalocal sshd-session[5735]: Disconnected from user zuul-worker 38.102.83.114 port 40094 Feb 22 22:03:11 np0005626394.novalocal sshd-session[5732]: pam_unix(sshd:session): session closed for user zuul-worker Feb 22 22:03:11 np0005626394.novalocal systemd[1]: session-3.scope: Deactivated successfully. Feb 22 22:03:11 np0005626394.novalocal systemd[1]: session-3.scope: Consumed 1.416s CPU time. Feb 22 22:03:11 np0005626394.novalocal systemd-logind[811]: Session 3 logged out. Waiting for processes to exit. Feb 22 22:03:11 np0005626394.novalocal systemd-logind[811]: Removed session 3. Feb 22 22:03:11 np0005626394.novalocal python3[5785]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:12 np0005626394.novalocal python3[5809]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:12 np0005626394.novalocal python3[5833]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:12 np0005626394.novalocal python3[5857]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:12 np0005626394.novalocal python3[5881]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:13 np0005626394.novalocal python3[5905]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:13 np0005626394.novalocal python3[5930]: ansible-ansible.legacy.command Invoked with _raw_params=sudo -n true zuul_log_id=fa163ef9-e89a-34be-7c32-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 22:03:13 np0005626394.novalocal sudo[5931]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/true Feb 22 22:03:13 np0005626394.novalocal sudo[5931]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:13 np0005626394.novalocal sudo[5931]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:14 np0005626394.novalocal python3[5959]: ansible-file Invoked with path=/home/zuul-worker/.pydistutils.cfg state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:14 np0005626394.novalocal sudo[6035]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-splohewnuorysdkazjtauhirunccyawj ; /usr/bin/python3' Feb 22 22:03:14 np0005626394.novalocal sudo[6035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:14 np0005626394.novalocal python3[6037]: ansible-ansible.legacy.stat Invoked with path=/etc/pip.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 22 22:03:14 np0005626394.novalocal sudo[6035]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:14 np0005626394.novalocal sudo[6108]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mhbgmmeyhcqlvawriyxfczbrotpwvrck ; /usr/bin/python3' Feb 22 22:03:14 np0005626394.novalocal sudo[6108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:14 np0005626394.novalocal python3[6110]: ansible-ansible.legacy.copy Invoked with dest=/etc/pip.conf group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771815794.3283796-91-56960507049800/source follow=False _original_basename=pip.conf.j2 checksum=5b65c9094402b8db60a77928be1f816342638afe backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:15 np0005626394.novalocal sudo[6108]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:15 np0005626394.novalocal sudo[6210]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-unelmiycyeyyibhnxjufovbyufitaavm ; /usr/bin/python3' Feb 22 22:03:15 np0005626394.novalocal sudo[6210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:15 np0005626394.novalocal python3[6212]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 22 22:03:15 np0005626394.novalocal sudo[6210]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:15 np0005626394.novalocal sudo[6285]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qrlyonpexcxeluhbexlkcnuqszovuhwo ; /usr/bin/python3' Feb 22 22:03:15 np0005626394.novalocal sudo[6285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:15 np0005626394.novalocal python3[6287]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771815795.2988083-103-50824376559684/source follow=False _original_basename=centos.repo.j2 checksum=0268eb1686bc9b047a2096dbaf287658b0d20a19 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:15 np0005626394.novalocal sudo[6285]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:16 np0005626394.novalocal sudo[6387]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zrnqkjejmdkevqoresuaokjcoxavrdmi ; /usr/bin/python3' Feb 22 22:03:16 np0005626394.novalocal sudo[6387]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:16 np0005626394.novalocal python3[6389]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos-addons.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 22 22:03:16 np0005626394.novalocal sudo[6387]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:16 np0005626394.novalocal sudo[6462]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ggryuibkpdrunbfufaocjeupdhhmpzne ; /usr/bin/python3' Feb 22 22:03:16 np0005626394.novalocal sudo[6462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:16 np0005626394.novalocal python3[6464]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos-addons.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771815796.1430902-103-95709500185038/source follow=False _original_basename=centos-addons.repo.j2 checksum=2917e612982cadeb3009a3bf37bf30cbcd7f2044 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:16 np0005626394.novalocal sudo[6462]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:17 np0005626394.novalocal sudo[6512]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-axbgxsdsrbgwgzwxxzhijgngctucvveu ; /usr/bin/python3' Feb 22 22:03:17 np0005626394.novalocal sudo[6512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:17 np0005626394.novalocal python3[6514]: ansible-ini_file Invoked with path=/etc/dnf.conf section=main option=deltarpm value=0 mode=420 backup=False state=present exclusive=True no_extra_spaces=False ignore_spaces=False allow_no_value=False create=True follow=False unsafe_writes=False values=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:17 np0005626394.novalocal python3[6514]: ansible-ini_file [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Feb 22 22:03:17 np0005626394.novalocal sudo[6512]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:17 np0005626394.novalocal sudo[6538]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vltdllvfdqlwdasfeqvbzgurovvjmzyh ; /usr/bin/python3' Feb 22 22:03:17 np0005626394.novalocal sudo[6538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:17 np0005626394.novalocal python3[6540]: ansible-ansible.legacy.command Invoked with _raw_params=dnf clean all zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 22:03:18 np0005626394.novalocal sudo[6538]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:18 np0005626394.novalocal sudo[6566]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mobmfxzqliwusqegrafavawtjidzlzpf ; /usr/bin/python3' Feb 22 22:03:18 np0005626394.novalocal sudo[6566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:18 np0005626394.novalocal python3[6568]: ansible-ansible.legacy.command Invoked with _raw_params=dnf makecache -v zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 22:03:19 np0005626394.novalocal irqbalance[808]: Cannot change IRQ 28 affinity: Operation not permitted Feb 22 22:03:19 np0005626394.novalocal irqbalance[808]: IRQ 28 affinity is now unmanaged Feb 22 22:03:28 np0005626394.novalocal sudo[6566]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:30 np0005626394.novalocal python3[6609]: ansible-file Invoked with path=/home/zuul-worker/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:30 np0005626394.novalocal python3[6634]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=PYTHON2=0 PYTHON3=1 # Not all platforms install a `pip` when installing python # specific pip packages. We first check if pip$VERSION is # available and if not fallback to checking if just `pip` # is present. if [ "$PYTHON2" -eq "1" ] ; then command -v pip2 || command -v pip || exit 1 python2 -m wheel --help || exit 1 fi if [ "$PYTHON3" -eq "1" ] ; then command -v pip3 || command -v pip || exit 1 python3 -m wheel --help || exit 1 fi _uses_shell=True zuul_log_id=fa163ef9-e89a-34d1-8ffa-000000000089-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 22 22:03:31 np0005626394.novalocal sudo[6662]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-eakcsmvqkzpcdqsprbgkthrpjislgght ; /usr/bin/python3' Feb 22 22:03:31 np0005626394.novalocal sudo[6662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:31 np0005626394.novalocal python3[6664]: ansible-ansible.legacy.dnf Invoked with name=['python3-pip', 'python3-setuptools', 'python3-wheel'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 22:03:33 np0005626394.novalocal sudo[6662]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:34 np0005626394.novalocal python3[6696]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v python3 _uses_shell=True zuul_log_id=fa163ef9-e89a-34d1-8ffa-000000000093-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 22 22:03:35 np0005626394.novalocal python3[6724]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v tox /home/zuul-worker/.local/tox/bin/tox || exit 1 _uses_shell=True zuul_log_id=fa163ef9-e89a-34d1-8ffa-000000000021-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 22 22:03:35 np0005626394.novalocal python3[6752]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/bin/python3 -m venv /home/zuul-worker/.local/tox zuul_log_id=fa163ef9-e89a-34d1-8ffa-000000000024-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 22:03:38 np0005626394.novalocal python3[6784]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/pip install tox zuul_log_id=fa163ef9-e89a-34d1-8ffa-000000000025-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 22:03:41 np0005626394.novalocal python3[6814]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/tox --version zuul_log_id=fa163ef9-e89a-34d1-8ffa-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 22:03:42 np0005626394.novalocal sudo[6841]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hhsctmjboqdnvwhcjxvuuatewkkbctmf ; /usr/bin/python3' Feb 22 22:03:42 np0005626394.novalocal sudo[6841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:42 np0005626394.novalocal python3[6843]: ansible-file Invoked with state=link src=/home/zuul-worker/.local/tox/bin/tox dest=/usr/local/bin/tox path=/usr/local/bin/tox recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:42 np0005626394.novalocal sudo[6841]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:43 np0005626394.novalocal python3[6868]: ansible-ansible.legacy.command Invoked with _raw_params=export WBASE="/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo"; mkdir -p $WBASE/playbooks/roles ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-common" $WBASE/playbooks/roles/common; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-logs" $WBASE/playbooks/roles/logs; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-kolla" $WBASE/playbooks/roles/kolla; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-packstack" $WBASE/playbooks/roles/packstack; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-puppet-openstack" $WBASE/playbooks/roles/puppet-openstack; # noqa 204 ln -s "/home/zuul-worker/src/github.com/openstack-k8s-operators/ci-framework/roles/build_containers" $WBASE/playbooks/roles/build_containers; # noqa 204 _uses_shell=True zuul_log_id=fa163ef9-e89a-34d1-8ffa-00000000003f-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 22:03:43 np0005626394.novalocal sudo[6901]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zviueirwcjnwrzeqxvoidgyodxfgvdmy ; /usr/bin/python3' Feb 22 22:03:43 np0005626394.novalocal sudo[6901]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:43 np0005626394.novalocal python3[6903]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:43 np0005626394.novalocal sudo[6901]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:44 np0005626394.novalocal sudo[6979]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vavucixctellwkpzltlmjbmgfcxsbqlh ; /usr/bin/python3' Feb 22 22:03:44 np0005626394.novalocal sudo[6979]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:44 np0005626394.novalocal python3[6981]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 22 22:03:44 np0005626394.novalocal sudo[6979]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:44 np0005626394.novalocal sudo[7052]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dwoimuqypeckassdqsuslfqibqfkfsyc ; /usr/bin/python3' Feb 22 22:03:44 np0005626394.novalocal sudo[7052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:44 np0005626394.novalocal python3[7054]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771815823.8485773-81-97633866961593/source follow=False _original_basename=mirror_info.sh.j2 checksum=ea5d641d750b2605d80a15d4106dfb6027081c92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 22:03:44 np0005626394.novalocal sudo[7052]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:44 np0005626394.novalocal sudo[7103]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rcqlloadbnhygugmlwgbntqkrfvzdmeu ; /usr/bin/python3' Feb 22 22:03:44 np0005626394.novalocal sudo[7103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:03:44 np0005626394.novalocal python3[7105]: ansible-ansible.legacy.command Invoked with _raw_params=dnf install -y python3-pip rpmlint python3-rpm _uses_shell=True zuul_log_id=fa163ef9-e89a-34d1-8ffa-000000000052-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 22:03:45 np0005626394.novalocal sudo[7103]: pam_unix(sudo:session): session closed for user root Feb 22 22:03:46 np0005626394.novalocal python3[7132]: ansible-pip Invoked with name=['rdopkg'] virtualenv=/home/zuul-worker/rdopkg-venv virtualenv_command=/usr/bin/python3 -m venv virtualenv_site_packages=True state=present editable=False version=None requirements=None virtualenv_python=None extra_args=None chdir=None executable=None umask=None Feb 22 22:03:49 np0005626394.novalocal irqbalance[808]: Cannot change IRQ 30 affinity: Operation not permitted Feb 22 22:03:49 np0005626394.novalocal irqbalance[808]: IRQ 30 affinity is now unmanaged Feb 22 22:03:52 np0005626394.novalocal python3[7165]: ansible-ansible.legacy.command Invoked with _raw_params=set -e -x source '/home/zuul-worker/rdopkg-venv/bin/activate' MASTER="$(rdopkg info | grep -e "in development phase" | awk '{print $1}')" RELEASE="dalmatian" DIST_VER="9" # Find out if it is puppet or packstack and scenario if [[ "weirdo-dalmatian-promote-puppet-scenario005-centos-stream-9" == *"puppet"* ]]; then project="puppet-openstack" else project="packstack" fi scenario="scenario005" # Set version related variables if [ $RELEASE = $MASTER ]; then VERSION="master" O_RELEASE="master" else VERSION="$(rdopkg release -r "$RELEASE" | grep upstream_branch | awk '{print $2}')" O_RELEASE="$RELEASE" fi if [[ "promotion" == "promotion" ]]; then enable_puppet_modules_rpm=false dlrn_repo="puppet-ci-testing" else enable_puppet_modules_rpm=true dlrn_repo="puppet-passed-ci" fi # Prepare Ansible inventory to use localhost pushd /home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo cat <hosts localhost ansible_connection=local ansible_python_interpreter=/usr/bin/python3 [openstack_nodes] localhost log_destination=/var/log/weirdo EOF REPOS_URL="http://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/${dlrn_repo}/delorean.repo,https://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/delorean-deps.repo" # noqa 204 tox -e ansible-playbook -- -vv -b -i hosts playbooks/$project-$scenario.yml \ -e version=$VERSION \ -e openstack_release=$O_RELEASE \ -e selinux_enforcing="false" \ -e tempest_from_source=false \ -e enable_puppet_modules_rpm=${enable_puppet_modules_rpm} \ -e trunk_repositories=$REPOS_URL \ _uses_shell=True zuul_log_id=fa163ef9-e89a-34d1-8ffa-000000000005-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 22:04:55 np0005626394.novalocal sudo[7475]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-crtqbzdqcfaqdarngeyxeeapyuoumpti ; /usr/bin/python3' Feb 22 22:04:55 np0005626394.novalocal sudo[7475]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:04:55 np0005626394.novalocal python3[7477]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=* fact_path=/etc/ansible/facts.d Feb 22 22:04:55 np0005626394.novalocal sudo[7475]: pam_unix(sudo:session): session closed for user root Feb 22 22:04:56 np0005626394.novalocal sudo[7515]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nqydnaecyaaejupjlqjwxvraulnkocsb ; /usr/bin/python3' Feb 22 22:04:56 np0005626394.novalocal sudo[7515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:04:56 np0005626394.novalocal python3[7517]: ansible-command Invoked with _raw_params=sudo dnf config-manager --enable crb _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 22:04:56 np0005626394.novalocal python3[7517]: ansible-command [WARNING] Consider using 'become', 'become_method', and 'become_user' rather than running sudo Feb 22 22:04:56 np0005626394.novalocal sudo[7518]: root : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/dnf config-manager --enable crb Feb 22 22:04:56 np0005626394.novalocal sudo[7518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:04:56 np0005626394.novalocal sudo[7518]: pam_unix(sudo:session): session closed for user root Feb 22 22:04:56 np0005626394.novalocal sudo[7515]: pam_unix(sudo:session): session closed for user root Feb 22 22:04:56 np0005626394.novalocal sudo[7528]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xjkmmgznqqgjqsqqotwmioapuekparhi ; /usr/bin/python3' Feb 22 22:04:56 np0005626394.novalocal sudo[7528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:04:57 np0005626394.novalocal python3[7530]: ansible-systemd Invoked with name=firewalld state=stopped daemon_reload=False daemon_reexec=False no_block=False enabled=None force=None masked=None user=None scope=None Feb 22 22:04:57 np0005626394.novalocal sudo[7528]: pam_unix(sudo:session): session closed for user root Feb 22 22:04:57 np0005626394.novalocal sudo[7539]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-alxlgvzomagvgbhvhirydhhpbsbfvkjc ; /usr/bin/python3' Feb 22 22:04:57 np0005626394.novalocal sudo[7539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:04:57 np0005626394.novalocal python3[7541]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 22:04:58 np0005626394.novalocal sudo[7539]: pam_unix(sudo:session): session closed for user root Feb 22 22:04:58 np0005626394.novalocal sudo[7557]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vryzljbdqljboadvjdzcbfbzrluvwpvp ; /usr/bin/python3' Feb 22 22:04:58 np0005626394.novalocal sudo[7557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:04:58 np0005626394.novalocal python3[7559]: ansible-dnf Invoked with name=['tuned', 'subscription-manager'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 22:05:00 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:05:01 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:05:01 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:05:01 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:05:01 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:05:01 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:05:01 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:05:01 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:05:01 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:05:01 np0005626394.novalocal systemd-rc-local-generator[7629]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:05:01 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:05:03 np0005626394.novalocal sudo[7557]: pam_unix(sudo:session): session closed for user root Feb 22 22:05:03 np0005626394.novalocal sudo[9325]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wmafyeotmnecanmjfedtuddgqwtxzvve ; /usr/bin/python3' Feb 22 22:05:03 np0005626394.novalocal sudo[9325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:05:03 np0005626394.novalocal python3[9359]: ansible-systemd Invoked with name=tuned enabled=True state=started daemon_reload=False daemon_reexec=False no_block=False force=None masked=None user=None scope=None Feb 22 22:05:03 np0005626394.novalocal systemd[1]: Starting Dynamic System Tuning Daemon... Feb 22 22:05:04 np0005626394.novalocal systemd[1]: Starting Authorization Manager... Feb 22 22:05:04 np0005626394.novalocal systemd[1]: Started Dynamic System Tuning Daemon. Feb 22 22:05:04 np0005626394.novalocal polkitd[10366]: Started polkitd version 0.117 Feb 22 22:05:04 np0005626394.novalocal sudo[9325]: pam_unix(sudo:session): session closed for user root Feb 22 22:05:04 np0005626394.novalocal sudo[10544]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zxhcbwpylochadkuudhedncjzimoiobo ; /usr/bin/python3' Feb 22 22:05:04 np0005626394.novalocal sudo[10544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:05:04 np0005626394.novalocal polkitd[10366]: Loading rules from directory /etc/polkit-1/rules.d Feb 22 22:05:04 np0005626394.novalocal polkitd[10366]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 22 22:05:04 np0005626394.novalocal polkitd[10366]: Finished loading, compiling and executing 2 rules Feb 22 22:05:04 np0005626394.novalocal systemd[1]: Started Authorization Manager. Feb 22 22:05:04 np0005626394.novalocal polkitd[10366]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 22 22:05:04 np0005626394.novalocal python3[10577]: ansible-command Invoked with _raw_params=tuned-adm active warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 22:05:04 np0005626394.novalocal sudo[10544]: pam_unix(sudo:session): session closed for user root Feb 22 22:05:04 np0005626394.novalocal sudo[10993]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yheowrnkpwovqeogyylsctnfnlfljpwj ; /usr/bin/python3' Feb 22 22:05:04 np0005626394.novalocal sudo[10993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:05:05 np0005626394.novalocal python3[11015]: ansible-command Invoked with _raw_params=tuned-adm profile throughput-performance warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 22:05:06 np0005626394.novalocal sudo[10993]: pam_unix(sudo:session): session closed for user root Feb 22 22:05:06 np0005626394.novalocal sudo[12303]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mnovvuijsdrplmnqvncqevxllpxlaupr ; /usr/bin/python3' Feb 22 22:05:06 np0005626394.novalocal sudo[12303]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:05:06 np0005626394.novalocal python3[12309]: ansible-file Invoked with path=/var/log/weirdo state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 22 22:05:06 np0005626394.novalocal sudo[12303]: pam_unix(sudo:session): session closed for user root Feb 22 22:05:06 np0005626394.novalocal sudo[12544]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-soptuxtueaikgkuldbeacshfzvbxjtcw ; /usr/bin/python3' Feb 22 22:05:06 np0005626394.novalocal sudo[12544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:05:06 np0005626394.novalocal python3[12562]: ansible-file Invoked with path=/var/log/weirdo-project state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 22 22:05:06 np0005626394.novalocal sudo[12544]: pam_unix(sudo:session): session closed for user root Feb 22 22:05:07 np0005626394.novalocal sudo[13097]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ovojkwrdoutpnuoebqdafrgerdsdcmar ; /usr/bin/python3' Feb 22 22:05:07 np0005626394.novalocal sudo[13097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:05:07 np0005626394.novalocal python3[13118]: ansible-get_url Invoked with url=http://trunk.rdoproject.org/centos9-dalmatian/puppet-ci-testing/delorean.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Feb 22 22:05:07 np0005626394.novalocal sudo[13097]: pam_unix(sudo:session): session closed for user root Feb 22 22:05:07 np0005626394.novalocal sudo[13379]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dlwlzhwblphtioteliqewcganvopcsct ; /usr/bin/python3' Feb 22 22:05:07 np0005626394.novalocal sudo[13379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:05:07 np0005626394.novalocal python3[13389]: ansible-get_url Invoked with url=https://trunk.rdoproject.org/centos9-dalmatian/delorean-deps.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Feb 22 22:05:07 np0005626394.novalocal sudo[13379]: pam_unix(sudo:session): session closed for user root Feb 22 22:05:07 np0005626394.novalocal sudo[13518]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ajropyualinhbydilwkupkybqhvlwhpu ; /usr/bin/python3' Feb 22 22:05:07 np0005626394.novalocal sudo[13518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:05:08 np0005626394.novalocal python3[13520]: ansible-command Invoked with _raw_params=if [ -f /etc/ci/mirror_info.sh ]; then source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|${NODEPOOL_RDO_PROXY}|g" /etc/yum.repos.d/*.repo # For CentOS8 sed -i -e "s|http://mirror.centos.org/centos|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo # For CentOS9 sed -i -e "s|http://mirror.stream.centos.org|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo fi _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 22:05:08 np0005626394.novalocal sudo[13518]: pam_unix(sudo:session): session closed for user root Feb 22 22:05:08 np0005626394.novalocal systemd[3876]: Starting Mark boot as successful... Feb 22 22:05:08 np0005626394.novalocal systemd[3876]: Finished Mark boot as successful. Feb 22 22:05:08 np0005626394.novalocal sudo[13654]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wggnkhtbofvvuxlxsrhcjusvxjaiebjy ; /usr/bin/python3' Feb 22 22:05:08 np0005626394.novalocal sudo[13654]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:05:08 np0005626394.novalocal python3[13656]: ansible-command Invoked with _raw_params=repoquery --disablerepo='*' --enablerepo='delorean*' -a --qf '%{sourcerpm}'|sort -u|sed 's/.src.rpm//g' >/var/log/weirdo/rdo-trunk-deps-start.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 22:05:12 np0005626394.novalocal sudo[13654]: pam_unix(sudo:session): session closed for user root Feb 22 22:05:12 np0005626394.novalocal sudo[15729]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hifnxrqlgtctoqaoeptzjnyuwqsbaujs ; /usr/bin/python3' Feb 22 22:05:12 np0005626394.novalocal sudo[15729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:05:12 np0005626394.novalocal python3[15737]: ansible-command Invoked with _raw_params=dnf clean all _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 22:05:12 np0005626394.novalocal python3[15737]: ansible-command [WARNING] Consider using the dnf module rather than running 'dnf'. If you need to use command because dnf is insufficient you can add 'warn: false' to this command task or set 'command_warnings=False' in ansible.cfg to get rid of this message. Feb 22 22:05:13 np0005626394.novalocal sudo[15729]: pam_unix(sudo:session): session closed for user root Feb 22 22:05:13 np0005626394.novalocal sudo[16044]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qdgqxtocwfyjcbcaalxtlcqaxxppcndf ; /usr/bin/python3' Feb 22 22:05:13 np0005626394.novalocal sudo[16044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:05:13 np0005626394.novalocal python3[16058]: ansible-dnf Invoked with name=['*'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 22:05:36 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:05:36 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:05:36 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Consumed 38.649s CPU time. Feb 22 22:05:36 np0005626394.novalocal systemd[1]: run-r9e95a13fc2834978aac7ab0ddd4287e2.service: Deactivated successfully. Feb 22 22:05:44 np0005626394.novalocal sudo[16044]: pam_unix(sudo:session): session closed for user root Feb 22 22:05:44 np0005626394.novalocal sudo[28310]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mwdbauhzdzjaqakvulwmryxfoagjnqnc ; /usr/bin/python3' Feb 22 22:05:44 np0005626394.novalocal sudo[28310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:05:45 np0005626394.novalocal python3[28312]: ansible-dnf Invoked with name=['gettext', 'diffstat', 'doxygen', 'patch', 'patchutils', 'subversion', 'systemtap', 'git', 'wget', 'python3-libselinux', 'python3-setuptools', 'rubygem-rexml'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 22:05:58 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:05:58 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:06:32 np0005626394.novalocal groupadd[45419]: group added to /etc/group: name=rtkit, GID=172 Feb 22 22:06:32 np0005626394.novalocal groupadd[45419]: group added to /etc/gshadow: name=rtkit Feb 22 22:06:32 np0005626394.novalocal groupadd[45419]: new group: name=rtkit, GID=172 Feb 22 22:06:32 np0005626394.novalocal useradd[45427]: new user: name=rtkit, UID=172, GID=172, home=/, shell=/sbin/nologin, from=none Feb 22 22:06:32 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:06:32 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:06:32 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:06:33 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:06:33 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:06:44 np0005626394.novalocal kernel: SELinux: Converting 447 SID table entries... Feb 22 22:06:44 np0005626394.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 22:06:44 np0005626394.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 22:06:44 np0005626394.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 22:06:44 np0005626394.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 22:06:44 np0005626394.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 22:06:44 np0005626394.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 22:06:44 np0005626394.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 22:06:52 np0005626394.novalocal groupadd[45498]: group added to /etc/group: name=geoclue, GID=994 Feb 22 22:06:52 np0005626394.novalocal groupadd[45498]: group added to /etc/gshadow: name=geoclue Feb 22 22:06:52 np0005626394.novalocal groupadd[45498]: new group: name=geoclue, GID=994 Feb 22 22:06:52 np0005626394.novalocal useradd[45505]: new user: name=geoclue, UID=993, GID=994, home=/var/lib/geoclue, shell=/sbin/nologin, from=none Feb 22 22:06:52 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:06:52 np0005626394.novalocal dbus-broker-launch[790]: avc: op=load_policy lsm=selinux seqno=2 res=1 Feb 22 22:06:52 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Reloading rules Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Collecting garbage unconditionally... Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Loading rules from directory /etc/polkit-1/rules.d Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Finished loading, compiling and executing 3 rules Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Reloading rules Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Collecting garbage unconditionally... Feb 22 22:06:52 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Loading rules from directory /etc/polkit-1/rules.d Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Finished loading, compiling and executing 3 rules Feb 22 22:06:52 np0005626394.novalocal groupadd[45517]: group added to /etc/group: name=flatpak, GID=993 Feb 22 22:06:52 np0005626394.novalocal groupadd[45517]: group added to /etc/gshadow: name=flatpak Feb 22 22:06:52 np0005626394.novalocal groupadd[45517]: new group: name=flatpak, GID=993 Feb 22 22:06:52 np0005626394.novalocal useradd[45524]: new user: name=flatpak, UID=992, GID=993, home=/, shell=/usr/sbin/nologin, from=none Feb 22 22:06:52 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:06:52 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:06:52 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Reloading rules Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Collecting garbage unconditionally... Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Loading rules from directory /etc/polkit-1/rules.d Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Finished loading, compiling and executing 4 rules Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Reloading rules Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Collecting garbage unconditionally... Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Loading rules from directory /etc/polkit-1/rules.d Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 22 22:06:52 np0005626394.novalocal polkitd[10366]: Finished loading, compiling and executing 4 rules Feb 22 22:06:53 np0005626394.novalocal systemd[1]: Stopping OpenSSH server daemon... Feb 22 22:06:53 np0005626394.novalocal sshd[1016]: Received signal 15; terminating. Feb 22 22:06:53 np0005626394.novalocal systemd[1]: sshd.service: Deactivated successfully. Feb 22 22:06:53 np0005626394.novalocal systemd[1]: Stopped OpenSSH server daemon. Feb 22 22:06:53 np0005626394.novalocal systemd[1]: Stopped target sshd-keygen.target. Feb 22 22:06:53 np0005626394.novalocal systemd[1]: Stopping sshd-keygen.target... Feb 22 22:06:53 np0005626394.novalocal systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 22 22:06:53 np0005626394.novalocal systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 22 22:06:53 np0005626394.novalocal systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 22 22:06:53 np0005626394.novalocal systemd[1]: Reached target sshd-keygen.target. Feb 22 22:06:53 np0005626394.novalocal systemd[1]: Starting OpenSSH server daemon... Feb 22 22:06:53 np0005626394.novalocal sshd[45565]: Server listening on 0.0.0.0 port 22. Feb 22 22:06:53 np0005626394.novalocal sshd[45565]: Server listening on :: port 22. Feb 22 22:06:53 np0005626394.novalocal systemd[1]: Started OpenSSH server daemon. Feb 22 22:06:54 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:06:54 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:06:54 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:06:55 np0005626394.novalocal systemd-rc-local-generator[45659]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:06:55 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:06:57 np0005626394.novalocal sudo[28310]: pam_unix(sudo:session): session closed for user root Feb 22 22:06:57 np0005626394.novalocal sudo[49922]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wmqyscwzqwbotzdvifqvcewzsypwwkzi ; /usr/bin/python3' Feb 22 22:06:57 np0005626394.novalocal sudo[49922]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:06:58 np0005626394.novalocal python3[49960]: ansible-dnf Invoked with name=['net-tools', 'lsof', 'sysstat', 'psmisc', 'dnf-utils'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 22:07:03 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:07:03 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:07:03 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Consumed 8.777s CPU time. Feb 22 22:07:03 np0005626394.novalocal systemd[1]: run-r9d8f74d73a2d44dd9fee0da9c720ad88.service: Deactivated successfully. Feb 22 22:07:04 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:07:04 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:07:04 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:07:04 np0005626394.novalocal systemd-rc-local-generator[54005]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:07:04 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:07:05 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:07:05 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:07:05 np0005626394.novalocal sudo[49922]: pam_unix(sudo:session): session closed for user root Feb 22 22:07:05 np0005626394.novalocal systemd[1]: run-r0d892d341a96490db4100742f0c1d87e.service: Deactivated successfully. Feb 22 22:07:05 np0005626394.novalocal sudo[54418]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fwvloixxclfchpkbjpxrxiqirishwfqm ; /usr/bin/python3' Feb 22 22:07:05 np0005626394.novalocal sudo[54418]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:07:05 np0005626394.novalocal python3[54420]: ansible-replace Invoked with dest=/usr/lib/systemd/system/sysstat-collect.timer regexp=10 replace=1 path=/usr/lib/systemd/system/sysstat-collect.timer backup=False encoding=utf-8 follow=False unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Feb 22 22:07:05 np0005626394.novalocal sudo[54418]: pam_unix(sudo:session): session closed for user root Feb 22 22:07:05 np0005626394.novalocal sudo[54427]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-phuvrbegsydbrqxipohsebtanktbssnu ; /usr/bin/python3' Feb 22 22:07:05 np0005626394.novalocal sudo[54427]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:07:05 np0005626394.novalocal python3[54429]: ansible-systemd Invoked with name=sysstat enabled=True daemon_reload=True state=started daemon_reexec=False no_block=False force=None masked=None user=None scope=None Feb 22 22:07:05 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:07:06 np0005626394.novalocal systemd-rc-local-generator[54446]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:07:06 np0005626394.novalocal systemd[1]: Started Run system activity accounting tool every 1 minutes. Feb 22 22:07:06 np0005626394.novalocal systemd[1]: Started Generate summary of yesterday's process accounting. Feb 22 22:07:06 np0005626394.novalocal systemd[1]: Starting Resets System Activity Logs... Feb 22 22:07:06 np0005626394.novalocal systemd[1]: Finished Resets System Activity Logs. Feb 22 22:07:06 np0005626394.novalocal sudo[54427]: pam_unix(sudo:session): session closed for user root Feb 22 22:07:06 np0005626394.novalocal sudo[54483]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vgdnyqbkvptyornymqkttclclmlpmxvo ; /usr/bin/python3' Feb 22 22:07:06 np0005626394.novalocal sudo[54483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:07:06 np0005626394.novalocal python3[54485]: ansible-lineinfile Invoked with dest=/etc/hosts line=127.0.0.1 np0005626394 np0005626394.novalocal state=present path=/etc/hosts backrefs=False create=False backup=False firstmatch=False follow=False unsafe_writes=False regexp=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Feb 22 22:07:06 np0005626394.novalocal sudo[54483]: pam_unix(sudo:session): session closed for user root Feb 22 22:07:06 np0005626394.novalocal sudo[54492]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-okgllagletgiimayjteernuazlkalvnx ; /usr/bin/python3' Feb 22 22:07:06 np0005626394.novalocal sudo[54492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:07:07 np0005626394.novalocal python3[54494]: ansible-dnf Invoked with name=['libxml2-devel', 'libxslt-devel', 'ruby-devel', 'rubygems', 'qemu-img'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 22:07:08 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:07:08 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:07:09 np0005626394.novalocal sudo[54492]: pam_unix(sudo:session): session closed for user root Feb 22 22:07:09 np0005626394.novalocal sudo[54829]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uzjxtsarubhskzqpkydepwsnvklfoqgp ; /usr/bin/python3' Feb 22 22:07:09 np0005626394.novalocal sudo[54829]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:07:09 np0005626394.novalocal python3[54831]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Feb 22 22:07:09 np0005626394.novalocal python3[54831]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Feb 22 22:07:09 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:07:09 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:07:09 np0005626394.novalocal sudo[54829]: pam_unix(sudo:session): session closed for user root Feb 22 22:07:09 np0005626394.novalocal systemd[1]: run-r86102d728f694a12a1211fe1c1e96fb4.service: Deactivated successfully. Feb 22 22:07:09 np0005626394.novalocal sudo[54842]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-trhlboqqkrluaemvlqwwhjzzxvamxjez ; /usr/bin/python3' Feb 22 22:07:09 np0005626394.novalocal sudo[54842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:07:09 np0005626394.novalocal python3[54844]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Feb 22 22:07:09 np0005626394.novalocal python3[54844]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Feb 22 22:07:09 np0005626394.novalocal sudo[54842]: pam_unix(sudo:session): session closed for user root Feb 22 22:07:09 np0005626394.novalocal sudo[54853]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mofnoutesterzqmihhnpbkzbgtqdyonj ; /usr/bin/python3' Feb 22 22:07:09 np0005626394.novalocal sudo[54853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:07:10 np0005626394.novalocal python3[54855]: ansible-git Invoked with repo=https://review.opendev.org/openstack/puppet-openstack-integration dest=/tmp/puppet-openstack version=stable/2024.2 force=True remote=origin clone=True update=True verify_commit=False gpg_whitelist=[] accept_hostkey=False bare=False recursive=True track_submodules=False refspec=None reference=None depth=None key_file=None ssh_opts=None executable=None umask=None archive=None separate_git_dir=None Feb 22 22:07:11 np0005626394.novalocal sudo[54853]: pam_unix(sudo:session): session closed for user root Feb 22 22:07:11 np0005626394.novalocal sudo[54887]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bjnfdqbebtuzbrblfefddikzhfydprci ; /usr/bin/python3' Feb 22 22:07:11 np0005626394.novalocal sudo[54887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:07:11 np0005626394.novalocal python3[54889]: ansible-file Invoked with path=/tmp/puppet-openstack/.bundled_gems state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 22 22:07:11 np0005626394.novalocal sudo[54887]: pam_unix(sudo:session): session closed for user root Feb 22 22:07:11 np0005626394.novalocal sudo[54911]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pglqxnifucnsgwddzcfevabqjksklgsf ; /usr/bin/python3' Feb 22 22:07:11 np0005626394.novalocal sudo[54911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:07:11 np0005626394.novalocal python3[54913]: ansible-file Invoked with path=/usr/zuul-env/bin/zuul-cloner state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 22 22:07:11 np0005626394.novalocal sudo[54911]: pam_unix(sudo:session): session closed for user root Feb 22 22:07:11 np0005626394.novalocal sudo[54921]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cjtsrppchjcchcbyhriahrhyrplluufu ; MANAGE_REPOS=false SCENARIO=scenario005 GEM_HOME=/tmp/puppet-openstack/.bundled_gems TEMPEST_VERSION=\'\' WORKSPACE=/var/log/weirdo-project TEMPEST_FROM_SOURCE=false PUPPETFILE_DIR=/etc/puppet/modules PUPPET_PKG=puppet PUPPET_ARGS=--modulepath=/usr/share/openstack-puppet/modules:/etc/puppet/modules SWAP_SIZE_GB=8 /usr/bin/python3' Feb 22 22:07:11 np0005626394.novalocal sudo[54921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:07:12 np0005626394.novalocal python3[54923]: ansible-command Invoked with chdir=/tmp/puppet-openstack _raw_params=./run_tests.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None creates=None removes=None stdin=None Feb 22 22:07:15 np0005626394.novalocal sshd-session[54954]: Invalid user admin from 80.94.95.116 port 46312 Feb 22 22:07:15 np0005626394.novalocal sshd-session[54954]: Connection closed by invalid user admin 80.94.95.116 port 46312 [preauth] Feb 22 22:08:08 np0005626394.novalocal systemd[3876]: Created slice User Background Tasks Slice. Feb 22 22:08:08 np0005626394.novalocal systemd[3876]: Starting Cleanup of User's Temporary Files and Directories... Feb 22 22:08:08 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:08:08 np0005626394.novalocal systemd[3876]: Finished Cleanup of User's Temporary Files and Directories. Feb 22 22:08:08 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:08:08 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:09:08 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:09:08 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:09:08 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:10:08 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:10:08 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:10:08 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:10:27 np0005626394.novalocal kernel: Adding 8388604k swap on /swapfile. Priority:-2 extents:13 across:13360316k Feb 22 22:10:42 np0005626394.novalocal groupadd[54995]: group added to /etc/group: name=puppet, GID=52 Feb 22 22:10:42 np0005626394.novalocal groupadd[54995]: group added to /etc/gshadow: name=puppet Feb 22 22:10:42 np0005626394.novalocal groupadd[54995]: new group: name=puppet, GID=52 Feb 22 22:10:42 np0005626394.novalocal useradd[55002]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Feb 22 22:10:44 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:10:44 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:10:44 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:10:44 np0005626394.novalocal systemd-rc-local-generator[55037]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:10:44 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:10:53 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:10:53 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:10:53 np0005626394.novalocal systemd[1]: run-rb5d51291021f4d52b28261d8ed9fd862.service: Deactivated successfully. Feb 22 22:11:08 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:11:08 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:11:08 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:11:26 np0005626394.novalocal kernel: SELinux: Converting 479 SID table entries... Feb 22 22:11:26 np0005626394.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 22:11:26 np0005626394.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 22:11:26 np0005626394.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 22:11:26 np0005626394.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 22:11:26 np0005626394.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 22:11:26 np0005626394.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 22:11:26 np0005626394.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 22:11:27 np0005626394.novalocal dbus-broker-launch[790]: avc: op=load_policy lsm=selinux seqno=3 res=1 Feb 22 22:11:27 np0005626394.novalocal systemd[1]: Starting PCP Reboot Initialization Helper Service... Feb 22 22:11:27 np0005626394.novalocal systemd[1]: Finished PCP Reboot Initialization Helper Service. Feb 22 22:11:27 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:11:27 np0005626394.novalocal systemd-rc-local-generator[56109]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:11:34 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:11:34 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:11:36 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:11:36 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:11:36 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:11:36 np0005626394.novalocal systemd-rc-local-generator[56363]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:11:36 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:11:41 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:11:41 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:11:41 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.582s CPU time. Feb 22 22:11:41 np0005626394.novalocal systemd[1]: run-r22f24e1b88054e60ac3bfb3be09c9048.service: Deactivated successfully. Feb 22 22:12:00 np0005626394.novalocal dbus-broker-launch[790]: avc: op=setenforce lsm=selinux enforcing=0 res=1 Feb 22 22:12:00 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:12:00 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:12:00 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:12:42 np0005626394.novalocal setsebool[62620]: The virt_use_nfs policy boolean was changed to 1 by root Feb 22 22:12:42 np0005626394.novalocal setsebool[62620]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Feb 22 22:12:52 np0005626394.novalocal kernel: SELinux: Converting 516 SID table entries... Feb 22 22:12:52 np0005626394.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 22:12:52 np0005626394.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 22:12:52 np0005626394.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 22:12:52 np0005626394.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 22:12:52 np0005626394.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 22:12:52 np0005626394.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 22:12:52 np0005626394.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 22:13:08 np0005626394.novalocal dbus-broker-launch[790]: avc: op=load_policy lsm=selinux seqno=5 res=1 Feb 22 22:13:08 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:13:08 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:13:08 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:13:48 np0005626394.novalocal kernel: SELinux: Converting 2742 SID table entries... Feb 22 22:13:48 np0005626394.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 22:13:48 np0005626394.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 22:13:48 np0005626394.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 22:13:48 np0005626394.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 22:13:48 np0005626394.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 22:13:48 np0005626394.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 22:13:48 np0005626394.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 22:14:24 np0005626394.novalocal dbus-broker-launch[790]: avc: op=load_policy lsm=selinux seqno=7 res=1 Feb 22 22:14:24 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:14:24 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:14:24 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:14:24 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:14:24 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:14:24 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:14:24 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:14:24 np0005626394.novalocal systemd[1]: run-ra6a63806d4944ed9a7f4d9ca78c3a88e.service: Deactivated successfully. Feb 22 22:14:35 np0005626394.novalocal kernel: SELinux: Converting 2742 SID table entries... Feb 22 22:14:35 np0005626394.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 22:14:35 np0005626394.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 22:14:35 np0005626394.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 22:14:35 np0005626394.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 22:14:35 np0005626394.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 22:14:35 np0005626394.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 22:14:35 np0005626394.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 22:14:35 np0005626394.novalocal groupadd[63697]: group added to /etc/group: name=memcached, GID=989 Feb 22 22:14:35 np0005626394.novalocal groupadd[63697]: group added to /etc/gshadow: name=memcached Feb 22 22:14:35 np0005626394.novalocal groupadd[63697]: new group: name=memcached, GID=989 Feb 22 22:14:35 np0005626394.novalocal useradd[63704]: new user: name=memcached, UID=989, GID=989, home=/, shell=/sbin/nologin, from=none Feb 22 22:14:36 np0005626394.novalocal dbus-broker-launch[790]: avc: op=load_policy lsm=selinux seqno=8 res=1 Feb 22 22:14:36 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:14:36 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:14:36 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:14:36 np0005626394.novalocal systemd-rc-local-generator[64134]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:14:36 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:14:36 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:14:36 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:14:36 np0005626394.novalocal systemd[1]: run-ra41b365ad2864378a3157764f07dd4c6.service: Deactivated successfully. Feb 22 22:14:37 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:14:37 np0005626394.novalocal systemd-rc-local-generator[64318]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:14:37 np0005626394.novalocal systemd[1]: Started memcached daemon. Feb 22 22:14:37 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:14:37 np0005626394.novalocal systemd-rc-local-generator[64373]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:14:37 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:14:37 np0005626394.novalocal systemd-rc-local-generator[64408]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:14:40 np0005626394.novalocal groupadd[64434]: group added to /etc/group: name=epmd, GID=988 Feb 22 22:14:40 np0005626394.novalocal groupadd[64434]: group added to /etc/gshadow: name=epmd Feb 22 22:14:40 np0005626394.novalocal groupadd[64434]: new group: name=epmd, GID=988 Feb 22 22:14:40 np0005626394.novalocal useradd[64441]: new user: name=epmd, UID=988, GID=988, home=/dev/null, shell=/sbin/nologin, from=none Feb 22 22:14:41 np0005626394.novalocal groupadd[64450]: group added to /etc/group: name=rabbitmq, GID=987 Feb 22 22:14:41 np0005626394.novalocal groupadd[64450]: group added to /etc/gshadow: name=rabbitmq Feb 22 22:14:41 np0005626394.novalocal groupadd[64450]: new group: name=rabbitmq, GID=987 Feb 22 22:14:41 np0005626394.novalocal useradd[64457]: new user: name=rabbitmq, UID=987, GID=987, home=/var/lib/rabbitmq, shell=/sbin/nologin, from=none Feb 22 22:14:42 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:14:42 np0005626394.novalocal systemd-rc-local-generator[64487]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:14:42 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:14:42 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:14:43 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:14:43 np0005626394.novalocal systemd-rc-local-generator[64530]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:14:43 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:14:43 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:14:43 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:14:43 np0005626394.novalocal systemd[1]: run-r815f9b9b0d4f41369797e07b2ce6746f.service: Deactivated successfully. Feb 22 22:14:46 np0005626394.novalocal runuser[65050]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:14:47 np0005626394.novalocal runuser[65050]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:15:01 np0005626394.novalocal kernel: SELinux: Converting 2748 SID table entries... Feb 22 22:15:01 np0005626394.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 22:15:01 np0005626394.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 22:15:01 np0005626394.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 22:15:01 np0005626394.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 22:15:01 np0005626394.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 22:15:01 np0005626394.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 22:15:01 np0005626394.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 22:15:01 np0005626394.novalocal dbus-broker-launch[790]: avc: op=load_policy lsm=selinux seqno=9 res=1 Feb 22 22:15:01 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:15:01 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:15:01 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:15:01 np0005626394.novalocal groupadd[65561]: group added to /etc/group: name=mysql, GID=27 Feb 22 22:15:01 np0005626394.novalocal groupadd[65561]: group added to /etc/gshadow: name=mysql Feb 22 22:15:01 np0005626394.novalocal groupadd[65561]: new group: name=mysql, GID=27 Feb 22 22:15:01 np0005626394.novalocal useradd[65568]: new user: name=mysql, UID=27, GID=27, home=/var/lib/mysql, shell=/sbin/nologin, from=none Feb 22 22:15:03 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:15:03 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:15:03 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:15:03 np0005626394.novalocal systemd-rc-local-generator[66043]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:15:03 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:15:06 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:15:06 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:15:06 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Consumed 3.835s CPU time. Feb 22 22:15:06 np0005626394.novalocal systemd[1]: run-r0850ee9dacbb4470b8f26500973edc59.service: Deactivated successfully. Feb 22 22:15:06 np0005626394.novalocal groupadd[69383]: group added to /etc/group: name=redis, GID=986 Feb 22 22:15:06 np0005626394.novalocal groupadd[69383]: group added to /etc/gshadow: name=redis Feb 22 22:15:06 np0005626394.novalocal groupadd[69383]: new group: name=redis, GID=986 Feb 22 22:15:06 np0005626394.novalocal useradd[69390]: new user: name=redis, UID=986, GID=986, home=/var/lib/redis, shell=/sbin/nologin, from=none Feb 22 22:15:07 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:15:07 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:15:07 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:15:07 np0005626394.novalocal systemd-rc-local-generator[69431]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:15:07 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:15:08 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:15:08 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:15:08 np0005626394.novalocal systemd[1]: run-rad531dda5c274198af10b078d0d8d7b1.service: Deactivated successfully. Feb 22 22:15:18 np0005626394.novalocal kernel: SELinux: Converting 2751 SID table entries... Feb 22 22:15:18 np0005626394.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 22:15:18 np0005626394.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 22:15:18 np0005626394.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 22:15:18 np0005626394.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 22:15:18 np0005626394.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 22:15:18 np0005626394.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 22:15:18 np0005626394.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 22:15:18 np0005626394.novalocal groupadd[69770]: group added to /etc/group: name=unbound, GID=985 Feb 22 22:15:18 np0005626394.novalocal groupadd[69770]: group added to /etc/gshadow: name=unbound Feb 22 22:15:18 np0005626394.novalocal groupadd[69770]: new group: name=unbound, GID=985 Feb 22 22:15:18 np0005626394.novalocal useradd[69777]: new user: name=unbound, UID=985, GID=985, home=/var/lib/unbound, shell=/sbin/nologin, from=none Feb 22 22:15:19 np0005626394.novalocal dbus-broker-launch[790]: avc: op=load_policy lsm=selinux seqno=10 res=1 Feb 22 22:15:19 np0005626394.novalocal systemd[1]: Started daily update of the root trust anchor for DNSSEC. Feb 22 22:15:19 np0005626394.novalocal groupadd[69790]: group added to /etc/group: name=openvswitch, GID=984 Feb 22 22:15:19 np0005626394.novalocal groupadd[69790]: group added to /etc/gshadow: name=openvswitch Feb 22 22:15:19 np0005626394.novalocal groupadd[69790]: new group: name=openvswitch, GID=984 Feb 22 22:15:19 np0005626394.novalocal useradd[69797]: new user: name=openvswitch, UID=984, GID=984, home=/, shell=/sbin/nologin, from=none Feb 22 22:15:19 np0005626394.novalocal groupadd[69805]: group added to /etc/group: name=hugetlbfs, GID=983 Feb 22 22:15:19 np0005626394.novalocal groupadd[69805]: group added to /etc/gshadow: name=hugetlbfs Feb 22 22:15:19 np0005626394.novalocal groupadd[69805]: new group: name=hugetlbfs, GID=983 Feb 22 22:15:19 np0005626394.novalocal usermod[69813]: add 'openvswitch' to group 'hugetlbfs' Feb 22 22:15:19 np0005626394.novalocal usermod[69813]: add 'openvswitch' to shadow group 'hugetlbfs' Feb 22 22:15:20 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:15:20 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:15:20 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:15:20 np0005626394.novalocal systemd-rc-local-generator[70289]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:15:20 np0005626394.novalocal systemd-sysv-generator[70293]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:15:20 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:15:21 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:15:21 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:15:21 np0005626394.novalocal systemd[1]: run-r5e1faebed68e455caf6935470c2983ce.service: Deactivated successfully. Feb 22 22:15:22 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:15:22 np0005626394.novalocal systemd-rc-local-generator[70811]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:15:22 np0005626394.novalocal systemd-sysv-generator[70816]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:15:22 np0005626394.novalocal systemd[1]: Starting Open vSwitch Database Unit... Feb 22 22:15:22 np0005626394.novalocal chown[70831]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Feb 22 22:15:22 np0005626394.novalocal ovs-ctl[70836]: /etc/openvswitch/conf.db does not exist ... (warning). Feb 22 22:15:22 np0005626394.novalocal ovs-ctl[70836]: Creating empty database /etc/openvswitch/conf.db [ OK ] Feb 22 22:15:22 np0005626394.novalocal ovs-ctl[70836]: Starting ovsdb-server [ OK ] Feb 22 22:15:22 np0005626394.novalocal ovs-vsctl[70885]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Feb 22 22:15:22 np0005626394.novalocal ovs-vsctl[70905]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.5-115.el9s "external-ids:system-id=\"3d28d0fc-9b2e-4d64-8b14-7cb26c0d9269\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"centos\"" "system-version=\"9\"" Feb 22 22:15:22 np0005626394.novalocal ovs-ctl[70836]: Configuring Open vSwitch system IDs [ OK ] Feb 22 22:15:22 np0005626394.novalocal ovs-vsctl[70910]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005626394 Feb 22 22:15:22 np0005626394.novalocal ovs-ctl[70836]: Enabling remote OVSDB managers [ OK ] Feb 22 22:15:22 np0005626394.novalocal systemd[1]: Started Open vSwitch Database Unit. Feb 22 22:15:22 np0005626394.novalocal systemd[1]: Starting Open vSwitch Delete Transient Ports... Feb 22 22:15:22 np0005626394.novalocal systemd[1]: Finished Open vSwitch Delete Transient Ports. Feb 22 22:15:22 np0005626394.novalocal systemd[1]: Starting Open vSwitch Forwarding Unit... Feb 22 22:15:22 np0005626394.novalocal kernel: openvswitch: Open vSwitch switching datapath Feb 22 22:15:22 np0005626394.novalocal ovs-ctl[70955]: Inserting openvswitch module [ OK ] Feb 22 22:15:22 np0005626394.novalocal ovs-ctl[70924]: Starting ovs-vswitchd [ OK ] Feb 22 22:15:22 np0005626394.novalocal ovs-vsctl[70972]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005626394 Feb 22 22:15:22 np0005626394.novalocal ovs-ctl[70924]: Enabling remote OVSDB managers [ OK ] Feb 22 22:15:22 np0005626394.novalocal systemd[1]: Started Open vSwitch Forwarding Unit. Feb 22 22:15:22 np0005626394.novalocal systemd[1]: Starting Open vSwitch... Feb 22 22:15:22 np0005626394.novalocal systemd[1]: Finished Open vSwitch. Feb 22 22:15:22 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:15:23 np0005626394.novalocal systemd-rc-local-generator[70994]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:15:23 np0005626394.novalocal systemd-sysv-generator[70997]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:15:23 np0005626394.novalocal systemd[1]: Starting dnf makecache... Feb 22 22:15:23 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:15:23 np0005626394.novalocal systemd-sysv-generator[71034]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:15:23 np0005626394.novalocal systemd-rc-local-generator[71030]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: Updating Subscription Management repositories. Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: Unable to read consumer identity Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: This system is not registered with an entitlement server. You can use subscription-manager to register. Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: Failed determining last makecache time. Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-ansible-role-thales-hsm-0661a3a0a0e79e 122 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-openstack-ironic-e9ee094fc3d37cf273bd6 223 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-openstack-cinder-22f771803688b98037fc0 214 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-python-openstackclient-f42ade4305d9745 206 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-openstack-cloudkitty-b7a4be00afa6a6dc2 224 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-openstack-selinux-f19cf2529160f9bf6e83 225 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-openstack-nova-aa03065f275ddb5acce344c 224 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-openstack-designate-9d3ff3b26c5e12eb2a 219 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-openstack-glance-3c898c428df88e0b84ffd 226 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-openstack-keystone-489e170f8161dac7c83 225 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-openstack-manila-54584123388f291f1dff3 243 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-openstack-neutron-2ce5e3b27734931cc60c 231 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-openstack-octavia-ac102c9a4dfd60deac93 319 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-openstack-watcher-56dae6071e1b105c7905 338 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-python-tcib-c2ae956ec1898faaed6197ef95 287 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-puppet-openstacklib-98e64c6dad3b665745 315 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-openstack-swift-9d495089a7aa6c5b222037 317 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-python-tempestconf-8e33668cda707818ee1 237 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: delorean-python-django-horizon-d5d50a72993b2fbe 232 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: CentOS Stream 9 - BaseOS 1.2 MB/s | 3.9 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: CentOS Stream 9 - AppStream 1.2 MB/s | 4.4 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: CentOS Stream 9 - CRB 1.2 MB/s | 4.3 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: CentOS Stream 9 - Extras packages 831 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: dlrn-dalmatian-testing 228 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: dlrn-dalmatian-build-deps 214 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: centos9-rabbitmq 852 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: centos9-storage 966 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: centos9-opstools 922 kB/s | 3.0 kB 00:00 Feb 22 22:15:23 np0005626394.novalocal dnf[71012]: NFV SIG OpenvSwitch 1.1 MB/s | 3.0 kB 00:00 Feb 22 22:15:24 np0005626394.novalocal dnf[71012]: Extra Packages for Enterprise Linux 9 - x86_64 62 kB/s | 19 kB 00:00 Feb 22 22:15:25 np0005626394.novalocal dnf[71012]: Extra Packages for Enterprise Linux 9 - x86_64 21 MB/s | 20 MB 00:00 Feb 22 22:15:33 np0005626394.novalocal dnf[71012]: Metadata cache created. Feb 22 22:15:33 np0005626394.novalocal systemd[1]: dnf-makecache.service: Deactivated successfully. Feb 22 22:15:33 np0005626394.novalocal systemd[1]: Finished dnf makecache. Feb 22 22:15:33 np0005626394.novalocal systemd[1]: dnf-makecache.service: Consumed 8.709s CPU time. Feb 22 22:15:34 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:15:34 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:15:34 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:15:34 np0005626394.novalocal systemd-rc-local-generator[71129]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:15:34 np0005626394.novalocal systemd-sysv-generator[71133]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:15:35 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:15:35 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:15:35 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:15:35 np0005626394.novalocal systemd[1]: run-r3159bb58239842e5834449f3919e41ae.service: Deactivated successfully. Feb 22 22:15:37 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:15:37 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:15:37 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:15:38 np0005626394.novalocal systemd-rc-local-generator[71579]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:15:38 np0005626394.novalocal systemd-sysv-generator[71582]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:15:38 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:15:38 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:15:38 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:15:38 np0005626394.novalocal systemd[1]: run-r4f20a888b6c04eb08e1b3b93b2eb06cd.service: Deactivated successfully. Feb 22 22:15:39 np0005626394.novalocal ovs-vsctl[71666]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:[::1]:6642 Feb 22 22:15:39 np0005626394.novalocal ovs-vsctl[71669]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Feb 22 22:15:39 np0005626394.novalocal ovs-vsctl[71671]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=::1 Feb 22 22:15:39 np0005626394.novalocal ovs-vsctl[71674]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005626394.novalocal Feb 22 22:15:39 np0005626394.novalocal ovs-vsctl[71676]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Feb 22 22:15:39 np0005626394.novalocal ovs-vsctl[71678]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Feb 22 22:15:39 np0005626394.novalocal ovs-vsctl[71680]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-openflow-probe-interval=60 Feb 22 22:15:39 np0005626394.novalocal ovs-vsctl[71682]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=false Feb 22 22:15:39 np0005626394.novalocal ovs-vsctl[71684]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Feb 22 22:15:39 np0005626394.novalocal ovs-vsctl[71686]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-cms-options=enable-chassis-as-gw Feb 22 22:15:39 np0005626394.novalocal ovs-vsctl[71690]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=external:br-ex Feb 22 22:15:39 np0005626394.novalocal ovs-vsctl[71694]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Feb 22 22:15:49 np0005626394.novalocal groupadd[71714]: group added to /etc/group: name=keystone, GID=163 Feb 22 22:15:49 np0005626394.novalocal groupadd[71714]: group added to /etc/gshadow: name=keystone Feb 22 22:15:49 np0005626394.novalocal groupadd[71714]: new group: name=keystone, GID=163 Feb 22 22:15:49 np0005626394.novalocal useradd[71721]: new user: name=keystone, UID=163, GID=163, home=/var/lib/keystone, shell=/sbin/nologin, from=none Feb 22 22:15:49 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:15:49 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:15:50 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:15:50 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:15:50 np0005626394.novalocal systemd[1]: run-r6bc2aae7dd0941b18a21e9c4a1385c76.service: Deactivated successfully. Feb 22 22:15:56 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:15:56 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:15:57 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:15:57 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:15:57 np0005626394.novalocal systemd[1]: run-r56c88932717e4aeaa55208c2c40ebe94.service: Deactivated successfully. Feb 22 22:16:03 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:16:03 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:16:03 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:16:03 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:16:03 np0005626394.novalocal systemd-rc-local-generator[72525]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:16:03 np0005626394.novalocal systemd-sysv-generator[72529]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:16:03 np0005626394.novalocal systemd[1]: Listening on Device-mapper event daemon FIFOs. Feb 22 22:16:04 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:16:04 np0005626394.novalocal systemd-rc-local-generator[72564]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:16:04 np0005626394.novalocal systemd-sysv-generator[72568]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:16:04 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:16:04 np0005626394.novalocal systemd-sysv-generator[72603]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:16:04 np0005626394.novalocal systemd-rc-local-generator[72599]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:16:04 np0005626394.novalocal systemd-logind[811]: Watching system buttons on /dev/input/event0 (Power Button) Feb 22 22:16:04 np0005626394.novalocal systemd-logind[811]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 22 22:16:06 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:16:06 np0005626394.novalocal systemd-rc-local-generator[72704]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:16:06 np0005626394.novalocal systemd-sysv-generator[72710]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:16:06 np0005626394.novalocal systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Feb 22 22:16:06 np0005626394.novalocal systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Feb 22 22:16:06 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:16:06 np0005626394.novalocal systemd-rc-local-generator[72745]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:16:06 np0005626394.novalocal systemd-sysv-generator[72748]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:16:06 np0005626394.novalocal systemd[1]: Listening on LVM2 poll daemon socket. Feb 22 22:16:08 np0005626394.novalocal groupadd[72769]: group added to /etc/group: name=cinder, GID=165 Feb 22 22:16:08 np0005626394.novalocal groupadd[72769]: group added to /etc/gshadow: name=cinder Feb 22 22:16:08 np0005626394.novalocal groupadd[72769]: new group: name=cinder, GID=165 Feb 22 22:16:08 np0005626394.novalocal useradd[72776]: new user: name=cinder, UID=165, GID=165, home=/var/lib/cinder, shell=/sbin/nologin, from=none Feb 22 22:16:08 np0005626394.novalocal useradd[72776]: add 'cinder' to group 'nobody' Feb 22 22:16:08 np0005626394.novalocal useradd[72776]: add 'cinder' to group 'cinder' Feb 22 22:16:08 np0005626394.novalocal useradd[72776]: add 'cinder' to shadow group 'nobody' Feb 22 22:16:08 np0005626394.novalocal useradd[72776]: add 'cinder' to shadow group 'cinder' Feb 22 22:16:09 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:16:09 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:16:09 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:16:09 np0005626394.novalocal systemd-rc-local-generator[72821]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:16:09 np0005626394.novalocal systemd-sysv-generator[72824]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:16:09 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:16:11 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:16:11 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:16:11 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Consumed 2.582s CPU time. Feb 22 22:16:11 np0005626394.novalocal systemd[1]: run-r2e8ea0f9c87b4d74bfc8aa51e114d462.service: Deactivated successfully. Feb 22 22:16:11 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:16:11 np0005626394.novalocal systemd-rc-local-generator[75049]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:16:11 np0005626394.novalocal systemd-sysv-generator[75055]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:16:11 np0005626394.novalocal systemd[1]: One time configuration for iscsi.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/iscsi/initiatorname.iscsi). Feb 22 22:16:11 np0005626394.novalocal systemd[1]: Starting Open-iSCSI... Feb 22 22:16:11 np0005626394.novalocal kernel: Loading iSCSI transport class v2.0-870. Feb 22 22:16:11 np0005626394.novalocal systemd[1]: Started Open-iSCSI. Feb 22 22:16:11 np0005626394.novalocal systemd[1]: Starting Logout off all iSCSI sessions on shutdown... Feb 22 22:16:11 np0005626394.novalocal systemd[1]: Finished Logout off all iSCSI sessions on shutdown. Feb 22 22:16:12 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:16:12 np0005626394.novalocal systemd-rc-local-generator[75099]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:16:12 np0005626394.novalocal systemd-sysv-generator[75104]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:16:12 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:16:12 np0005626394.novalocal systemd-sysv-generator[75138]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:16:12 np0005626394.novalocal systemd-rc-local-generator[75133]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:16:14 np0005626394.novalocal groupadd[75159]: group added to /etc/group: name=glance, GID=161 Feb 22 22:16:14 np0005626394.novalocal groupadd[75159]: group added to /etc/gshadow: name=glance Feb 22 22:16:14 np0005626394.novalocal groupadd[75159]: new group: name=glance, GID=161 Feb 22 22:16:14 np0005626394.novalocal useradd[75166]: new user: name=glance, UID=161, GID=161, home=/var/lib/glance, shell=/sbin/nologin, from=none Feb 22 22:16:14 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:16:14 np0005626394.novalocal systemd-rc-local-generator[75198]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:16:14 np0005626394.novalocal systemd-sysv-generator[75201]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:16:15 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:16:17 np0005626394.novalocal kernel: SELinux: Converting 2773 SID table entries... Feb 22 22:16:17 np0005626394.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 22:16:17 np0005626394.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 22:16:17 np0005626394.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 22:16:17 np0005626394.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 22:16:17 np0005626394.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 22:16:17 np0005626394.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 22:16:17 np0005626394.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 22:16:17 np0005626394.novalocal setsebool[75221]: The os_neutron_dac_override policy boolean was changed to on by root Feb 22 22:16:17 np0005626394.novalocal ovs-vsctl[75228]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl add-br br-ex Feb 22 22:16:17 np0005626394.novalocal kernel: ovs-system: entered promiscuous mode Feb 22 22:16:17 np0005626394.novalocal NetworkManager[868]: [1771816577.6590] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Feb 22 22:16:17 np0005626394.novalocal NetworkManager[868]: [1771816577.6602] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/3) Feb 22 22:16:17 np0005626394.novalocal kernel: Timeout policy base is empty Feb 22 22:16:17 np0005626394.novalocal dbus-broker-launch[790]: avc: op=load_policy lsm=selinux seqno=12 res=1 Feb 22 22:16:17 np0005626394.novalocal kernel: br-ex: entered promiscuous mode Feb 22 22:16:17 np0005626394.novalocal NetworkManager[868]: [1771816577.6981] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Feb 22 22:16:17 np0005626394.novalocal NetworkManager[868]: [1771816577.6993] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Feb 22 22:16:17 np0005626394.novalocal systemd-udevd[75246]: Network interface NamePolicy= disabled on kernel command line. Feb 22 22:16:17 np0005626394.novalocal systemd-udevd[75244]: Network interface NamePolicy= disabled on kernel command line. Feb 22 22:16:17 np0005626394.novalocal NetworkManager[868]: [1771816577.7173] device (br-ex): carrier: link connected Feb 22 22:16:17 np0005626394.novalocal NetworkManager[868]: [1771816577.7453] manager: (loop1): new Dummy device (/org/freedesktop/NetworkManager/Devices/5) Feb 22 22:16:17 np0005626394.novalocal systemd-udevd[75245]: Network interface NamePolicy= disabled on kernel command line. Feb 22 22:16:17 np0005626394.novalocal NetworkManager[868]: [1771816577.8994] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75265 uid=0 result="success" Feb 22 22:16:17 np0005626394.novalocal ifdown[75266]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Feb 22 22:16:17 np0005626394.novalocal ifdown[75267]: 'network-scripts' will be removed from distribution in near future. Feb 22 22:16:17 np0005626394.novalocal ifdown[75268]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 22 22:16:17 np0005626394.novalocal NetworkManager[868]: [1771816577.9372] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75274 uid=0 result="success" Feb 22 22:16:17 np0005626394.novalocal NetworkManager[868]: [1771816577.9700] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75282 uid=0 result="success" Feb 22 22:16:17 np0005626394.novalocal NetworkManager[868]: [1771816577.9923] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75291 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.0590] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75314 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal ovs-vsctl[75319]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-br br-ex Feb 22 22:16:18 np0005626394.novalocal kernel: br-ex: left promiscuous mode Feb 22 22:16:18 np0005626394.novalocal kernel: ovs-system: left promiscuous mode Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.1443] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75337 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal ifdown[75341]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Feb 22 22:16:18 np0005626394.novalocal ifdown[75342]: 'network-scripts' will be removed from distribution in near future. Feb 22 22:16:18 np0005626394.novalocal ifdown[75343]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.1763] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75349 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.2124] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75360 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.2445] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75372 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.3145] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75398 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal ovs-vsctl[75406]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.3725] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75413 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal ifup[75417]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 22 22:16:18 np0005626394.novalocal ifup[75418]: 'network-scripts' will be removed from distribution in near future. Feb 22 22:16:18 np0005626394.novalocal ifup[75419]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.3997] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75425 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.4460] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75437 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal ifup[75438]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 22 22:16:18 np0005626394.novalocal ifup[75439]: 'network-scripts' will be removed from distribution in near future. Feb 22 22:16:18 np0005626394.novalocal ifup[75440]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.4753] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75446 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal ovs-vsctl[75448]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.4958] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Feb 22 22:16:18 np0005626394.novalocal kernel: ovs-system: entered promiscuous mode Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.4967] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Feb 22 22:16:18 np0005626394.novalocal kernel: No such timeout policy "ovs_test_tp" Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.5032] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Feb 22 22:16:18 np0005626394.novalocal kernel: br-ex: entered promiscuous mode Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.5044] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.5269] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75469 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.5552] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75480 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.5958] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75498 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal ovs-vsctl[75518]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 -- add-port br-ex loop1 Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.6836] device (loop1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 22 22:16:18 np0005626394.novalocal kernel: loop1: entered promiscuous mode Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.6847] device (loop1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.7046] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75525 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal ifup[75526]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 22 22:16:18 np0005626394.novalocal ifup[75527]: 'network-scripts' will be removed from distribution in near future. Feb 22 22:16:18 np0005626394.novalocal ifup[75528]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.7299] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75534 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal ovs-vsctl[75538]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.7830] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75545 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal ifup[75546]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 22 22:16:18 np0005626394.novalocal ifup[75547]: 'network-scripts' will be removed from distribution in near future. Feb 22 22:16:18 np0005626394.novalocal ifup[75548]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.8118] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75554 uid=0 result="success" Feb 22 22:16:18 np0005626394.novalocal ovs-vsctl[75558]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Feb 22 22:16:18 np0005626394.novalocal NetworkManager[868]: [1771816578.8648] device (br-ex): carrier: link connected Feb 22 22:16:23 np0005626394.novalocal groupadd[75586]: group added to /etc/group: name=radvd, GID=75 Feb 22 22:16:23 np0005626394.novalocal groupadd[75586]: group added to /etc/gshadow: name=radvd Feb 22 22:16:23 np0005626394.novalocal groupadd[75586]: new group: name=radvd, GID=75 Feb 22 22:16:23 np0005626394.novalocal useradd[75595]: new user: name=radvd, UID=75, GID=75, home=/, shell=/sbin/nologin, from=none Feb 22 22:16:23 np0005626394.novalocal groupadd[75610]: group added to /etc/group: name=haproxy, GID=982 Feb 22 22:16:23 np0005626394.novalocal groupadd[75610]: group added to /etc/gshadow: name=haproxy Feb 22 22:16:23 np0005626394.novalocal groupadd[75610]: new group: name=haproxy, GID=982 Feb 22 22:16:23 np0005626394.novalocal useradd[75617]: new user: name=haproxy, UID=983, GID=982, home=/var/lib/haproxy, shell=/usr/sbin/nologin, from=none Feb 22 22:16:23 np0005626394.novalocal groupadd[75629]: group added to /etc/group: name=dnsmasq, GID=981 Feb 22 22:16:24 np0005626394.novalocal groupadd[75629]: group added to /etc/gshadow: name=dnsmasq Feb 22 22:16:24 np0005626394.novalocal groupadd[75629]: new group: name=dnsmasq, GID=981 Feb 22 22:16:24 np0005626394.novalocal useradd[75636]: new user: name=dnsmasq, UID=982, GID=981, home=/var/lib/dnsmasq, shell=/usr/sbin/nologin, from=none Feb 22 22:16:24 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:16:24 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:16:26 np0005626394.novalocal groupadd[75648]: group added to /etc/group: name=neutron, GID=980 Feb 22 22:16:26 np0005626394.novalocal groupadd[75648]: group added to /etc/gshadow: name=neutron Feb 22 22:16:26 np0005626394.novalocal groupadd[75648]: new group: name=neutron, GID=980 Feb 22 22:16:26 np0005626394.novalocal useradd[75655]: new user: name=neutron, UID=981, GID=980, home=/var/lib/neutron, shell=/sbin/nologin, from=none Feb 22 22:16:27 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:16:27 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:16:27 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:16:27 np0005626394.novalocal systemd-rc-local-generator[75705]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:16:27 np0005626394.novalocal systemd-sysv-generator[75708]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:16:27 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:16:27 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:16:27 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:16:27 np0005626394.novalocal systemd[1]: run-r194dfab1869c44bbaf2fe97295430bcf.service: Deactivated successfully. Feb 22 22:16:31 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:16:31 np0005626394.novalocal systemd-rc-local-generator[76057]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:16:31 np0005626394.novalocal systemd-sysv-generator[76062]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:16:31 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:16:32 np0005626394.novalocal ovs-vsctl[76081]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set-manager ptcp:6640:127.0.0.1 Feb 22 22:16:34 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:16:34 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:16:34 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:16:34 np0005626394.novalocal systemd-rc-local-generator[76121]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:16:34 np0005626394.novalocal systemd-sysv-generator[76125]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:16:34 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:16:35 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:16:35 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:16:35 np0005626394.novalocal systemd[1]: run-r663e5385e25f48e3bc7a622ecb65ae45.service: Deactivated successfully. Feb 22 22:16:37 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:16:37 np0005626394.novalocal systemd-sysv-generator[76572]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:16:37 np0005626394.novalocal systemd-rc-local-generator[76569]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:16:37 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:16:44 np0005626394.novalocal groupadd[76606]: group added to /etc/group: name=placement, GID=979 Feb 22 22:16:44 np0005626394.novalocal groupadd[76606]: group added to /etc/gshadow: name=placement Feb 22 22:16:44 np0005626394.novalocal groupadd[76606]: new group: name=placement, GID=979 Feb 22 22:16:44 np0005626394.novalocal useradd[76613]: new user: name=placement, UID=980, GID=979, home=/, shell=/bin/bash, from=none Feb 22 22:16:49 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:16:49 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:16:50 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:16:50 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:16:50 np0005626394.novalocal systemd[1]: run-r6fb8203177574baba3e1fb87932cb4ba.service: Deactivated successfully. Feb 22 22:16:52 np0005626394.novalocal groupadd[76793]: group added to /etc/group: name=nova, GID=162 Feb 22 22:16:52 np0005626394.novalocal groupadd[76793]: group added to /etc/gshadow: name=nova Feb 22 22:16:52 np0005626394.novalocal groupadd[76793]: new group: name=nova, GID=162 Feb 22 22:16:52 np0005626394.novalocal useradd[76800]: new user: name=nova, UID=162, GID=162, home=/var/lib/nova, shell=/sbin/nologin, from=none Feb 22 22:16:52 np0005626394.novalocal useradd[76800]: add 'nova' to group 'nobody' Feb 22 22:16:52 np0005626394.novalocal useradd[76800]: add 'nova' to group 'nova' Feb 22 22:16:52 np0005626394.novalocal useradd[76800]: add 'nova' to shadow group 'nobody' Feb 22 22:16:52 np0005626394.novalocal useradd[76800]: add 'nova' to shadow group 'nova' Feb 22 22:17:09 np0005626394.novalocal kernel: SELinux: Converting 2780 SID table entries... Feb 22 22:17:09 np0005626394.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 22:17:09 np0005626394.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 22:17:09 np0005626394.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 22:17:09 np0005626394.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 22:17:09 np0005626394.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 22:17:09 np0005626394.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 22:17:09 np0005626394.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 22:17:17 np0005626394.novalocal kernel: SELinux: Converting 2780 SID table entries... Feb 22 22:17:17 np0005626394.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 22:17:17 np0005626394.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 22:17:17 np0005626394.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 22:17:17 np0005626394.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 22:17:17 np0005626394.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 22:17:17 np0005626394.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 22:17:17 np0005626394.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 22:17:26 np0005626394.novalocal kernel: SELinux: Converting 2780 SID table entries... Feb 22 22:17:26 np0005626394.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 22:17:26 np0005626394.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 22:17:26 np0005626394.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 22:17:26 np0005626394.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 22:17:26 np0005626394.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 22:17:26 np0005626394.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 22:17:26 np0005626394.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 22:17:33 np0005626394.novalocal sshd-session[76939]: Connection closed by 117.156.112.96 port 35438 Feb 22 22:17:35 np0005626394.novalocal dbus-broker-launch[790]: avc: op=load_policy lsm=selinux seqno=15 res=1 Feb 22 22:17:35 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:17:35 np0005626394.novalocal systemd[1]: Starting Cleanup of Temporary Directories... Feb 22 22:17:35 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:17:35 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:17:35 np0005626394.novalocal kernel: SELinux: Converting 2784 SID table entries... Feb 22 22:17:35 np0005626394.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 22:17:35 np0005626394.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 22:17:35 np0005626394.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 22:17:35 np0005626394.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 22:17:35 np0005626394.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 22:17:35 np0005626394.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 22:17:35 np0005626394.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 22:17:35 np0005626394.novalocal systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 22 22:17:35 np0005626394.novalocal systemd[1]: Finished Cleanup of Temporary Directories. Feb 22 22:17:35 np0005626394.novalocal systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 22 22:17:36 np0005626394.novalocal groupadd[76952]: group added to /etc/group: name=qemu, GID=107 Feb 22 22:17:36 np0005626394.novalocal groupadd[76952]: group added to /etc/gshadow: name=qemu Feb 22 22:17:36 np0005626394.novalocal groupadd[76952]: new group: name=qemu, GID=107 Feb 22 22:17:36 np0005626394.novalocal useradd[76959]: new user: name=qemu, UID=107, GID=107, home=/, shell=/sbin/nologin, from=none Feb 22 22:17:36 np0005626394.novalocal useradd[76959]: add 'qemu' to group 'kvm' Feb 22 22:17:36 np0005626394.novalocal useradd[76959]: add 'qemu' to shadow group 'kvm' Feb 22 22:17:36 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:17:36 np0005626394.novalocal dbus-broker-launch[790]: avc: op=load_policy lsm=selinux seqno=16 res=1 Feb 22 22:17:36 np0005626394.novalocal dbus-broker-launch[758]: Noticed file-system modification, trigger reload. Feb 22 22:17:37 np0005626394.novalocal groupadd[76997]: group added to /etc/group: name=libvirt, GID=978 Feb 22 22:17:37 np0005626394.novalocal groupadd[76997]: group added to /etc/gshadow: name=libvirt Feb 22 22:17:37 np0005626394.novalocal groupadd[76997]: new group: name=libvirt, GID=978 Feb 22 22:17:37 np0005626394.novalocal polkitd[10366]: Reloading rules Feb 22 22:17:37 np0005626394.novalocal polkitd[10366]: Collecting garbage unconditionally... Feb 22 22:17:37 np0005626394.novalocal polkitd[10366]: Loading rules from directory /etc/polkit-1/rules.d Feb 22 22:17:37 np0005626394.novalocal polkitd[10366]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 22 22:17:37 np0005626394.novalocal polkitd[10366]: Finished loading, compiling and executing 5 rules Feb 22 22:17:37 np0005626394.novalocal polkitd[10366]: Reloading rules Feb 22 22:17:37 np0005626394.novalocal polkitd[10366]: Collecting garbage unconditionally... Feb 22 22:17:37 np0005626394.novalocal polkitd[10366]: Loading rules from directory /etc/polkit-1/rules.d Feb 22 22:17:37 np0005626394.novalocal polkitd[10366]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 22 22:17:37 np0005626394.novalocal polkitd[10366]: Finished loading, compiling and executing 5 rules Feb 22 22:17:40 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:17:40 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:17:40 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:17:40 np0005626394.novalocal systemd-sysv-generator[77713]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:17:40 np0005626394.novalocal systemd-rc-local-generator[77708]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:17:40 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:17:43 np0005626394.novalocal groupadd[80989]: group added to /etc/group: name=octavia, GID=977 Feb 22 22:17:43 np0005626394.novalocal groupadd[80989]: group added to /etc/gshadow: name=octavia Feb 22 22:17:43 np0005626394.novalocal groupadd[80989]: new group: name=octavia, GID=977 Feb 22 22:17:43 np0005626394.novalocal useradd[81024]: new user: name=octavia, UID=979, GID=977, home=/var/lib/octavia, shell=/sbin/nologin, from=none Feb 22 22:17:44 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:17:44 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:17:44 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.371s CPU time. Feb 22 22:17:44 np0005626394.novalocal systemd[1]: run-r6377b28a29964765af75c099c8c0d431.service: Deactivated successfully. Feb 22 22:17:48 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:17:48 np0005626394.novalocal systemd-sysv-generator[81209]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:17:48 np0005626394.novalocal systemd-rc-local-generator[81205]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:17:48 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:17:53 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:17:53 np0005626394.novalocal systemd-sysv-generator[81268]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:17:53 np0005626394.novalocal systemd-rc-local-generator[81262]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:17:53 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:17:55 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:17:55 np0005626394.novalocal systemd-rc-local-generator[81307]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:17:55 np0005626394.novalocal systemd-sysv-generator[81311]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:17:55 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:17:57 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:17:57 np0005626394.novalocal systemd-sysv-generator[81358]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:17:57 np0005626394.novalocal systemd-rc-local-generator[81355]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:17:57 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:17:59 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:00 np0005626394.novalocal systemd-rc-local-generator[81403]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:00 np0005626394.novalocal systemd-sysv-generator[81408]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:00 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:18:00 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:18:00 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:18:00 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:18:09 np0005626394.novalocal groupadd[81444]: group added to /etc/group: name=apache, GID=48 Feb 22 22:18:09 np0005626394.novalocal groupadd[81444]: group added to /etc/gshadow: name=apache Feb 22 22:18:09 np0005626394.novalocal groupadd[81444]: new group: name=apache, GID=48 Feb 22 22:18:09 np0005626394.novalocal useradd[81453]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Feb 22 22:18:13 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:13 np0005626394.novalocal systemd-sysv-generator[81490]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:13 np0005626394.novalocal systemd-rc-local-generator[81485]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:14 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:18:14 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:18:14 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:14 np0005626394.novalocal systemd-rc-local-generator[81586]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:14 np0005626394.novalocal systemd-sysv-generator[81590]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:14 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:18:15 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:18:15 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:18:15 np0005626394.novalocal systemd[1]: run-re6e93ad672c847e6a623cb5b83c8e5a6.service: Deactivated successfully. Feb 22 22:18:21 np0005626394.novalocal groupadd[82060]: group added to /etc/group: name=manila, GID=976 Feb 22 22:18:21 np0005626394.novalocal groupadd[82060]: group added to /etc/gshadow: name=manila Feb 22 22:18:21 np0005626394.novalocal groupadd[82060]: new group: name=manila, GID=976 Feb 22 22:18:21 np0005626394.novalocal useradd[82067]: new user: name=manila, UID=978, GID=976, home=/var/lib/manila, shell=/sbin/nologin, from=none Feb 22 22:18:21 np0005626394.novalocal useradd[82067]: add 'manila' to group 'nobody' Feb 22 22:18:21 np0005626394.novalocal useradd[82067]: add 'manila' to group 'manila' Feb 22 22:18:21 np0005626394.novalocal useradd[82067]: add 'manila' to shadow group 'nobody' Feb 22 22:18:21 np0005626394.novalocal useradd[82067]: add 'manila' to shadow group 'manila' Feb 22 22:18:22 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:18:22 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:18:22 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:22 np0005626394.novalocal systemd-rc-local-generator[82116]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:22 np0005626394.novalocal systemd-sysv-generator[82121]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:22 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:18:22 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:18:22 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:18:22 np0005626394.novalocal systemd[1]: run-r28b05b1d22594bca81d2e1602e72d9a2.service: Deactivated successfully. Feb 22 22:18:25 np0005626394.novalocal groupadd[82302]: group added to /etc/group: name=printadmin, GID=975 Feb 22 22:18:25 np0005626394.novalocal groupadd[82302]: group added to /etc/gshadow: name=printadmin Feb 22 22:18:25 np0005626394.novalocal groupadd[82302]: new group: name=printadmin, GID=975 Feb 22 22:18:26 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:18:26 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:18:26 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:27 np0005626394.novalocal systemd-rc-local-generator[82352]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:27 np0005626394.novalocal systemd-sysv-generator[82356]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:27 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:18:27 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:18:27 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:18:28 np0005626394.novalocal systemd[1]: run-rc193a26f4d3d4c25a039c5b812c05d09.service: Deactivated successfully. Feb 22 22:18:28 np0005626394.novalocal kernel: loop: module loaded Feb 22 22:18:28 np0005626394.novalocal kernel: loop3: detected capacity change from 0 to 31457280 Feb 22 22:18:29 np0005626394.novalocal lvm[82950]: PV /dev/loop3 not used. Feb 22 22:18:29 np0005626394.novalocal lvm[82953]: PV /dev/loop3 online, VG lvm-shares is complete. Feb 22 22:18:29 np0005626394.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event lvm-shares. Feb 22 22:18:29 np0005626394.novalocal lvm[82955]: 0 logical volume(s) in volume group "lvm-shares" now active Feb 22 22:18:29 np0005626394.novalocal systemd[1]: lvm-activate-lvm-shares.service: Deactivated successfully. Feb 22 22:18:31 np0005626394.novalocal sshd-session[82959]: Invalid user ubuntu from 80.94.95.116 port 29392 Feb 22 22:18:31 np0005626394.novalocal sshd-session[82959]: Connection closed by invalid user ubuntu 80.94.95.116 port 29392 [preauth] Feb 22 22:18:43 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:18:43 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:18:43 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:18:43 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:18:43 np0005626394.novalocal systemd[1]: run-rcbe7a1f52c7f436abc53826ce8789751.service: Deactivated successfully. Feb 22 22:18:52 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:52 np0005626394.novalocal systemd-rc-local-generator[83261]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:52 np0005626394.novalocal systemd-sysv-generator[83264]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:52 np0005626394.novalocal systemd[1]: Starting MariaDB 10.5 database server... Feb 22 22:18:52 np0005626394.novalocal mariadb-prepare-db-dir[83302]: Database MariaDB is probably initialized in /var/lib/mysql already, nothing is done. Feb 22 22:18:52 np0005626394.novalocal mariadb-prepare-db-dir[83302]: If this is not the case, make sure the /var/lib/mysql is empty before running mariadb-prepare-db-dir. Feb 22 22:18:52 np0005626394.novalocal systemd[1]: Started MariaDB 10.5 database server. Feb 22 22:18:52 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:52 np0005626394.novalocal systemd-sysv-generator[83416]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:52 np0005626394.novalocal systemd-rc-local-generator[83413]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:53 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:53 np0005626394.novalocal systemd-rc-local-generator[83449]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:53 np0005626394.novalocal systemd-sysv-generator[83452]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:53 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:53 np0005626394.novalocal systemd-sysv-generator[83494]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:53 np0005626394.novalocal systemd-rc-local-generator[83491]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:53 np0005626394.novalocal systemd[1]: Starting Redis persistent key-value database... Feb 22 22:18:53 np0005626394.novalocal systemd[1]: Started Redis persistent key-value database. Feb 22 22:18:53 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:54 np0005626394.novalocal systemd-rc-local-generator[83535]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:54 np0005626394.novalocal systemd-sysv-generator[83540]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:54 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:54 np0005626394.novalocal systemd-rc-local-generator[83569]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:54 np0005626394.novalocal systemd-sysv-generator[83573]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:54 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:54 np0005626394.novalocal systemd-rc-local-generator[83610]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:54 np0005626394.novalocal systemd-sysv-generator[83615]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:54 np0005626394.novalocal systemd[1]: Starting Redis Sentinel... Feb 22 22:18:54 np0005626394.novalocal systemd[1]: Started Redis Sentinel. Feb 22 22:18:54 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:55 np0005626394.novalocal systemd-rc-local-generator[83656]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:55 np0005626394.novalocal systemd-sysv-generator[83660]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:55 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:55 np0005626394.novalocal systemd-rc-local-generator[83693]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:55 np0005626394.novalocal systemd-sysv-generator[83696]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:55 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:56 np0005626394.novalocal systemd-rc-local-generator[83776]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:56 np0005626394.novalocal systemd-sysv-generator[83782]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:56 np0005626394.novalocal systemd[1]: Starting OVN northd management daemon... Feb 22 22:18:56 np0005626394.novalocal chown[83795]: /usr/bin/chown: cannot access '/var/lib/ovn': No such file or directory Feb 22 22:18:56 np0005626394.novalocal ovn-ctl[83796]: /var/lib/ovn/ovnnb_db.db does not exist ... (warning). Feb 22 22:18:56 np0005626394.novalocal ovn-ctl[83796]: Creating empty database /var/lib/ovn/ovnnb_db.db [ OK ] Feb 22 22:18:56 np0005626394.novalocal ovsdb-server[83898]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Feb 22 22:18:56 np0005626394.novalocal ovsdb-server[83900]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Feb 22 22:18:56 np0005626394.novalocal ovsdb-server[83899]: ovs|00002|vlog(monitor)|INFO|closing log file Feb 22 22:18:56 np0005626394.novalocal ovsdb-server[83899]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Feb 22 22:18:56 np0005626394.novalocal ovn-ctl[83796]: Starting ovsdb-nb [ OK ] Feb 22 22:18:56 np0005626394.novalocal ovn-nbctl[83904]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl --no-leader-only --db=unix:/run/ovn/ovnnb_db.sock init Feb 22 22:18:56 np0005626394.novalocal ovn-ctl[83796]: /var/lib/ovn/ovnsb_db.db does not exist ... (warning). Feb 22 22:18:56 np0005626394.novalocal ovn-ctl[83796]: Creating empty database /var/lib/ovn/ovnsb_db.db [ OK ] Feb 22 22:18:56 np0005626394.novalocal ovsdb-server[83924]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Feb 22 22:18:56 np0005626394.novalocal ovsdb-server[83926]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Feb 22 22:18:56 np0005626394.novalocal ovsdb-server[83925]: ovs|00002|vlog(monitor)|INFO|closing log file Feb 22 22:18:56 np0005626394.novalocal ovsdb-server[83925]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Feb 22 22:18:56 np0005626394.novalocal ovn-ctl[83796]: Starting ovsdb-sb [ OK ] Feb 22 22:18:56 np0005626394.novalocal ovn-sbctl[83930]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl --no-leader-only --db=unix:/run/ovn/ovnsb_db.sock init Feb 22 22:18:56 np0005626394.novalocal ovn-ctl[83796]: Starting ovn-northd [ OK ] Feb 22 22:18:56 np0005626394.novalocal systemd[1]: Finished OVN northd management daemon. Feb 22 22:18:56 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:56 np0005626394.novalocal systemd-rc-local-generator[83963]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:56 np0005626394.novalocal systemd-sysv-generator[83967]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:57 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:57 np0005626394.novalocal systemd-rc-local-generator[84000]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:57 np0005626394.novalocal systemd-sysv-generator[84006]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:57 np0005626394.novalocal ovn-nbctl[84022]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set-connection pssl:6641:[::1] Feb 22 22:18:57 np0005626394.novalocal ovn-sbctl[84026]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set-connection pssl:6642:[::1] Feb 22 22:18:57 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:18:57 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:18:57 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:18:57 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:57 np0005626394.novalocal systemd-rc-local-generator[84070]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:57 np0005626394.novalocal systemd-sysv-generator[84074]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:58 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:18:58 np0005626394.novalocal systemd[1]: Starting OVN controller daemon... Feb 22 22:18:58 np0005626394.novalocal ovn-ctl[84091]: Starting ovn-controller [ OK ] Feb 22 22:18:58 np0005626394.novalocal systemd[1]: Started OVN controller daemon. Feb 22 22:18:58 np0005626394.novalocal kernel: br-int: entered promiscuous mode Feb 22 22:18:58 np0005626394.novalocal NetworkManager[868]: [1771816738.1453] manager: (br-int): 'openvswitch' plugin not available; creating generic device Feb 22 22:18:58 np0005626394.novalocal NetworkManager[868]: [1771816738.1470] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Feb 22 22:18:58 np0005626394.novalocal systemd-udevd[84148]: Network interface NamePolicy= disabled on kernel command line. Feb 22 22:18:58 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:58 np0005626394.novalocal systemd-rc-local-generator[84167]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:58 np0005626394.novalocal systemd-sysv-generator[84171]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:58 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:18:58 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:18:58 np0005626394.novalocal systemd-sysv-generator[84209]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:18:58 np0005626394.novalocal systemd-rc-local-generator[84204]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:18:58 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:19:00 np0005626394.novalocal kernel: loop2: detected capacity change from 0 to 31457280 Feb 22 22:19:00 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:19:00 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:19:00 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:19:01 np0005626394.novalocal lvm[84235]: PV /dev/loop2 not used. Feb 22 22:19:01 np0005626394.novalocal lvm[84239]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 22:19:01 np0005626394.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Feb 22 22:19:01 np0005626394.novalocal lvm[84241]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 22:19:01 np0005626394.novalocal lvm[84241]: VG cinder-volumes finished Feb 22 22:19:01 np0005626394.novalocal lvm[84242]: 0 logical volume(s) in volume group "cinder-volumes" now active Feb 22 22:19:01 np0005626394.novalocal systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Feb 22 22:19:06 np0005626394.novalocal ovsdb-server[83900]: ovs|00003|memory|INFO|10388 kB peak resident set size after 10.1 seconds Feb 22 22:19:06 np0005626394.novalocal ovsdb-server[83900]: ovs|00004|memory|INFO|atoms:43 cells:43 json-caches:1 monitors:2 n-weak-refs:0 sessions:1 Feb 22 22:19:06 np0005626394.novalocal ovsdb-server[83926]: ovs|00003|memory|INFO|11252 kB peak resident set size after 10.0 seconds Feb 22 22:19:06 np0005626394.novalocal ovsdb-server[83926]: ovs|00004|memory|INFO|atoms:447 cells:355 json-caches:1 monitors:3 n-weak-refs:11 sessions:2 Feb 22 22:19:10 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:19:10 np0005626394.novalocal systemd-sysv-generator[84282]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:19:10 np0005626394.novalocal systemd-rc-local-generator[84279]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:19:10 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:19:10 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:19:12 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:19:13 np0005626394.novalocal systemd-rc-local-generator[84323]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:19:13 np0005626394.novalocal systemd-sysv-generator[84327]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:19:13 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:19:13 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:19:16 np0005626394.novalocal groupadd[84403]: group added to /etc/group: name=clevis, GID=974 Feb 22 22:19:16 np0005626394.novalocal groupadd[84403]: group added to /etc/gshadow: name=clevis Feb 22 22:19:16 np0005626394.novalocal groupadd[84403]: new group: name=clevis, GID=974 Feb 22 22:19:16 np0005626394.novalocal useradd[84410]: new user: name=clevis, UID=977, GID=974, home=/var/cache/clevis, shell=/usr/sbin/nologin, from=none Feb 22 22:19:17 np0005626394.novalocal usermod[84420]: add 'clevis' to group 'tss' Feb 22 22:19:17 np0005626394.novalocal usermod[84420]: add 'clevis' to shadow group 'tss' Feb 22 22:19:17 np0005626394.novalocal usermod[84436]: add 'nova' to group 'qemu' Feb 22 22:19:17 np0005626394.novalocal usermod[84436]: add 'nova' to shadow group 'qemu' Feb 22 22:19:17 np0005626394.novalocal usermod[84443]: add 'nova' to group 'libvirt' Feb 22 22:19:17 np0005626394.novalocal usermod[84443]: add 'nova' to shadow group 'libvirt' Feb 22 22:19:18 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:19:18 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:19:18 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:19:18 np0005626394.novalocal systemd-rc-local-generator[84520]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:19:18 np0005626394.novalocal systemd-sysv-generator[84523]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:19:18 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:19:18 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:19:21 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:19:21 np0005626394.novalocal systemd-rc-local-generator[87205]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:19:21 np0005626394.novalocal systemd-sysv-generator[87209]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:19:21 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:19:21 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:19:22 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:19:22 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:19:22 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.628s CPU time. Feb 22 22:19:22 np0005626394.novalocal systemd[1]: run-r0a82b2a77554476ca90d4b4e9e68b4fa.service: Deactivated successfully. Feb 22 22:19:23 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:19:24 np0005626394.novalocal systemd-sysv-generator[88471]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:19:24 np0005626394.novalocal systemd-rc-local-generator[88468]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:19:24 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:19:24 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:19:26 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:19:26 np0005626394.novalocal systemd-rc-local-generator[88504]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:19:26 np0005626394.novalocal systemd-sysv-generator[88508]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:19:26 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:19:47 np0005626394.novalocal crontab[88564]: (root) LIST (root) Feb 22 22:19:47 np0005626394.novalocal crontab[88565]: (root) LIST (keystone) Feb 22 22:19:47 np0005626394.novalocal crontab[88566]: (root) LIST (cinder) Feb 22 22:19:47 np0005626394.novalocal crontab[88567]: (root) LIST (glance) Feb 22 22:19:47 np0005626394.novalocal crontab[88568]: (root) LIST (nova) Feb 22 22:19:47 np0005626394.novalocal crontab[88569]: (root) LIST (manila) Feb 22 22:19:47 np0005626394.novalocal crontab[88570]: (root) REPLACE (cinder) Feb 22 22:19:47 np0005626394.novalocal crontab[88571]: (root) REPLACE (glance) Feb 22 22:19:47 np0005626394.novalocal crontab[88572]: (root) REPLACE (glance) Feb 22 22:19:53 np0005626394.novalocal crontab[88582]: (root) REPLACE (glance) Feb 22 22:20:02 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:20:02 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:20:02 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:20:24 np0005626394.novalocal crontab[88633]: (root) REPLACE (nova) Feb 22 22:20:31 np0005626394.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 22:20:31 np0005626394.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 22:20:31 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:20:31 np0005626394.novalocal systemd-rc-local-generator[88675]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:20:31 np0005626394.novalocal systemd-sysv-generator[88679]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:20:31 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:20:32 np0005626394.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 22:20:32 np0005626394.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 22:20:32 np0005626394.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 22:20:32 np0005626394.novalocal systemd[1]: run-r67ee1a6f05ea4a1c838fa39045458a18.service: Deactivated successfully. Feb 22 22:20:40 np0005626394.novalocal crontab[88787]: (root) REPLACE (manila) Feb 22 22:20:40 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:20:40 np0005626394.novalocal systemd-rc-local-generator[88805]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:20:40 np0005626394.novalocal systemd-sysv-generator[88811]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:20:40 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:20:41 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:20:41 np0005626394.novalocal systemd-sysv-generator[88848]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:20:41 np0005626394.novalocal systemd-rc-local-generator[88845]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:20:41 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:20:41 np0005626394.novalocal systemd[88864]: epmd.socket: Failed to create listening socket ([::]:4369): Address already in use Feb 22 22:20:41 np0005626394.novalocal systemd[1]: epmd.socket: Failed to receive listening socket ([::]:4369): Input/output error Feb 22 22:20:41 np0005626394.novalocal systemd[1]: epmd.socket: Failed to listen on sockets: Input/output error Feb 22 22:20:41 np0005626394.novalocal systemd[1]: epmd.socket: Failed with result 'resources'. Feb 22 22:20:41 np0005626394.novalocal systemd[1]: Failed to listen on Erlang Port Mapper Daemon Activation Socket. Feb 22 22:20:41 np0005626394.novalocal systemd[1]: Starting RabbitMQ broker... Feb 22 22:20:41 np0005626394.novalocal rabbitmq-server[88865]: 2026-02-22 22:20:41.909513-05:00 [warning] <0.129.0> Both old (.config) and new (.conf) format config files exist. Feb 22 22:20:41 np0005626394.novalocal rabbitmq-server[88865]: 2026-02-22 22:20:41.921189-05:00 [warning] <0.129.0> Using the old format config file: /etc/rabbitmq/rabbitmq.config Feb 22 22:20:41 np0005626394.novalocal rabbitmq-server[88865]: 2026-02-22 22:20:41.921216-05:00 [warning] <0.129.0> Please update your config files to the new format and remove the old file. Feb 22 22:20:43 np0005626394.novalocal rabbitmq-server[88865]: 2026-02-22 22:20:43.615278-05:00 [info] <0.229.0> Feature flags: list of feature flags found: Feb 22 22:20:43 np0005626394.novalocal rabbitmq-server[88865]: 2026-02-22 22:20:43.615340-05:00 [info] <0.229.0> Feature flags: [ ] implicit_default_bindings Feb 22 22:20:43 np0005626394.novalocal rabbitmq-server[88865]: 2026-02-22 22:20:43.615358-05:00 [info] <0.229.0> Feature flags: [ ] maintenance_mode_status Feb 22 22:20:43 np0005626394.novalocal rabbitmq-server[88865]: 2026-02-22 22:20:43.615392-05:00 [info] <0.229.0> Feature flags: [ ] quorum_queue Feb 22 22:20:43 np0005626394.novalocal rabbitmq-server[88865]: 2026-02-22 22:20:43.615498-05:00 [info] <0.229.0> Feature flags: [ ] stream_queue Feb 22 22:20:43 np0005626394.novalocal rabbitmq-server[88865]: 2026-02-22 22:20:43.615513-05:00 [info] <0.229.0> Feature flags: [ ] user_limits Feb 22 22:20:43 np0005626394.novalocal rabbitmq-server[88865]: 2026-02-22 22:20:43.615529-05:00 [info] <0.229.0> Feature flags: [ ] virtual_host_metadata Feb 22 22:20:43 np0005626394.novalocal rabbitmq-server[88865]: 2026-02-22 22:20:43.615579-05:00 [info] <0.229.0> Feature flags: feature flag states written to disk: yes Feb 22 22:20:43 np0005626394.novalocal rabbitmq-server[88865]: 2026-02-22 22:20:43.886273-05:00 [notice] <0.44.0> Application syslog exited with reason: stopped Feb 22 22:20:43 np0005626394.novalocal rabbitmq-server[88865]: 2026-02-22 22:20:43.886376-05:00 [notice] <0.229.0> Logging: switching to configured handler(s); following messages may not be visible in this log output Feb 22 22:20:44 np0005626394.novalocal rabbitmq-server[88865]: ## ## RabbitMQ 3.9.21 Feb 22 22:20:44 np0005626394.novalocal rabbitmq-server[88865]: ## ## Feb 22 22:20:44 np0005626394.novalocal rabbitmq-server[88865]: ########## Copyright (c) 2007-2022 VMware, Inc. or its affiliates. Feb 22 22:20:44 np0005626394.novalocal rabbitmq-server[88865]: ###### ## Feb 22 22:20:44 np0005626394.novalocal rabbitmq-server[88865]: ########## Licensed under the MPL 2.0. Website: https://rabbitmq.com Feb 22 22:20:44 np0005626394.novalocal rabbitmq-server[88865]: Erlang: 24.3.4.2 [jit] Feb 22 22:20:44 np0005626394.novalocal rabbitmq-server[88865]: TLS Library: OpenSSL - OpenSSL 3.5.5 27 Jan 2026 Feb 22 22:20:44 np0005626394.novalocal rabbitmq-server[88865]: Doc guides: https://rabbitmq.com/documentation.html Feb 22 22:20:44 np0005626394.novalocal rabbitmq-server[88865]: Support: https://rabbitmq.com/contact.html Feb 22 22:20:44 np0005626394.novalocal rabbitmq-server[88865]: Tutorials: https://rabbitmq.com/getstarted.html Feb 22 22:20:44 np0005626394.novalocal rabbitmq-server[88865]: Monitoring: https://rabbitmq.com/monitoring.html Feb 22 22:20:44 np0005626394.novalocal rabbitmq-server[88865]: Logs: /var/log/rabbitmq/rabbit@localhost6.log Feb 22 22:20:44 np0005626394.novalocal rabbitmq-server[88865]: /var/log/rabbitmq/rabbit@localhost6_upgrade.log Feb 22 22:20:44 np0005626394.novalocal rabbitmq-server[88865]: Feb 22 22:20:44 np0005626394.novalocal rabbitmq-server[88865]: Config file(s): /etc/rabbitmq/rabbitmq.config Feb 22 22:20:47 np0005626394.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 22:20:47 np0005626394.novalocal rabbitmq-server[88865]: Starting broker... completed with 3 plugins. Feb 22 22:20:47 np0005626394.novalocal systemd[1]: Started RabbitMQ broker. Feb 22 22:20:47 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:20:47 np0005626394.novalocal systemd-rc-local-generator[88967]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:20:47 np0005626394.novalocal systemd-sysv-generator[88972]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:20:47 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:20:47 np0005626394.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 22:20:47 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:20:47 np0005626394.novalocal systemd-sysv-generator[89011]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:20:47 np0005626394.novalocal systemd-rc-local-generator[89005]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:20:47 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:20:47 np0005626394.novalocal runuser[89023]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:20:47 np0005626394.novalocal setroubleshoot[88948]: failed to retrieve rpm info for path '/proc/net/if_inet6': Feb 22 22:20:48 np0005626394.novalocal systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Feb 22 22:20:48 np0005626394.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Feb 22 22:20:48 np0005626394.novalocal runuser[89023]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:20:48 np0005626394.novalocal runuser[89088]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:20:49 np0005626394.novalocal runuser[89088]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:20:49 np0005626394.novalocal setroubleshoot[88948]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. For complete SELinux messages run: sealert -l 2390a57b-8fcf-4b07-bc4f-f8a2b0fddf9e Feb 22 22:20:49 np0005626394.novalocal setroubleshoot[88948]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that inet_gethost should be allowed read access on the if_inet6 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'inet_gethost' --raw | audit2allow -M my-inetgethost # semodule -X 300 -i my-inetgethost.pp Feb 22 22:20:49 np0005626394.novalocal runuser[89141]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:20:49 np0005626394.novalocal runuser[89141]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:20:50 np0005626394.novalocal runuser[89195]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:20:50 np0005626394.novalocal runuser[89195]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:20:50 np0005626394.novalocal runuser[89249]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:20:51 np0005626394.novalocal runuser[89249]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:20:51 np0005626394.novalocal runuser[89301]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:20:51 np0005626394.novalocal runuser[89301]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:20:52 np0005626394.novalocal runuser[89353]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:20:52 np0005626394.novalocal runuser[89353]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:20:52 np0005626394.novalocal runuser[89405]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:20:53 np0005626394.novalocal runuser[89405]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:20:53 np0005626394.novalocal runuser[89457]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:20:53 np0005626394.novalocal runuser[89457]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:20:54 np0005626394.novalocal runuser[89511]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:20:54 np0005626394.novalocal runuser[89511]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:20:54 np0005626394.novalocal runuser[89563]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:20:55 np0005626394.novalocal runuser[89563]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:20:55 np0005626394.novalocal runuser[89615]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:20:55 np0005626394.novalocal runuser[89615]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:20:55 np0005626394.novalocal runuser[89667]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:20:56 np0005626394.novalocal runuser[89667]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:20:56 np0005626394.novalocal runuser[89719]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:20:56 np0005626394.novalocal runuser[89719]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:20:57 np0005626394.novalocal runuser[89773]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:20:57 np0005626394.novalocal runuser[89773]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:20:57 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:20:58 np0005626394.novalocal systemd-sysv-generator[89852]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:20:58 np0005626394.novalocal systemd-rc-local-generator[89848]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:20:58 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:20:58 np0005626394.novalocal systemd[1]: Started OpenStack Cinder Scheduler Server. Feb 22 22:20:58 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:20:58 np0005626394.novalocal systemd-rc-local-generator[89888]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:20:58 np0005626394.novalocal systemd-sysv-generator[89891]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:20:58 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:20:58 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Feb 22 22:20:58 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.106s CPU time. Feb 22 22:20:58 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:20:58 np0005626394.novalocal systemd-rc-local-generator[89924]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:20:58 np0005626394.novalocal systemd-sysv-generator[89929]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:20:58 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:20:59 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:20:59 np0005626394.novalocal systemd-sysv-generator[89965]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:20:59 np0005626394.novalocal systemd-rc-local-generator[89962]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:20:59 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:20:59 np0005626394.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 22:20:59 np0005626394.novalocal systemd[1]: Started OpenStack Cinder Volume Server. Feb 22 22:20:59 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:20:59 np0005626394.novalocal systemd-sysv-generator[90013]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:20:59 np0005626394.novalocal systemd-rc-local-generator[90007]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:20:59 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:20:59 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:20:59 np0005626394.novalocal systemd-sysv-generator[90046]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:20:59 np0005626394.novalocal systemd-rc-local-generator[90039]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:20:59 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:00 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:21:00 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:21:00 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:21:00 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:00 np0005626394.novalocal systemd-rc-local-generator[90080]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:00 np0005626394.novalocal systemd-sysv-generator[90086]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:00 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:00 np0005626394.novalocal systemd[1]: Started OpenStack Cinder Backup Server. Feb 22 22:21:00 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:01 np0005626394.novalocal systemd-sysv-generator[90122]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:01 np0005626394.novalocal systemd-rc-local-generator[90119]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:01 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:01 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:01 np0005626394.novalocal systemd-rc-local-generator[90159]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:01 np0005626394.novalocal systemd-sysv-generator[90162]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:01 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:01 np0005626394.novalocal sudo[90180]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings -o name cinder-volumes Feb 22 22:21:01 np0005626394.novalocal systemd[1]: Created slice User Slice of UID 0. Feb 22 22:21:01 np0005626394.novalocal systemd[1]: Starting User Runtime Directory /run/user/0... Feb 22 22:21:01 np0005626394.novalocal systemd[1]: Finished User Runtime Directory /run/user/0. Feb 22 22:21:01 np0005626394.novalocal systemd[1]: Starting User Manager for UID 0... Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: pam_unix(systemd-user:session): session opened for user root(uid=0) by root(uid=0) Feb 22 22:21:01 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: Queued start job for default target Main User Target. Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: Created slice User Application Slice. Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: Started Daily Cleanup of User's Temporary Directories. Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: Reached target Paths. Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: Reached target Timers. Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: Starting D-Bus User Message Bus Socket... Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: PipeWire PulseAudio was skipped because of an unmet condition check (ConditionUser=!root). Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: PipeWire Multimedia System Sockets was skipped because of an unmet condition check (ConditionUser=!root). Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: Starting Create User's Volatile Files and Directories... Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: Listening on D-Bus User Message Bus Socket. Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: Reached target Sockets. Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: Finished Create User's Volatile Files and Directories. Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: Reached target Basic System. Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: Reached target Main User Target. Feb 22 22:21:01 np0005626394.novalocal systemd[90184]: Startup finished in 193ms. Feb 22 22:21:01 np0005626394.novalocal systemd-rc-local-generator[90212]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:01 np0005626394.novalocal systemd-sysv-generator[90216]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:01 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:01 np0005626394.novalocal systemd[1]: Started User Manager for UID 0. Feb 22 22:21:01 np0005626394.novalocal systemd[1]: Started Session c1 of User root. Feb 22 22:21:01 np0005626394.novalocal sudo[90180]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:01 np0005626394.novalocal systemd[1]: Starting Restore LIO kernel target configuration... Feb 22 22:21:02 np0005626394.novalocal kernel: Rounding down aligned max_sectors from 4294967295 to 4294967288 Feb 22 22:21:02 np0005626394.novalocal target[90235]: No saved config file at /etc/target/saveconfig.json, ok, exiting Feb 22 22:21:02 np0005626394.novalocal systemd[1]: Finished Restore LIO kernel target configuration. Feb 22 22:21:02 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:02 np0005626394.novalocal sudo[90180]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:02 np0005626394.novalocal systemd-rc-local-generator[90262]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:02 np0005626394.novalocal systemd-sysv-generator[90265]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:02 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:02 np0005626394.novalocal systemd[1]: session-c1.scope: Deactivated successfully. Feb 22 22:21:02 np0005626394.novalocal sudo[90250]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Feb 22 22:21:02 np0005626394.novalocal systemd[1]: Started Session c2 of User root. Feb 22 22:21:02 np0005626394.novalocal sudo[90250]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:02 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:02 np0005626394.novalocal systemd-rc-local-generator[90301]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:02 np0005626394.novalocal systemd-sysv-generator[90304]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:02 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:02 np0005626394.novalocal sudo[90250]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:02 np0005626394.novalocal systemd[1]: session-c2.scope: Deactivated successfully. Feb 22 22:21:02 np0005626394.novalocal runuser[90320]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:02 np0005626394.novalocal sudo[90332]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 22:21:02 np0005626394.novalocal systemd[1]: Started Session c3 of User root. Feb 22 22:21:02 np0005626394.novalocal sudo[90332]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:03 np0005626394.novalocal sudo[90332]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:03 np0005626394.novalocal systemd[1]: session-c3.scope: Deactivated successfully. Feb 22 22:21:03 np0005626394.novalocal sudo[90370]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -L 14.25g cinder-volumes/cinder-volumes-pool Feb 22 22:21:03 np0005626394.novalocal systemd[1]: Started Session c4 of User root. Feb 22 22:21:03 np0005626394.novalocal sudo[90370]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:03 np0005626394.novalocal runuser[90320]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:03 np0005626394.novalocal runuser[90380]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:03 np0005626394.novalocal systemd[1]: Started Device-mapper event daemon. Feb 22 22:21:03 np0005626394.novalocal dmeventd[90456]: dmeventd ready for processing. Feb 22 22:21:03 np0005626394.novalocal dmeventd[90456]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Feb 22 22:21:03 np0005626394.novalocal lvm[90461]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 22:21:03 np0005626394.novalocal lvm[90461]: VG cinder-volumes finished Feb 22 22:21:03 np0005626394.novalocal sudo[90370]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:03 np0005626394.novalocal systemd[1]: session-c4.scope: Deactivated successfully. Feb 22 22:21:03 np0005626394.novalocal sudo[90463]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/cinder-volumes-pool Feb 22 22:21:03 np0005626394.novalocal systemd[1]: Started Session c5 of User root. Feb 22 22:21:03 np0005626394.novalocal sudo[90463]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:04 np0005626394.novalocal runuser[90380]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:04 np0005626394.novalocal runuser[90477]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:04 np0005626394.novalocal sudo[90463]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:04 np0005626394.novalocal systemd[1]: session-c5.scope: Deactivated successfully. Feb 22 22:21:04 np0005626394.novalocal sudo[90495]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C pvs --noheadings --unit=g -o vg_name,name,size,free --separator | --nosuffix --ignoreskippedcluster Feb 22 22:21:04 np0005626394.novalocal systemd[1]: Started Session c6 of User root. Feb 22 22:21:04 np0005626394.novalocal sudo[90495]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:04 np0005626394.novalocal sudo[90495]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:04 np0005626394.novalocal systemd[1]: session-c6.scope: Deactivated successfully. Feb 22 22:21:04 np0005626394.novalocal sudo[90527]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 22:21:04 np0005626394.novalocal systemd[1]: Started Session c7 of User root. Feb 22 22:21:04 np0005626394.novalocal sudo[90527]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:04 np0005626394.novalocal runuser[90477]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:04 np0005626394.novalocal runuser[90537]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:04 np0005626394.novalocal sudo[90527]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:04 np0005626394.novalocal systemd[1]: session-c7.scope: Deactivated successfully. Feb 22 22:21:04 np0005626394.novalocal sudo[90583]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 22:21:04 np0005626394.novalocal systemd[1]: Started Session c8 of User root. Feb 22 22:21:04 np0005626394.novalocal sudo[90583]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:05 np0005626394.novalocal sudo[90583]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:05 np0005626394.novalocal runuser[90537]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:05 np0005626394.novalocal systemd[1]: session-c8.scope: Deactivated successfully. Feb 22 22:21:05 np0005626394.novalocal sudo[90594]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:21:05 np0005626394.novalocal systemd[1]: Started Session c9 of User root. Feb 22 22:21:05 np0005626394.novalocal sudo[90594]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:05 np0005626394.novalocal runuser[90600]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:05 np0005626394.novalocal sudo[90594]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:05 np0005626394.novalocal systemd[1]: session-c9.scope: Deactivated successfully. Feb 22 22:21:05 np0005626394.novalocal sudo[90646]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 22:21:05 np0005626394.novalocal systemd[1]: Started Session c10 of User root. Feb 22 22:21:05 np0005626394.novalocal sudo[90646]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:05 np0005626394.novalocal sudo[90646]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:05 np0005626394.novalocal systemd[1]: session-c10.scope: Deactivated successfully. Feb 22 22:21:06 np0005626394.novalocal sudo[90656]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Feb 22 22:21:06 np0005626394.novalocal runuser[90600]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:06 np0005626394.novalocal systemd[1]: Started Session c11 of User root. Feb 22 22:21:06 np0005626394.novalocal sudo[90656]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:06 np0005626394.novalocal runuser[90661]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:06 np0005626394.novalocal sudo[90656]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:06 np0005626394.novalocal systemd[1]: session-c11.scope: Deactivated successfully. Feb 22 22:21:06 np0005626394.novalocal sudo[90708]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Feb 22 22:21:06 np0005626394.novalocal systemd[1]: Started Session c12 of User root. Feb 22 22:21:06 np0005626394.novalocal sudo[90708]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:06 np0005626394.novalocal runuser[90661]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:06 np0005626394.novalocal sudo[90708]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:06 np0005626394.novalocal systemd[1]: session-c12.scope: Deactivated successfully. Feb 22 22:21:06 np0005626394.novalocal sudo[90722]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 22:21:06 np0005626394.novalocal systemd[1]: Started Session c13 of User root. Feb 22 22:21:06 np0005626394.novalocal sudo[90722]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:06 np0005626394.novalocal runuser[90721]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:07 np0005626394.novalocal sudo[90722]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:07 np0005626394.novalocal systemd[1]: session-c13.scope: Deactivated successfully. Feb 22 22:21:07 np0005626394.novalocal sudo[90770]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:21:07 np0005626394.novalocal systemd[1]: Started Session c14 of User root. Feb 22 22:21:07 np0005626394.novalocal sudo[90770]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:07 np0005626394.novalocal runuser[90721]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:07 np0005626394.novalocal sudo[90770]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:07 np0005626394.novalocal systemd[1]: session-c14.scope: Deactivated successfully. Feb 22 22:21:07 np0005626394.novalocal sudo[90781]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 22:21:07 np0005626394.novalocal systemd[1]: Started Session c15 of User root. Feb 22 22:21:07 np0005626394.novalocal sudo[90781]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:07 np0005626394.novalocal runuser[90782]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:07 np0005626394.novalocal sudo[90781]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:07 np0005626394.novalocal systemd[1]: session-c15.scope: Deactivated successfully. Feb 22 22:21:07 np0005626394.novalocal sudo[90830]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:21:07 np0005626394.novalocal systemd[1]: Started Session c16 of User root. Feb 22 22:21:07 np0005626394.novalocal sudo[90830]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:07 np0005626394.novalocal runuser[90782]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:08 np0005626394.novalocal sudo[90830]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:08 np0005626394.novalocal systemd[1]: session-c16.scope: Deactivated successfully. Feb 22 22:21:08 np0005626394.novalocal sudo[90845]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 22:21:08 np0005626394.novalocal systemd[1]: Started Session c17 of User root. Feb 22 22:21:08 np0005626394.novalocal sudo[90845]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:08 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:08 np0005626394.novalocal systemd-rc-local-generator[90864]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:08 np0005626394.novalocal systemd-sysv-generator[90867]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:08 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:08 np0005626394.novalocal sudo[90845]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:08 np0005626394.novalocal systemd[1]: session-c17.scope: Deactivated successfully. Feb 22 22:21:08 np0005626394.novalocal sudo[90885]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:21:08 np0005626394.novalocal systemd[1]: Started Session c18 of User root. Feb 22 22:21:08 np0005626394.novalocal sudo[90885]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:08 np0005626394.novalocal systemd[1]: Starting OpenStack Neutron Server... Feb 22 22:21:08 np0005626394.novalocal sudo[90885]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:08 np0005626394.novalocal systemd[1]: session-c18.scope: Deactivated successfully. Feb 22 22:21:08 np0005626394.novalocal sudo[90891]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 22:21:08 np0005626394.novalocal systemd[1]: Started Session c19 of User root. Feb 22 22:21:08 np0005626394.novalocal sudo[90891]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:09 np0005626394.novalocal sudo[90891]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:09 np0005626394.novalocal systemd[1]: session-c19.scope: Deactivated successfully. Feb 22 22:21:09 np0005626394.novalocal sudo[90897]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:21:09 np0005626394.novalocal systemd[1]: Started Session c20 of User root. Feb 22 22:21:09 np0005626394.novalocal sudo[90897]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:09 np0005626394.novalocal sudo[90897]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:09 np0005626394.novalocal systemd[1]: session-c20.scope: Deactivated successfully. Feb 22 22:21:09 np0005626394.novalocal sudo[90902]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 22:21:09 np0005626394.novalocal systemd[1]: Started Session c21 of User root. Feb 22 22:21:09 np0005626394.novalocal sudo[90902]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:10 np0005626394.novalocal sudo[90902]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:10 np0005626394.novalocal systemd[1]: session-c21.scope: Deactivated successfully. Feb 22 22:21:10 np0005626394.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 22:21:10 np0005626394.novalocal sudo[90906]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:21:10 np0005626394.novalocal systemd[1]: Started Session c22 of User root. Feb 22 22:21:10 np0005626394.novalocal sudo[90906]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:10 np0005626394.novalocal sudo[90906]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:10 np0005626394.novalocal systemd[1]: session-c22.scope: Deactivated successfully. Feb 22 22:21:10 np0005626394.novalocal sudo[90911]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 22:21:10 np0005626394.novalocal systemd[1]: Started Session c23 of User root. Feb 22 22:21:10 np0005626394.novalocal sudo[90911]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:10 np0005626394.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 22:21:10 np0005626394.novalocal sudo[90911]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:10 np0005626394.novalocal systemd[1]: session-c23.scope: Deactivated successfully. Feb 22 22:21:10 np0005626394.novalocal sudo[90918]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:21:10 np0005626394.novalocal systemd[1]: Started Session c24 of User root. Feb 22 22:21:10 np0005626394.novalocal sudo[90918]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:21:11 np0005626394.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service. Feb 22 22:21:11 np0005626394.novalocal sudo[90918]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:11 np0005626394.novalocal systemd[1]: session-c24.scope: Deactivated successfully. Feb 22 22:21:12 np0005626394.novalocal setroubleshoot[90907]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l fc9abff5-cc7f-4607-a0ea-d89cda74140c Feb 22 22:21:12 np0005626394.novalocal setroubleshoot[90907]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Feb 22 22:21:12 np0005626394.novalocal setroubleshoot[90907]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l fc9abff5-cc7f-4607-a0ea-d89cda74140c Feb 22 22:21:12 np0005626394.novalocal setroubleshoot[90907]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Feb 22 22:21:12 np0005626394.novalocal systemd[1]: Started OpenStack Neutron Server. Feb 22 22:21:12 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:12 np0005626394.novalocal systemd-rc-local-generator[90958]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:12 np0005626394.novalocal systemd-sysv-generator[90961]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:12 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:12 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:12 np0005626394.novalocal systemd-sysv-generator[91001]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:12 np0005626394.novalocal systemd-rc-local-generator[90997]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:12 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:13 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:13 np0005626394.novalocal systemd-sysv-generator[91040]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:13 np0005626394.novalocal systemd-rc-local-generator[91036]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:13 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:13 np0005626394.novalocal systemd[1]: Started OpenStack Neutron OVN Agent. Feb 22 22:21:13 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:13 np0005626394.novalocal systemd-sysv-generator[91081]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:13 np0005626394.novalocal systemd-rc-local-generator[91076]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:13 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:13 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:13 np0005626394.novalocal systemd-rc-local-generator[91117]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:13 np0005626394.novalocal systemd-sysv-generator[91122]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:13 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:14 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:14 np0005626394.novalocal systemd-rc-local-generator[91152]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:14 np0005626394.novalocal systemd-sysv-generator[91155]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:14 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:14 np0005626394.novalocal systemd[1]: Started OpenStack Neutron VPNaaS support for OVN. Feb 22 22:21:14 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:14 np0005626394.novalocal systemd-sysv-generator[91197]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:14 np0005626394.novalocal systemd-rc-local-generator[91192]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:15 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:15 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:15 np0005626394.novalocal systemd-sysv-generator[91238]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:15 np0005626394.novalocal systemd-rc-local-generator[91231]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:15 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:15 np0005626394.novalocal sudo[91213]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmple9e3fi8/privsep.sock Feb 22 22:21:15 np0005626394.novalocal systemd[1]: Started Session c25 of User root. Feb 22 22:21:15 np0005626394.novalocal sudo[91213]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Feb 22 22:21:15 np0005626394.novalocal runuser[91251]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:16 np0005626394.novalocal kernel: capability: warning: `privsep-helper' uses deprecated v2 capabilities in a way that may be insecure Feb 22 22:21:16 np0005626394.novalocal sudo[91213]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:16 np0005626394.novalocal runuser[91251]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:16 np0005626394.novalocal runuser[91308]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:16 np0005626394.novalocal runuser[91308]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:17 np0005626394.novalocal runuser[91364]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:17 np0005626394.novalocal sudo[91409]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmp1gx_pz2d/privsep.sock Feb 22 22:21:17 np0005626394.novalocal systemd[1]: Started Session c26 of User root. Feb 22 22:21:17 np0005626394.novalocal sudo[91409]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Feb 22 22:21:17 np0005626394.novalocal runuser[91364]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:17 np0005626394.novalocal runuser[91420]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:17 np0005626394.novalocal sudo[91409]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:18 np0005626394.novalocal runuser[91420]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:18 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:18 np0005626394.novalocal systemd-rc-local-generator[91500]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:18 np0005626394.novalocal systemd-sysv-generator[91505]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:18 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:19 np0005626394.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Feb 22 22:21:19 np0005626394.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Feb 22 22:21:19 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:19 np0005626394.novalocal systemd-rc-local-generator[91538]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:19 np0005626394.novalocal systemd-sysv-generator[91542]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:19 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:19 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:19 np0005626394.novalocal systemd-rc-local-generator[91576]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:19 np0005626394.novalocal systemd-sysv-generator[91579]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:19 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:20 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:20 np0005626394.novalocal systemd-sysv-generator[91623]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:20 np0005626394.novalocal systemd-rc-local-generator[91618]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:20 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:20 np0005626394.novalocal systemd[1]: Listening on libvirt locking daemon socket. Feb 22 22:21:20 np0005626394.novalocal systemd[1]: Listening on libvirt locking daemon admin socket. Feb 22 22:21:20 np0005626394.novalocal systemd[1]: Starting libvirt locking daemon... Feb 22 22:21:20 np0005626394.novalocal systemd[1]: Started libvirt locking daemon. Feb 22 22:21:20 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:20 np0005626394.novalocal systemd-rc-local-generator[91657]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:20 np0005626394.novalocal systemd-sysv-generator[91662]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:20 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:21 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:21 np0005626394.novalocal systemd-sysv-generator[91696]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:21 np0005626394.novalocal systemd-rc-local-generator[91692]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:21 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:21 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:21 np0005626394.novalocal systemd-sysv-generator[91735]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:21 np0005626394.novalocal systemd-rc-local-generator[91732]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:21 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:21 np0005626394.novalocal systemd[1]: Listening on libvirt logging daemon socket. Feb 22 22:21:21 np0005626394.novalocal systemd[1]: Listening on libvirt logging daemon admin socket. Feb 22 22:21:21 np0005626394.novalocal systemd[1]: Starting libvirt logging daemon... Feb 22 22:21:22 np0005626394.novalocal systemd[1]: Started libvirt logging daemon. Feb 22 22:21:22 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:22 np0005626394.novalocal systemd-rc-local-generator[91775]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:22 np0005626394.novalocal systemd-sysv-generator[91780]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:22 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:22 np0005626394.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 22:21:22 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Feb 22 22:21:22 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Consumed 1.110s CPU time. Feb 22 22:21:22 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:22 np0005626394.novalocal systemd-sysv-generator[91813]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:22 np0005626394.novalocal systemd-rc-local-generator[91808]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:22 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:23 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:23 np0005626394.novalocal systemd-sysv-generator[91851]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:23 np0005626394.novalocal systemd-rc-local-generator[91847]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:23 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:23 np0005626394.novalocal systemd[1]: Listening on libvirt secret daemon socket. Feb 22 22:21:24 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:24 np0005626394.novalocal systemd-rc-local-generator[91891]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:24 np0005626394.novalocal systemd-sysv-generator[91896]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:24 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:24 np0005626394.novalocal systemd[1]: Listening on libvirt nodedev daemon socket. Feb 22 22:21:24 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:24 np0005626394.novalocal systemd-rc-local-generator[91937]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:24 np0005626394.novalocal systemd-sysv-generator[91943]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:24 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:25 np0005626394.novalocal systemd[1]: Listening on libvirt QEMU daemon socket. Feb 22 22:21:25 np0005626394.novalocal systemd[1]: virtproxyd-tcp.socket: Deactivated successfully. Feb 22 22:21:25 np0005626394.novalocal systemd[1]: Closed libvirt proxy daemon non-TLS IP socket. Feb 22 22:21:25 np0005626394.novalocal systemd[1]: Stopping libvirt proxy daemon non-TLS IP socket... Feb 22 22:21:25 np0005626394.novalocal systemd[1]: virtproxyd.socket: Deactivated successfully. Feb 22 22:21:25 np0005626394.novalocal systemd[1]: Closed libvirt proxy daemon socket. Feb 22 22:21:25 np0005626394.novalocal systemd[1]: Stopping libvirt proxy daemon socket... Feb 22 22:21:25 np0005626394.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Feb 22 22:21:25 np0005626394.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Feb 22 22:21:25 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:26 np0005626394.novalocal systemd-sysv-generator[91987]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:26 np0005626394.novalocal systemd-rc-local-generator[91983]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:26 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:26 np0005626394.novalocal systemd[1]: Listening on libvirt storage daemon socket. Feb 22 22:21:26 np0005626394.novalocal systemd[1]: Created slice Virtual Machine and Container Slice. Feb 22 22:21:26 np0005626394.novalocal systemd[1]: Listening on libvirt QEMU daemon admin socket. Feb 22 22:21:26 np0005626394.novalocal systemd[1]: Listening on libvirt QEMU daemon read-only socket. Feb 22 22:21:26 np0005626394.novalocal systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 22 22:21:26 np0005626394.novalocal systemd[1]: Starting Virtual Machine and Container Registration Service... Feb 22 22:21:26 np0005626394.novalocal systemd[1]: Started Virtual Machine and Container Registration Service. Feb 22 22:21:26 np0005626394.novalocal systemd[1]: Starting libvirt QEMU daemon... Feb 22 22:21:26 np0005626394.novalocal systemd[1]: Started libvirt QEMU daemon. Feb 22 22:21:26 np0005626394.novalocal virtqemud[92008]: libvirt version: 11.10.0, package: 4.el9 (builder@centos.org, 2026-01-29-15:25:17, ) Feb 22 22:21:26 np0005626394.novalocal virtqemud[92008]: hostname: np0005626394.novalocal Feb 22 22:21:26 np0005626394.novalocal virtqemud[92008]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 22 22:21:26 np0005626394.novalocal virtqemud[92008]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 22 22:21:27 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:27 np0005626394.novalocal systemd-rc-local-generator[92055]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:27 np0005626394.novalocal systemd-sysv-generator[92059]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:27 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:27 np0005626394.novalocal systemd[1]: Reached target libvirt guests shutdown target. Feb 22 22:21:27 np0005626394.novalocal systemd[1]: Starting libvirt guests suspend/resume service... Feb 22 22:21:27 np0005626394.novalocal systemd[1]: Finished libvirt guests suspend/resume service. Feb 22 22:21:27 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:27 np0005626394.novalocal systemd-sysv-generator[92100]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:27 np0005626394.novalocal systemd-rc-local-generator[92096]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:27 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:27 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:27 np0005626394.novalocal systemd-sysv-generator[92136]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:27 np0005626394.novalocal systemd-rc-local-generator[92132]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:27 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:28 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:28 np0005626394.novalocal systemd-sysv-generator[92178]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:28 np0005626394.novalocal systemd-rc-local-generator[92175]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:28 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:28 np0005626394.novalocal systemd[1]: Started OpenStack Nova NoVNC Proxy Server. Feb 22 22:21:28 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:29 np0005626394.novalocal systemd-sysv-generator[92222]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:29 np0005626394.novalocal systemd-rc-local-generator[92217]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:29 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:29 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:29 np0005626394.novalocal systemd-sysv-generator[92254]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:29 np0005626394.novalocal systemd-rc-local-generator[92250]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:29 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:29 np0005626394.novalocal runuser[92269]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:30 np0005626394.novalocal runuser[92269]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:30 np0005626394.novalocal runuser[92321]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:30 np0005626394.novalocal runuser[92321]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:30 np0005626394.novalocal runuser[92374]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:31 np0005626394.novalocal runuser[92374]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:31 np0005626394.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 22:21:31 np0005626394.novalocal runuser[92428]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:31 np0005626394.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 22:21:32 np0005626394.novalocal runuser[92428]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:32 np0005626394.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service. Feb 22 22:21:32 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:32 np0005626394.novalocal systemd-rc-local-generator[92513]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:32 np0005626394.novalocal systemd-sysv-generator[92516]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:32 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:32 np0005626394.novalocal systemd[1]: Started OpenStack Octavia Health-Manager service. Feb 22 22:21:32 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:33 np0005626394.novalocal systemd-rc-local-generator[92556]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:33 np0005626394.novalocal systemd-sysv-generator[92559]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:33 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:33 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l a17fcf95-158b-4823-bc8b-a9440d02861c Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 1faf79e6-4d63-4da8-a5bb-71bb745feac6 Feb 22 22:21:33 np0005626394.novalocal systemd-sysv-generator[92595]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:33 np0005626394.novalocal systemd-rc-local-generator[92592]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 534a3c1d-db8c-4f96-82ad-e6499d6362bb Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 22:21:33 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 3c9d5bc4-61f6-4548-984e-e8a894dd0b6f Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 2ee6420e-5dfa-4492-9c90-6d9b53c3a8a2 Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l edaab160-3c1c-4d99-885b-895893a1263a Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 91bd2518-a5ff-4d26-8746-472e2c275a81 Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 945a6b84-6492-4401-b4f2-f65f4da58db9 Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l b6f8cc06-53ee-473f-8fba-2a41a077d2e5 Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l ca0b12d5-c333-43ea-9bc9-7abaa210ddca Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 7cc80826-1646-4370-a4c5-7148d819f100 Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 1faf79e6-4d63-4da8-a5bb-71bb745feac6 Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 2ee6420e-5dfa-4492-9c90-6d9b53c3a8a2 Feb 22 22:21:33 np0005626394.novalocal setroubleshoot[92427]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 22:21:33 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:33 np0005626394.novalocal systemd-rc-local-generator[92640]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:33 np0005626394.novalocal systemd-sysv-generator[92643]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:33 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:34 np0005626394.novalocal systemd[1]: Started OpenStack Octavia Housekeeping service. Feb 22 22:21:34 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:34 np0005626394.novalocal systemd-rc-local-generator[92687]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:34 np0005626394.novalocal systemd-sysv-generator[92692]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:34 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:34 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:34 np0005626394.novalocal systemd-sysv-generator[92716]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:34 np0005626394.novalocal systemd-rc-local-generator[92713]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:34 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:35 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:35 np0005626394.novalocal systemd-sysv-generator[92755]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:35 np0005626394.novalocal systemd-rc-local-generator[92752]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:35 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:35 np0005626394.novalocal systemd[1]: Started OpenStack Octavia Driver Agent service. Feb 22 22:21:35 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:35 np0005626394.novalocal systemd-rc-local-generator[92791]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:35 np0005626394.novalocal systemd-sysv-generator[92794]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:35 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:35 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:35 np0005626394.novalocal systemd-sysv-generator[92829]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:35 np0005626394.novalocal systemd-rc-local-generator[92826]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:36 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:36 np0005626394.novalocal runuser[92849]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:36 np0005626394.novalocal runuser[92849]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:36 np0005626394.novalocal runuser[92903]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:37 np0005626394.novalocal runuser[92903]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:37 np0005626394.novalocal runuser[92956]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:38 np0005626394.novalocal runuser[92956]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:38 np0005626394.novalocal runuser[93012]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:21:38 np0005626394.novalocal runuser[93012]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:21:39 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:39 np0005626394.novalocal systemd-rc-local-generator[93104]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:39 np0005626394.novalocal systemd-sysv-generator[93107]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:39 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:39 np0005626394.novalocal systemd[1]: Started OpenStack Manila Scheduler. Feb 22 22:21:39 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:39 np0005626394.novalocal systemd-rc-local-generator[93146]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:39 np0005626394.novalocal systemd-sysv-generator[93151]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:40 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:40 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:40 np0005626394.novalocal systemd-rc-local-generator[93178]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:40 np0005626394.novalocal systemd-sysv-generator[93182]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:40 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:40 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:40 np0005626394.novalocal systemd-rc-local-generator[93220]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:40 np0005626394.novalocal systemd-sysv-generator[93223]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:40 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:41 np0005626394.novalocal systemd[1]: Started OpenStack Manila Share Service. Feb 22 22:21:41 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:41 np0005626394.novalocal systemd-rc-local-generator[93257]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:41 np0005626394.novalocal systemd-sysv-generator[93260]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:41 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:41 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:41 np0005626394.novalocal systemd-sysv-generator[93297]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:41 np0005626394.novalocal systemd-rc-local-generator[93294]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:41 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:41 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:42 np0005626394.novalocal systemd-rc-local-generator[93338]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:42 np0005626394.novalocal systemd-sysv-generator[93344]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:42 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:42 np0005626394.novalocal systemd[1]: Started OpenStack Manila Data Server. Feb 22 22:21:42 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:42 np0005626394.novalocal systemd-sysv-generator[93378]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:42 np0005626394.novalocal systemd-rc-local-generator[93375]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:42 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:42 np0005626394.novalocal sudo[93393]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/privsep-helper --config-file /usr/share/manila/manila-dist.conf --config-file /etc/manila/manila.conf --privsep_context manila.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmp0ab0qwy1/privsep.sock Feb 22 22:21:42 np0005626394.novalocal systemd[1]: Started Session c27 of User root. Feb 22 22:21:42 np0005626394.novalocal sudo[93393]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=978) Feb 22 22:21:42 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:42 np0005626394.novalocal systemd-rc-local-generator[93412]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:42 np0005626394.novalocal systemd-sysv-generator[93416]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:42 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:43 np0005626394.novalocal sudo[93393]: pam_unix(sudo:session): session closed for user root Feb 22 22:21:43 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:43 np0005626394.novalocal systemd-rc-local-generator[93460]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:43 np0005626394.novalocal systemd-sysv-generator[93464]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:43 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:43 np0005626394.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 22:21:43 np0005626394.novalocal systemd[1]: setroubleshootd.service: Consumed 1.279s CPU time. Feb 22 22:21:43 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Deactivated successfully. Feb 22 22:21:43 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Consumed 1.119s CPU time. Feb 22 22:21:43 np0005626394.novalocal systemd[1]: Starting One-time temporary TLS key generation for httpd.service... Feb 22 22:21:43 np0005626394.novalocal systemd[1]: httpd-init.service: Deactivated successfully. Feb 22 22:21:43 np0005626394.novalocal systemd[1]: Finished One-time temporary TLS key generation for httpd.service. Feb 22 22:21:43 np0005626394.novalocal systemd[1]: Starting The Apache HTTP Server... Feb 22 22:21:44 np0005626394.novalocal python3[93482]: /usr/lib/python3.9/site-packages/django/conf/__init__.py:267: RemovedInDjango50Warning: The USE_L10N setting is deprecated. Starting with Django 5.0, localized formatting of data will always be enabled. For example Django will display numbers and dates using the format of the current locale. Feb 22 22:21:44 np0005626394.novalocal python3[93482]: warnings.warn(USE_L10N_DEPRECATED_MSG, RemovedInDjango50Warning) Feb 22 22:21:44 np0005626394.novalocal python3[93482]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Feb 22 22:21:44 np0005626394.novalocal python3[93482]: version_info = version.StrictVersion(__version__).version Feb 22 22:21:47 np0005626394.novalocal python3[93485]: /usr/lib/python3.9/site-packages/django/conf/__init__.py:267: RemovedInDjango50Warning: The USE_L10N setting is deprecated. Starting with Django 5.0, localized formatting of data will always be enabled. For example Django will display numbers and dates using the format of the current locale. Feb 22 22:21:47 np0005626394.novalocal python3[93485]: warnings.warn(USE_L10N_DEPRECATED_MSG, RemovedInDjango50Warning) Feb 22 22:21:47 np0005626394.novalocal python3[93485]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Feb 22 22:21:47 np0005626394.novalocal python3[93485]: version_info = version.StrictVersion(__version__).version Feb 22 22:21:55 np0005626394.novalocal httpd[93528]: Server configured, listening on: ::1 port 9876, ... Feb 22 22:21:55 np0005626394.novalocal systemd[1]: Started The Apache HTTP Server. Feb 22 22:21:55 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:55 np0005626394.novalocal systemd-rc-local-generator[93597]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:55 np0005626394.novalocal systemd-sysv-generator[93601]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:55 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:56 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:21:56 np0005626394.novalocal systemd-rc-local-generator[93678]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:21:56 np0005626394.novalocal systemd-sysv-generator[93681]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:21:56 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:21:56 np0005626394.novalocal crontab[93690]: (root) REPLACE (keystone) Feb 22 22:21:58 np0005626394.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 22:21:58 np0005626394.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 22:21:59 np0005626394.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service. Feb 22 22:22:00 np0005626394.novalocal setroubleshoot[93695]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l c75f571d-9062-4877-bf7d-4263caaa770e Feb 22 22:22:00 np0005626394.novalocal setroubleshoot[93695]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 22:22:00 np0005626394.novalocal setroubleshoot[93695]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l ffd5d126-8da4-4306-82f8-81cb22831eff Feb 22 22:22:00 np0005626394.novalocal setroubleshoot[93695]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 22:22:00 np0005626394.novalocal setroubleshoot[93695]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 59486a31-f9ec-472b-b55e-47e78a1f4c44 Feb 22 22:22:00 np0005626394.novalocal setroubleshoot[93695]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 22:22:00 np0005626394.novalocal setroubleshoot[93695]: failed to retrieve rpm info for path '/var/lib/keystone/.cache/python-entrypoints/24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1': Feb 22 22:22:00 np0005626394.novalocal setroubleshoot[93695]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1. For complete SELinux messages run: sealert -l ffe5c377-6f57-4d33-87d6-26d946fd3447 Feb 22 22:22:00 np0005626394.novalocal setroubleshoot[93695]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the 24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 22:22:04 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:22:04 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:22:04 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:22:10 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Deactivated successfully. Feb 22 22:22:10 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Consumed 1.166s CPU time. Feb 22 22:22:10 np0005626394.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 22:22:36 np0005626394.novalocal octavia-health-manager[92848]: /usr/lib/python3.9/site-packages/octavia/db/repositories.py:1594: SAWarning: Coercing Subquery object into a select() for use in IN(); please pass a select() construct explicitly Feb 22 22:22:36 np0005626394.novalocal octavia-health-manager[92848]: self.model_class.amphora_id.in_(expired_ids_query) Feb 22 22:22:55 np0005626394.novalocal sudo[93790]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 22:22:55 np0005626394.novalocal systemd[1]: Started Session c28 of User root. Feb 22 22:22:55 np0005626394.novalocal sudo[93790]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:22:55 np0005626394.novalocal sudo[93790]: pam_unix(sudo:session): session closed for user root Feb 22 22:22:55 np0005626394.novalocal systemd[1]: session-c28.scope: Deactivated successfully. Feb 22 22:22:55 np0005626394.novalocal sudo[93795]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:22:55 np0005626394.novalocal systemd[1]: Started Session c29 of User root. Feb 22 22:22:55 np0005626394.novalocal sudo[93795]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:22:56 np0005626394.novalocal sudo[93795]: pam_unix(sudo:session): session closed for user root Feb 22 22:22:56 np0005626394.novalocal systemd[1]: session-c29.scope: Deactivated successfully. Feb 22 22:22:56 np0005626394.novalocal sudo[93799]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 22:22:56 np0005626394.novalocal systemd[1]: Started Session c30 of User root. Feb 22 22:22:56 np0005626394.novalocal sudo[93799]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:22:56 np0005626394.novalocal sudo[93799]: pam_unix(sudo:session): session closed for user root Feb 22 22:22:56 np0005626394.novalocal systemd[1]: session-c30.scope: Deactivated successfully. Feb 22 22:22:56 np0005626394.novalocal sudo[93803]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:22:56 np0005626394.novalocal systemd[1]: Started Session c31 of User root. Feb 22 22:22:56 np0005626394.novalocal sudo[93803]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:22:56 np0005626394.novalocal sudo[93803]: pam_unix(sudo:session): session closed for user root Feb 22 22:22:56 np0005626394.novalocal systemd[1]: session-c31.scope: Deactivated successfully. Feb 22 22:23:04 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:23:04 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:23:04 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:23:09 np0005626394.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 22:23:09 np0005626394.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 22:23:10 np0005626394.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service. Feb 22 22:23:11 np0005626394.novalocal setroubleshoot[93819]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l a6f56083-9f3f-4061-8082-a1c057a01e52 Feb 22 22:23:11 np0005626394.novalocal setroubleshoot[93819]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 22 22:23:11 np0005626394.novalocal setroubleshoot[93819]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 24298489-9bfa-4943-95fd-f7d9f1616759 Feb 22 22:23:11 np0005626394.novalocal setroubleshoot[93819]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 22 22:23:11 np0005626394.novalocal setroubleshoot[93819]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 1b0a681a-7e10-475f-af3a-bca8dd1f8fc3 Feb 22 22:23:11 np0005626394.novalocal setroubleshoot[93819]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 22 22:23:21 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully. Feb 22 22:23:21 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Consumed 1.226s CPU time. Feb 22 22:23:21 np0005626394.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 22:23:26 np0005626394.novalocal systemd[1]: virtqemud.service: Deactivated successfully. Feb 22 22:23:36 np0005626394.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 22:23:36 np0005626394.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 22:23:37 np0005626394.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service. Feb 22 22:23:38 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l a6f56083-9f3f-4061-8082-a1c057a01e52 Feb 22 22:23:38 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 22 22:23:38 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 24298489-9bfa-4943-95fd-f7d9f1616759 Feb 22 22:23:38 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 22 22:23:38 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 1b0a681a-7e10-475f-af3a-bca8dd1f8fc3 Feb 22 22:23:38 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 22 22:23:42 np0005626394.novalocal sudo[93893]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-bb45d2d8-9412-48c7-806b-b476e657d8cd cinder-volumes/cinder-volumes-pool Feb 22 22:23:42 np0005626394.novalocal systemd[1]: Started Session c32 of User root. Feb 22 22:23:42 np0005626394.novalocal sudo[93893]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:42 np0005626394.novalocal dmeventd[90456]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool. Feb 22 22:23:43 np0005626394.novalocal dmeventd[90456]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Feb 22 22:23:44 np0005626394.novalocal lvm[93950]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 22:23:44 np0005626394.novalocal lvm[93950]: VG cinder-volumes finished Feb 22 22:23:44 np0005626394.novalocal sudo[93893]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:44 np0005626394.novalocal systemd[1]: session-c32.scope: Deactivated successfully. Feb 22 22:23:46 np0005626394.novalocal sudo[93952]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpfw4wa_uj/privsep.sock Feb 22 22:23:46 np0005626394.novalocal systemd[1]: Started Session c33 of User root. Feb 22 22:23:46 np0005626394.novalocal sudo[93952]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 0c2df4e2-7e0a-4360-8d72-bd2d2774ebcb Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 995bed1b-6669-4aaa-933d-48fb0dab1d1b Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 9fe32bfa-427a-427e-a40b-60c2f5032660 Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l a1fcaf98-b2f5-414d-b46f-d7e209d58827 Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 79e78186-8846-45f2-a97f-2023e1083160 Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l a4c0d0ae-8694-49c8-b2b6-39da2d5e4210 Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 79e78186-8846-45f2-a97f-2023e1083160 Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l a4c0d0ae-8694-49c8-b2b6-39da2d5e4210 Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:23:46 np0005626394.novalocal sudo[93952]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 0c2df4e2-7e0a-4360-8d72-bd2d2774ebcb Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:23:46 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 736f04fa-b980-4bae-89af-617be8eae58d Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 4dcf9105-0733-4166-aed8-7e3a03a01342 Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: failed to retrieve rpm info for path '/dev/vda1': Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8ec2db56-20d1-45a5-837d-2c4e18892340 Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 2e08cc42-6810-4c91-a656-17d9f6c36a74 Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 5d3a76f7-0af8-4aa2-a1af-228e0f41e64c Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l b0b15075-3b8c-47f3-9d0d-3651666c9890 Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal sudo[93985]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-bb45d2d8-9412-48c7-806b-b476e657d8cd Feb 22 22:23:47 np0005626394.novalocal systemd[1]: Started Session c34 of User root. Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l a9efafdc-f737-443c-acda-31b59dc47dab Feb 22 22:23:47 np0005626394.novalocal sudo[93985]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 4f8affc0-c043-4328-9d6b-55c5551110bb Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 6391b337-384e-4f4e-a69b-9c6aa111eb74 Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l f04761c0-e0be-4dae-95c7-1cc6df9bbec1 Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-inYi4j. For complete SELinux messages run: sealert -l 1ee74157-2090-4d0b-8500-52fdaf43caa4 Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-inYi4j. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-inYi4j file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-inYi4j. For complete SELinux messages run: sealert -l 081bab23-a408-4819-9211-c3b79b940541 Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-inYi4j. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-inYi4j file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 7c7d59a4-6ec6-4529-b9bb-ee83a0ff4f1b Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 5da47dc1-eddb-4462-88e6-a7621bc30e11 Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l f1b6d09e-3806-4c4c-bb76-a8e19b4454e7 Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 280d0401-5c91-409d-b6fa-8d2a830ca4e4 Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l dba2925d-62b2-4bf9-b999-020006130902 Feb 22 22:23:47 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:47 np0005626394.novalocal sudo[93985]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:47 np0005626394.novalocal systemd[1]: session-c34.scope: Deactivated successfully. Feb 22 22:23:47 np0005626394.novalocal sudo[94025]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-bb45d2d8-9412-48c7-806b-b476e657d8cd iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd eZzU7DcGyWGqwC2foys9 LP7q9DFkCTkgjEjy False -p3260 -a::1 Feb 22 22:23:47 np0005626394.novalocal systemd[1]: Started Session c35 of User root. Feb 22 22:23:47 np0005626394.novalocal sudo[94025]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:48 np0005626394.novalocal sudo[94025]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:48 np0005626394.novalocal systemd[1]: session-c35.scope: Deactivated successfully. Feb 22 22:23:48 np0005626394.novalocal sudo[94039]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 22:23:48 np0005626394.novalocal systemd[1]: Started Session c36 of User root. Feb 22 22:23:48 np0005626394.novalocal sudo[94039]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:48 np0005626394.novalocal sudo[94039]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:48 np0005626394.novalocal systemd[1]: session-c36.scope: Deactivated successfully. Feb 22 22:23:48 np0005626394.novalocal sudo[94044]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 22:23:48 np0005626394.novalocal systemd[1]: Started Session c37 of User root. Feb 22 22:23:48 np0005626394.novalocal sudo[94044]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:49 np0005626394.novalocal sudo[94044]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:49 np0005626394.novalocal systemd[1]: session-c37.scope: Deactivated successfully. Feb 22 22:23:49 np0005626394.novalocal sudo[94049]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd eZzU7DcGyWGqwC2foys9 LP7q9DFkCTkgjEjy iqn.1994-05.com.redhat:fffa642378aa Feb 22 22:23:49 np0005626394.novalocal systemd[1]: Started Session c38 of User root. Feb 22 22:23:49 np0005626394.novalocal sudo[94049]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:49 np0005626394.novalocal sudo[94049]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:49 np0005626394.novalocal systemd[1]: session-c38.scope: Deactivated successfully. Feb 22 22:23:49 np0005626394.novalocal sudo[94054]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 22:23:49 np0005626394.novalocal systemd[1]: Started Session c39 of User root. Feb 22 22:23:49 np0005626394.novalocal sudo[94054]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:50 np0005626394.novalocal sudo[94054]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:50 np0005626394.novalocal systemd[1]: session-c39.scope: Deactivated successfully. Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 684ecb61-ec83-4633-8788-9e30446fe076 Feb 22 22:23:50 np0005626394.novalocal kernel: iscsi: registered transport (tcp) Feb 22 22:23:50 np0005626394.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Feb 22 22:23:50 np0005626394.novalocal iscsid[75067]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd, portal: ::1,3260] through [iface: default] is operational now Feb 22 22:23:50 np0005626394.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Feb 22 22:23:50 np0005626394.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Feb 22 22:23:50 np0005626394.novalocal kernel: scsi 2:0:0:0: alua: device naa.600140521a33719d18b42d8a57e6bfe1 port group 0 rel port 1 Feb 22 22:23:50 np0005626394.novalocal kernel: scsi 2:0:0:0: Attached scsi generic sg1 type 0 Feb 22 22:23:50 np0005626394.novalocal kernel: scsi 2:0:0:0: alua: transition timeout set to 60 seconds Feb 22 22:23:50 np0005626394.novalocal kernel: scsi 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Feb 22 22:23:50 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Feb 22 22:23:50 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Feb 22 22:23:50 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Feb 22 22:23:50 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Feb 22 22:23:50 np0005626394.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 22:23:50 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Feb 22 22:23:50 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:50 np0005626394.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 3a4de79a-1b2d-4623-861b-754f96b300ad Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:50 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 57cd190c-8644-45a9-a3f4-4d23a5d9d203 Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 52bff4fc-41c7-44be-a14f-db931d02a1b2 Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a8d20c9c-014b-4423-a0c6-8ce121ba79b7 Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l a94fc9c8-673c-4276-bcce-8f575d02a4d1 Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l ade14b92-fea3-4aa9-ba78-b45c130f40b3 Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l e0e594a9-40ec-4a86-a98b-cdecc620beb3 Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3ae7d0c4-a3f4-46f6-8b4d-cba70b94b6ee Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:50 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 743ab85a-a0ca-4b13-86ae-a0f03b88463e Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8a447935-1179-480a-b2d4-77367ec16caa Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 6e16c86c-0c43-4039-847f-e655b58c5f1c Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l b896e31a-710a-4c6d-8198-4ffaff4d4368 Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd/::1,3260. For complete SELinux messages run: sealert -l 01185202-11f4-4862-999f-c32ea026c402 Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd/::1,3260. For complete SELinux messages run: sealert -l ea9e1050-6c34-4bbe-9ba8-718709b45f36 Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 9b8598d0-cbd4-4231-8b5f-cb4fe11e7ddb Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 684ecb61-ec83-4633-8788-9e30446fe076 Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:51 np0005626394.novalocal sudo[94103]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Feb 22 22:23:51 np0005626394.novalocal systemd[1]: Started Session c40 of User root. Feb 22 22:23:51 np0005626394.novalocal sudo[94103]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 22:23:51 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l aeb427b8-09fb-47ed-bbec-9e0e6a2b331c Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l b5c7bd43-462e-4c90-87d0-e97205c2ba7e Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l d3f6784b-d8d9-4b70-8772-bbc1d73577ba Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: failed to retrieve rpm info for path '/dev/sda': Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8ec2db56-20d1-45a5-837d-2c4e18892340 Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 0c2df4e2-7e0a-4360-8d72-bd2d2774ebcb Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 995bed1b-6669-4aaa-933d-48fb0dab1d1b Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 9fe32bfa-427a-427e-a40b-60c2f5032660 Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l a1fcaf98-b2f5-414d-b46f-d7e209d58827 Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 79e78186-8846-45f2-a97f-2023e1083160 Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l a4c0d0ae-8694-49c8-b2b6-39da2d5e4210 Feb 22 22:23:52 np0005626394.novalocal sudo[94103]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:52 np0005626394.novalocal systemd[1]: session-c40.scope: Deactivated successfully. Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l b8d2323d-fc83-465d-9e83-29f0aafa3b2b Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 90abc12a-2e2a-4120-ac09-574d38ff5825 Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5d3a76f7-0af8-4aa2-a1af-228e0f41e64c Feb 22 22:23:52 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:53 np0005626394.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 22:23:53 np0005626394.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 22 22:23:53 np0005626394.novalocal kernel: GPT:229375 != 2097151 Feb 22 22:23:53 np0005626394.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Feb 22 22:23:53 np0005626394.novalocal kernel: GPT:229375 != 2097151 Feb 22 22:23:53 np0005626394.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Feb 22 22:23:53 np0005626394.novalocal kernel: sda: sda1 sda15 Feb 22 22:23:53 np0005626394.novalocal sudo[94115]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Feb 22 22:23:53 np0005626394.novalocal systemd[1]: Started Session c41 of User root. Feb 22 22:23:53 np0005626394.novalocal sudo[94115]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l b0b15075-3b8c-47f3-9d0d-3651666c9890 Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 79e78186-8846-45f2-a97f-2023e1083160 Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l a4c0d0ae-8694-49c8-b2b6-39da2d5e4210 Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:23:53 np0005626394.novalocal sudo[94115]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:53 np0005626394.novalocal systemd[1]: session-c41.scope: Deactivated successfully. Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 0c2df4e2-7e0a-4360-8d72-bd2d2774ebcb Feb 22 22:23:53 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l ade14b92-fea3-4aa9-ba78-b45c130f40b3 Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd/::1,3260. For complete SELinux messages run: sealert -l ea9e1050-6c34-4bbe-9ba8-718709b45f36 Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 3a4de79a-1b2d-4623-861b-754f96b300ad Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 57cd190c-8644-45a9-a3f4-4d23a5d9d203 Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l a94fc9c8-673c-4276-bcce-8f575d02a4d1 Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 9b8598d0-cbd4-4231-8b5f-cb4fe11e7ddb Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd/::1,3260. For complete SELinux messages run: sealert -l 8b1aa885-726e-4efd-9ba3-93a3d0108953 Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3ae7d0c4-a3f4-46f6-8b4d-cba70b94b6ee Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 841789d3-081c-464f-8cd0-d21d5ad9f2e9 Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l d943a9cc-5a3b-4bcd-bb12-ff331ec76ce5 Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l fd8f2d66-f806-4f8d-9eac-157e870e75aa Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 2e08cc42-6810-4c91-a656-17d9f6c36a74 Feb 22 22:23:53 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:23:54 np0005626394.novalocal kernel: scsi 2:0:0:0: alua: Detached Feb 22 22:23:54 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l d3f6784b-d8d9-4b70-8772-bbc1d73577ba Feb 22 22:23:54 np0005626394.novalocal iscsid[75067]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd, portal: ::1,3260] through [iface: default] is shutdown. Feb 22 22:23:54 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 22:23:54 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 684ecb61-ec83-4633-8788-9e30446fe076 Feb 22 22:23:54 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:54 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 2432dd8d-7e55-4bdf-a7cf-f7bbbdf8133e Feb 22 22:23:54 np0005626394.novalocal sudo[94160]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd iqn.1994-05.com.redhat:fffa642378aa Feb 22 22:23:54 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:54 np0005626394.novalocal systemd[1]: Started Session c42 of User root. Feb 22 22:23:54 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd. For complete SELinux messages run: sealert -l 743ab85a-a0ca-4b13-86ae-a0f03b88463e Feb 22 22:23:54 np0005626394.novalocal sudo[94160]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:54 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:54 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l 72a742af-ada3-4fac-83cd-9fdd79b408b5 Feb 22 22:23:54 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:54 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l be6d756e-2cf1-4b7a-9218-0269638290e1 Feb 22 22:23:54 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:54 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd. For complete SELinux messages run: sealert -l 10e05d22-5e71-41de-9c95-b8a939d9d534 Feb 22 22:23:54 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:23:54 np0005626394.novalocal sudo[94160]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:54 np0005626394.novalocal systemd[1]: session-c42.scope: Deactivated successfully. Feb 22 22:23:54 np0005626394.novalocal sudo[94166]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 22:23:54 np0005626394.novalocal systemd[1]: Started Session c43 of User root. Feb 22 22:23:54 np0005626394.novalocal sudo[94166]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:55 np0005626394.novalocal sudo[94166]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:55 np0005626394.novalocal systemd[1]: session-c43.scope: Deactivated successfully. Feb 22 22:23:55 np0005626394.novalocal sudo[94171]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 22:23:55 np0005626394.novalocal systemd[1]: Started Session c44 of User root. Feb 22 22:23:55 np0005626394.novalocal sudo[94171]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:55 np0005626394.novalocal sudo[94173]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 22:23:55 np0005626394.novalocal systemd[1]: Started Session c45 of User root. Feb 22 22:23:55 np0005626394.novalocal sudo[94173]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:55 np0005626394.novalocal sudo[94173]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:55 np0005626394.novalocal systemd[1]: session-c45.scope: Deactivated successfully. Feb 22 22:23:55 np0005626394.novalocal sudo[94180]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:23:55 np0005626394.novalocal systemd[1]: Started Session c46 of User root. Feb 22 22:23:55 np0005626394.novalocal sudo[94180]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:55 np0005626394.novalocal sudo[94171]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:55 np0005626394.novalocal systemd[1]: session-c44.scope: Deactivated successfully. Feb 22 22:23:55 np0005626394.novalocal sudo[94183]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-bb45d2d8-9412-48c7-806b-b476e657d8cd Feb 22 22:23:55 np0005626394.novalocal systemd[1]: Started Session c47 of User root. Feb 22 22:23:55 np0005626394.novalocal sudo[94183]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:55 np0005626394.novalocal sudo[94180]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:55 np0005626394.novalocal systemd[1]: session-c46.scope: Deactivated successfully. Feb 22 22:23:56 np0005626394.novalocal sudo[94187]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 22:23:56 np0005626394.novalocal systemd[1]: Started Session c48 of User root. Feb 22 22:23:56 np0005626394.novalocal sudo[94187]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:56 np0005626394.novalocal sudo[94187]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:56 np0005626394.novalocal systemd[1]: session-c48.scope: Deactivated successfully. Feb 22 22:23:56 np0005626394.novalocal sudo[94183]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:56 np0005626394.novalocal systemd[1]: session-c47.scope: Deactivated successfully. Feb 22 22:23:56 np0005626394.novalocal sudo[94193]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:23:56 np0005626394.novalocal systemd[1]: Started Session c49 of User root. Feb 22 22:23:56 np0005626394.novalocal sudo[94194]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 22:23:56 np0005626394.novalocal sudo[94193]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:56 np0005626394.novalocal systemd[1]: Started Session c50 of User root. Feb 22 22:23:56 np0005626394.novalocal sudo[94194]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:23:56 np0005626394.novalocal sudo[94193]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:56 np0005626394.novalocal systemd[1]: session-c49.scope: Deactivated successfully. Feb 22 22:23:56 np0005626394.novalocal sudo[94194]: pam_unix(sudo:session): session closed for user root Feb 22 22:23:56 np0005626394.novalocal systemd[1]: session-c50.scope: Deactivated successfully. Feb 22 22:24:01 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:24:01 np0005626394.novalocal sudo[94206]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-c680d175-1723-47cb-a96e-8c839fe68b12 cinder-volumes/cinder-volumes-pool Feb 22 22:24:01 np0005626394.novalocal systemd[1]: Started Session c51 of User root. Feb 22 22:24:01 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:24:01 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:24:01 np0005626394.novalocal sudo[94206]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:01 np0005626394.novalocal lvm[94218]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 22:24:01 np0005626394.novalocal lvm[94218]: VG cinder-volumes finished Feb 22 22:24:01 np0005626394.novalocal sudo[94206]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:01 np0005626394.novalocal systemd[1]: session-c51.scope: Deactivated successfully. Feb 22 22:24:02 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l c011ac97-b979-4f6c-9049-48d1b48ba256 Feb 22 22:24:02 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:02 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l e0b80030-b6a4-4333-857a-fada649b5ba1 Feb 22 22:24:02 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:02 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8ec2db56-20d1-45a5-837d-2c4e18892340 Feb 22 22:24:02 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:02 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 2e08cc42-6810-4c91-a656-17d9f6c36a74 Feb 22 22:24:02 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:02 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 5d3a76f7-0af8-4aa2-a1af-228e0f41e64c Feb 22 22:24:02 np0005626394.novalocal sudo[94233]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-c680d175-1723-47cb-a96e-8c839fe68b12 Feb 22 22:24:02 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:02 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l b0b15075-3b8c-47f3-9d0d-3651666c9890 Feb 22 22:24:02 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:02 np0005626394.novalocal systemd[1]: Started Session c52 of User root. Feb 22 22:24:02 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l fe56dbec-3b07-423e-b68e-b0d1b9d38dc8 Feb 22 22:24:02 np0005626394.novalocal sudo[94233]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:02 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:02 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 4f8affc0-c043-4328-9d6b-55c5551110bb Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 6391b337-384e-4f4e-a69b-9c6aa111eb74 Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l f04761c0-e0be-4dae-95c7-1cc6df9bbec1 Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-bqL01n. For complete SELinux messages run: sealert -l 081bab23-a408-4819-9211-c3b79b940541 Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-bqL01n. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-bqL01n file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 7c7d59a4-6ec6-4529-b9bb-ee83a0ff4f1b Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l dba2925d-62b2-4bf9-b999-020006130902 Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 509102cd-35d1-469f-8b18-315599ef66ee Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 280d0401-5c91-409d-b6fa-8d2a830ca4e4 Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 5da47dc1-eddb-4462-88e6-a7621bc30e11 Feb 22 22:24:03 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:03 np0005626394.novalocal sudo[94233]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:03 np0005626394.novalocal systemd[1]: session-c52.scope: Deactivated successfully. Feb 22 22:24:03 np0005626394.novalocal sudo[94237]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-c680d175-1723-47cb-a96e-8c839fe68b12 iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12 bX9Vi3hKetYTpPLKzFKt o9qxQrNeBnL49hSN False -p3260 -a::1 Feb 22 22:24:03 np0005626394.novalocal systemd[1]: Started Session c53 of User root. Feb 22 22:24:03 np0005626394.novalocal sudo[94237]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:03 np0005626394.novalocal sudo[94237]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:03 np0005626394.novalocal systemd[1]: session-c53.scope: Deactivated successfully. Feb 22 22:24:03 np0005626394.novalocal sudo[94243]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 22:24:03 np0005626394.novalocal systemd[1]: Started Session c54 of User root. Feb 22 22:24:03 np0005626394.novalocal sudo[94243]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:04 np0005626394.novalocal sudo[94243]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:04 np0005626394.novalocal systemd[1]: session-c54.scope: Deactivated successfully. Feb 22 22:24:04 np0005626394.novalocal sudo[94248]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 22:24:04 np0005626394.novalocal systemd[1]: Started Session c55 of User root. Feb 22 22:24:04 np0005626394.novalocal sudo[94248]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:04 np0005626394.novalocal sudo[94248]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:04 np0005626394.novalocal systemd[1]: session-c55.scope: Deactivated successfully. Feb 22 22:24:04 np0005626394.novalocal sudo[94253]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12 bX9Vi3hKetYTpPLKzFKt o9qxQrNeBnL49hSN iqn.1994-05.com.redhat:fffa642378aa Feb 22 22:24:04 np0005626394.novalocal systemd[1]: Started Session c56 of User root. Feb 22 22:24:04 np0005626394.novalocal sudo[94253]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:05 np0005626394.novalocal sudo[94253]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:05 np0005626394.novalocal systemd[1]: session-c56.scope: Deactivated successfully. Feb 22 22:24:05 np0005626394.novalocal sudo[94258]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 22:24:05 np0005626394.novalocal systemd[1]: Started Session c57 of User root. Feb 22 22:24:05 np0005626394.novalocal sudo[94258]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:05 np0005626394.novalocal sudo[94258]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:05 np0005626394.novalocal systemd[1]: session-c57.scope: Deactivated successfully. Feb 22 22:24:05 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 684ecb61-ec83-4633-8788-9e30446fe076 Feb 22 22:24:05 np0005626394.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Feb 22 22:24:05 np0005626394.novalocal iscsid[75067]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12, portal: ::1,3260] through [iface: default] is operational now Feb 22 22:24:06 np0005626394.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Feb 22 22:24:06 np0005626394.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Feb 22 22:24:06 np0005626394.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405a63e8e754ec64982afe5995b2 port group 0 rel port 1 Feb 22 22:24:06 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Feb 22 22:24:06 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Feb 22 22:24:06 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Feb 22 22:24:06 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Feb 22 22:24:06 np0005626394.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 22:24:06 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Feb 22 22:24:06 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Feb 22 22:24:06 np0005626394.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Feb 22 22:24:06 np0005626394.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Feb 22 22:24:06 np0005626394.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Feb 22 22:24:06 np0005626394.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 22:24:06 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 3a4de79a-1b2d-4623-861b-754f96b300ad Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 57cd190c-8644-45a9-a3f4-4d23a5d9d203 Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 52bff4fc-41c7-44be-a14f-db931d02a1b2 Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a8d20c9c-014b-4423-a0c6-8ce121ba79b7 Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l a94fc9c8-673c-4276-bcce-8f575d02a4d1 Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l ade14b92-fea3-4aa9-ba78-b45c130f40b3 Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l e0e594a9-40ec-4a86-a98b-cdecc620beb3 Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3ae7d0c4-a3f4-46f6-8b4d-cba70b94b6ee Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 743ab85a-a0ca-4b13-86ae-a0f03b88463e Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8a447935-1179-480a-b2d4-77367ec16caa Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 6e16c86c-0c43-4039-847f-e655b58c5f1c Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l b896e31a-710a-4c6d-8198-4ffaff4d4368 Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12/::1,3260. For complete SELinux messages run: sealert -l 01185202-11f4-4862-999f-c32ea026c402 Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12/::1,3260. For complete SELinux messages run: sealert -l ea9e1050-6c34-4bbe-9ba8-718709b45f36 Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 9b8598d0-cbd4-4231-8b5f-cb4fe11e7ddb Feb 22 22:24:06 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:07 np0005626394.novalocal sudo[94313]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Feb 22 22:24:07 np0005626394.novalocal systemd[1]: Started Session c58 of User root. Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l aeb427b8-09fb-47ed-bbec-9e0e6a2b331c Feb 22 22:24:07 np0005626394.novalocal sudo[94313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l b5c7bd43-462e-4c90-87d0-e97205c2ba7e Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l d3f6784b-d8d9-4b70-8772-bbc1d73577ba Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8ec2db56-20d1-45a5-837d-2c4e18892340 Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 0c2df4e2-7e0a-4360-8d72-bd2d2774ebcb Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 995bed1b-6669-4aaa-933d-48fb0dab1d1b Feb 22 22:24:07 np0005626394.novalocal sudo[94313]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:07 np0005626394.novalocal systemd[1]: session-c58.scope: Deactivated successfully. Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 9fe32bfa-427a-427e-a40b-60c2f5032660 Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l a1fcaf98-b2f5-414d-b46f-d7e209d58827 Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 79e78186-8846-45f2-a97f-2023e1083160 Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l a4c0d0ae-8694-49c8-b2b6-39da2d5e4210 Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 79e78186-8846-45f2-a97f-2023e1083160 Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l a4c0d0ae-8694-49c8-b2b6-39da2d5e4210 Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 0c2df4e2-7e0a-4360-8d72-bd2d2774ebcb Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l b8d2323d-fc83-465d-9e83-29f0aafa3b2b Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 90abc12a-2e2a-4120-ac09-574d38ff5825 Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5d3a76f7-0af8-4aa2-a1af-228e0f41e64c Feb 22 22:24:07 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:08 np0005626394.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 22:24:08 np0005626394.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 22 22:24:08 np0005626394.novalocal kernel: GPT:229375 != 2097151 Feb 22 22:24:08 np0005626394.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Feb 22 22:24:08 np0005626394.novalocal kernel: GPT:229375 != 2097151 Feb 22 22:24:08 np0005626394.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Feb 22 22:24:08 np0005626394.novalocal kernel: sda: sda1 sda15 Feb 22 22:24:08 np0005626394.novalocal sudo[94320]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l b0b15075-3b8c-47f3-9d0d-3651666c9890 Feb 22 22:24:08 np0005626394.novalocal systemd[1]: Started Session c59 of User root. Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:08 np0005626394.novalocal sudo[94320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 22:24:08 np0005626394.novalocal sudo[94320]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:08 np0005626394.novalocal systemd[1]: session-c59.scope: Deactivated successfully. Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 684ecb61-ec83-4633-8788-9e30446fe076 Feb 22 22:24:08 np0005626394.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l ade14b92-fea3-4aa9-ba78-b45c130f40b3 Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12/::1,3260. For complete SELinux messages run: sealert -l ea9e1050-6c34-4bbe-9ba8-718709b45f36 Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 3a4de79a-1b2d-4623-861b-754f96b300ad Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 57cd190c-8644-45a9-a3f4-4d23a5d9d203 Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l a94fc9c8-673c-4276-bcce-8f575d02a4d1 Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 9b8598d0-cbd4-4231-8b5f-cb4fe11e7ddb Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12/::1,3260. For complete SELinux messages run: sealert -l 8e360323-9113-4cb7-aec3-4d1035e3c88d Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3ae7d0c4-a3f4-46f6-8b4d-cba70b94b6ee Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 841789d3-081c-464f-8cd0-d21d5ad9f2e9 Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l d943a9cc-5a3b-4bcd-bb12-ff331ec76ce5 Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 22:24:08 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l fd8f2d66-f806-4f8d-9eac-157e870e75aa Feb 22 22:24:09 np0005626394.novalocal kernel: scsi 2:0:0:0: alua: Detached Feb 22 22:24:09 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 22:24:09 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 2e08cc42-6810-4c91-a656-17d9f6c36a74 Feb 22 22:24:09 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 22 22:24:09 np0005626394.novalocal iscsid[75067]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12, portal: ::1,3260] through [iface: default] is shutdown. Feb 22 22:24:09 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l d3f6784b-d8d9-4b70-8772-bbc1d73577ba Feb 22 22:24:09 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 22:24:09 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 2432dd8d-7e55-4bdf-a7cf-f7bbbdf8133e Feb 22 22:24:09 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:09 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12. For complete SELinux messages run: sealert -l 743ab85a-a0ca-4b13-86ae-a0f03b88463e Feb 22 22:24:09 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:09 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l 72a742af-ada3-4fac-83cd-9fdd79b408b5 Feb 22 22:24:09 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:09 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l be6d756e-2cf1-4b7a-9218-0269638290e1 Feb 22 22:24:09 np0005626394.novalocal sudo[94363]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12 iqn.1994-05.com.redhat:fffa642378aa Feb 22 22:24:09 np0005626394.novalocal systemd[1]: Started Session c60 of User root. Feb 22 22:24:09 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:09 np0005626394.novalocal sudo[94363]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:09 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12. For complete SELinux messages run: sealert -l 10e05d22-5e71-41de-9c95-b8a939d9d534 Feb 22 22:24:09 np0005626394.novalocal setroubleshoot[93865]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 22 22:24:09 np0005626394.novalocal sudo[94363]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:09 np0005626394.novalocal systemd[1]: session-c60.scope: Deactivated successfully. Feb 22 22:24:09 np0005626394.novalocal sudo[94369]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 22:24:09 np0005626394.novalocal systemd[1]: Started Session c61 of User root. Feb 22 22:24:09 np0005626394.novalocal sudo[94369]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:10 np0005626394.novalocal sudo[94369]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:10 np0005626394.novalocal systemd[1]: session-c61.scope: Deactivated successfully. Feb 22 22:24:10 np0005626394.novalocal sudo[94374]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 22:24:10 np0005626394.novalocal systemd[1]: Started Session c62 of User root. Feb 22 22:24:10 np0005626394.novalocal sudo[94374]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:10 np0005626394.novalocal sudo[94374]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:10 np0005626394.novalocal systemd[1]: session-c62.scope: Deactivated successfully. Feb 22 22:24:10 np0005626394.novalocal sudo[94379]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-c680d175-1723-47cb-a96e-8c839fe68b12 Feb 22 22:24:10 np0005626394.novalocal systemd[1]: Started Session c63 of User root. Feb 22 22:24:10 np0005626394.novalocal sudo[94379]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:11 np0005626394.novalocal sudo[94379]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:11 np0005626394.novalocal systemd[1]: session-c63.scope: Deactivated successfully. Feb 22 22:24:11 np0005626394.novalocal sudo[94385]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 22:24:11 np0005626394.novalocal systemd[1]: Started Session c64 of User root. Feb 22 22:24:11 np0005626394.novalocal sudo[94385]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:11 np0005626394.novalocal sudo[94385]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:11 np0005626394.novalocal systemd[1]: session-c64.scope: Deactivated successfully. Feb 22 22:24:19 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Deactivated successfully. Feb 22 22:24:19 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Consumed 1.217s CPU time. Feb 22 22:24:19 np0005626394.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 22:24:19 np0005626394.novalocal systemd[1]: setroubleshootd.service: Consumed 5.669s CPU time. Feb 22 22:24:55 np0005626394.novalocal sudo[94460]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 22:24:55 np0005626394.novalocal systemd[1]: Started Session c65 of User root. Feb 22 22:24:55 np0005626394.novalocal sudo[94460]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:55 np0005626394.novalocal sudo[94460]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:55 np0005626394.novalocal systemd[1]: session-c65.scope: Deactivated successfully. Feb 22 22:24:55 np0005626394.novalocal sudo[94465]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:24:55 np0005626394.novalocal systemd[1]: Started Session c66 of User root. Feb 22 22:24:55 np0005626394.novalocal sudo[94465]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:56 np0005626394.novalocal sudo[94465]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:56 np0005626394.novalocal systemd[1]: session-c66.scope: Deactivated successfully. Feb 22 22:24:56 np0005626394.novalocal sudo[94469]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 22:24:56 np0005626394.novalocal systemd[1]: Started Session c67 of User root. Feb 22 22:24:56 np0005626394.novalocal sudo[94469]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:56 np0005626394.novalocal sudo[94469]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:56 np0005626394.novalocal systemd[1]: session-c67.scope: Deactivated successfully. Feb 22 22:24:56 np0005626394.novalocal sudo[94474]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:24:56 np0005626394.novalocal systemd[1]: Started Session c68 of User root. Feb 22 22:24:56 np0005626394.novalocal sudo[94474]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:24:56 np0005626394.novalocal sudo[94474]: pam_unix(sudo:session): session closed for user root Feb 22 22:24:56 np0005626394.novalocal systemd[1]: session-c68.scope: Deactivated successfully. Feb 22 22:25:04 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:25:04 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:25:04 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:25:55 np0005626394.novalocal sudo[94560]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 22:25:55 np0005626394.novalocal systemd[1]: Started Session c69 of User root. Feb 22 22:25:55 np0005626394.novalocal sudo[94560]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:25:55 np0005626394.novalocal sudo[94560]: pam_unix(sudo:session): session closed for user root Feb 22 22:25:55 np0005626394.novalocal systemd[1]: session-c69.scope: Deactivated successfully. Feb 22 22:25:55 np0005626394.novalocal sudo[94564]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:25:55 np0005626394.novalocal systemd[1]: Started Session c70 of User root. Feb 22 22:25:55 np0005626394.novalocal sudo[94564]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:25:55 np0005626394.novalocal sudo[94564]: pam_unix(sudo:session): session closed for user root Feb 22 22:25:55 np0005626394.novalocal systemd[1]: session-c70.scope: Deactivated successfully. Feb 22 22:25:55 np0005626394.novalocal sudo[94568]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 22:25:56 np0005626394.novalocal systemd[1]: Started Session c71 of User root. Feb 22 22:25:56 np0005626394.novalocal sudo[94568]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:25:56 np0005626394.novalocal sudo[94568]: pam_unix(sudo:session): session closed for user root Feb 22 22:25:56 np0005626394.novalocal systemd[1]: session-c71.scope: Deactivated successfully. Feb 22 22:25:56 np0005626394.novalocal sudo[94573]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:25:56 np0005626394.novalocal systemd[1]: Started Session c72 of User root. Feb 22 22:25:56 np0005626394.novalocal sudo[94573]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:25:56 np0005626394.novalocal sudo[94573]: pam_unix(sudo:session): session closed for user root Feb 22 22:25:56 np0005626394.novalocal systemd[1]: session-c72.scope: Deactivated successfully. Feb 22 22:26:04 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:26:04 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:26:04 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:26:08 np0005626394.novalocal systemd[90184]: Created slice User Background Tasks Slice. Feb 22 22:26:08 np0005626394.novalocal systemd[90184]: Starting Cleanup of User's Temporary Files and Directories... Feb 22 22:26:08 np0005626394.novalocal systemd[90184]: Finished Cleanup of User's Temporary Files and Directories. Feb 22 22:26:17 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:26:17 np0005626394.novalocal systemd-rc-local-generator[94618]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:26:17 np0005626394.novalocal systemd-sysv-generator[94623]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:26:17 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:26:18 np0005626394.novalocal systemd[1]: Starting OpenStack Nova Conductor Server... Feb 22 22:26:19 np0005626394.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 22:26:20 np0005626394.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 22:26:20 np0005626394.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service. Feb 22 22:26:21 np0005626394.novalocal systemd[1]: Started OpenStack Nova Conductor Server. Feb 22 22:26:21 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:26:21 np0005626394.novalocal systemd-rc-local-generator[94676]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:26:21 np0005626394.novalocal systemd-sysv-generator[94680]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:26:21 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:26:21 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 275198c9-a7f7-4a67-b314-b78e18920310 Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 8bf83ca4-7703-4e95-9764-ef91f0ccf575 Feb 22 22:26:22 np0005626394.novalocal systemd-rc-local-generator[94715]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:22 np0005626394.novalocal systemd-sysv-generator[94720]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l e0504a44-334c-4da5-8dfd-33a180ca8cd5 Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 5a075a70-c1c5-4473-a9ea-16c3b3081b7d Feb 22 22:26:22 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l e1a94eb3-0acd-4649-940c-33fd66b55cec Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 4eafe570-4fee-49ae-ba75-2e75b346bed8 Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 5ff0ab81-a6cc-4a86-9834-4e9b96df84d7 Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 71d48534-df65-483b-9dea-a0b62d707738 Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l fd6fc696-7f23-4bdc-ab62-9e3f38cdfefb Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 854392fd-1371-454a-875b-a93fb2cc6abe Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 11630801-b184-4092-907a-a14196cd593b Feb 22 22:26:22 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:22 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:26:22 np0005626394.novalocal systemd-sysv-generator[94767]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:26:22 np0005626394.novalocal systemd-rc-local-generator[94763]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:26:22 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:26:22 np0005626394.novalocal systemd[1]: Starting OpenStack Nova Compute Server... Feb 22 22:26:28 np0005626394.novalocal systemd[1]: Started OpenStack Nova Compute Server. Feb 22 22:26:28 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:26:28 np0005626394.novalocal systemd-sysv-generator[94816]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:26:28 np0005626394.novalocal systemd-rc-local-generator[94813]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:26:28 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:26:28 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:26:28 np0005626394.novalocal systemd-sysv-generator[94852]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:26:28 np0005626394.novalocal systemd-rc-local-generator[94848]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:26:28 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:26:28 np0005626394.novalocal systemd[1]: Starting libvirt QEMU daemon... Feb 22 22:26:28 np0005626394.novalocal systemd[1]: Started libvirt QEMU daemon. Feb 22 22:26:29 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:26:29 np0005626394.novalocal systemd-rc-local-generator[94940]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:26:29 np0005626394.novalocal systemd-sysv-generator[94945]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:26:29 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:26:29 np0005626394.novalocal systemd[1]: Starting OpenStack Nova Scheduler Server... Feb 22 22:26:30 np0005626394.novalocal systemd[1]: Listening on libvirt nodedev daemon admin socket. Feb 22 22:26:30 np0005626394.novalocal systemd[1]: Listening on libvirt nodedev daemon read-only socket. Feb 22 22:26:30 np0005626394.novalocal systemd[1]: Starting libvirt nodedev daemon... Feb 22 22:26:30 np0005626394.novalocal systemd[1]: Started libvirt nodedev daemon. Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 275198c9-a7f7-4a67-b314-b78e18920310 Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 8bf83ca4-7703-4e95-9764-ef91f0ccf575 Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l e0504a44-334c-4da5-8dfd-33a180ca8cd5 Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 5a075a70-c1c5-4473-a9ea-16c3b3081b7d Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l e1a94eb3-0acd-4649-940c-33fd66b55cec Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 4eafe570-4fee-49ae-ba75-2e75b346bed8 Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 5ff0ab81-a6cc-4a86-9834-4e9b96df84d7 Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 71d48534-df65-483b-9dea-a0b62d707738 Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l fd6fc696-7f23-4bdc-ab62-9e3f38cdfefb Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 854392fd-1371-454a-875b-a93fb2cc6abe Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 11630801-b184-4092-907a-a14196cd593b Feb 22 22:26:31 np0005626394.novalocal setroubleshoot[94638]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 22 22:26:31 np0005626394.novalocal systemd[1]: Started OpenStack Nova Scheduler Server. Feb 22 22:26:31 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:26:31 np0005626394.novalocal systemd-rc-local-generator[95022]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:26:31 np0005626394.novalocal systemd-sysv-generator[95030]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:26:31 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:26:31 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:26:32 np0005626394.novalocal systemd-rc-local-generator[95058]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:26:32 np0005626394.novalocal systemd-sysv-generator[95062]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:26:32 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:26:41 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Deactivated successfully. Feb 22 22:26:41 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Consumed 1.120s CPU time. Feb 22 22:26:41 np0005626394.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 22:26:41 np0005626394.novalocal systemd[1]: setroubleshootd.service: Consumed 1.916s CPU time. Feb 22 22:26:55 np0005626394.novalocal sudo[95124]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 22:26:55 np0005626394.novalocal systemd[1]: Started Session c73 of User root. Feb 22 22:26:55 np0005626394.novalocal sudo[95124]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:26:55 np0005626394.novalocal sudo[95124]: pam_unix(sudo:session): session closed for user root Feb 22 22:26:55 np0005626394.novalocal systemd[1]: session-c73.scope: Deactivated successfully. Feb 22 22:26:55 np0005626394.novalocal sudo[95128]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:26:55 np0005626394.novalocal systemd[1]: Started Session c74 of User root. Feb 22 22:26:55 np0005626394.novalocal sudo[95128]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:26:56 np0005626394.novalocal sudo[95128]: pam_unix(sudo:session): session closed for user root Feb 22 22:26:56 np0005626394.novalocal systemd[1]: session-c74.scope: Deactivated successfully. Feb 22 22:26:56 np0005626394.novalocal sudo[95132]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 22:26:56 np0005626394.novalocal systemd[1]: Started Session c75 of User root. Feb 22 22:26:56 np0005626394.novalocal sudo[95132]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:26:56 np0005626394.novalocal sudo[95132]: pam_unix(sudo:session): session closed for user root Feb 22 22:26:56 np0005626394.novalocal systemd[1]: session-c75.scope: Deactivated successfully. Feb 22 22:26:56 np0005626394.novalocal sudo[95136]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:26:56 np0005626394.novalocal systemd[1]: Started Session c76 of User root. Feb 22 22:26:56 np0005626394.novalocal sudo[95136]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:26:56 np0005626394.novalocal sudo[95136]: pam_unix(sudo:session): session closed for user root Feb 22 22:26:56 np0005626394.novalocal systemd[1]: session-c76.scope: Deactivated successfully. Feb 22 22:27:02 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:27:02 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:27:02 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:27:06 np0005626394.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 22:27:07 np0005626394.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 22:27:07 np0005626394.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service. Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 469c8fdc-91d2-491f-9ec9-1438c4a8ba84 Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l bd603f47-0c58-405e-ad0d-2a636b456f4a Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). For complete SELinux messages run: sealert -l 7858807a-b16a-4e55-b376-249a6ef174ab Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1': Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1. For complete SELinux messages run: sealert -l 8905e584-354e-46f2-8e97-3625e4ceec4f Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the 24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1. For complete SELinux messages run: sealert -l 93ed94a4-7730-4b05-9dd3-59de175728d7 Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1. For complete SELinux messages run: sealert -l a71753cd-c36f-4e61-88a7-aa0afefca840 Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l e6683825-cde0-4487-aab9-270e5802bda4 Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l d4c0906c-2df0-4dba-9691-0a4a838ced08 Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 2d5fd99a-2bf5-412b-8202-12e262804778 Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/sbin/httpd from read access on the file 24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1. For complete SELinux messages run: sealert -l 51c25e93-a96d-4408-a114-8a6d089c0aa4 Feb 22 22:27:09 np0005626394.novalocal setroubleshoot[95151]: SELinux is preventing /usr/sbin/httpd from read access on the file 24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 24aa97c15652eb72271a19c9354f080c5c573454d3ba35f95bcbee66435b40d1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 22:27:18 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:27:18 np0005626394.novalocal systemd-sysv-generator[95206]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:27:18 np0005626394.novalocal systemd-rc-local-generator[95203]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:27:18 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:27:18 np0005626394.novalocal systemd[1]: Started OpenStack Octavia Worker service. Feb 22 22:27:18 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:27:18 np0005626394.novalocal systemd-sysv-generator[95246]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:27:18 np0005626394.novalocal systemd-rc-local-generator[95243]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:27:18 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:27:18 np0005626394.novalocal systemd[1]: Reloading. Feb 22 22:27:19 np0005626394.novalocal systemd-sysv-generator[95282]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 22:27:19 np0005626394.novalocal systemd-rc-local-generator[95279]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 22:27:19 np0005626394.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 22:27:19 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Deactivated successfully. Feb 22 22:27:19 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Consumed 1.112s CPU time. Feb 22 22:27:19 np0005626394.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 22:27:19 np0005626394.novalocal systemd[1]: setroubleshootd.service: Consumed 1.430s CPU time. Feb 22 22:27:33 np0005626394.novalocal runuser[95467]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:27:33 np0005626394.novalocal runuser[95467]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:27:33 np0005626394.novalocal runuser[95520]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:27:34 np0005626394.novalocal runuser[95520]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:27:34 np0005626394.novalocal runuser[95574]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:27:35 np0005626394.novalocal runuser[95574]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:27:55 np0005626394.novalocal sudo[95974]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 22:27:55 np0005626394.novalocal systemd[1]: Started Session c77 of User root. Feb 22 22:27:55 np0005626394.novalocal sudo[95974]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:27:55 np0005626394.novalocal sudo[95974]: pam_unix(sudo:session): session closed for user root Feb 22 22:27:55 np0005626394.novalocal systemd[1]: session-c77.scope: Deactivated successfully. Feb 22 22:27:55 np0005626394.novalocal sudo[95978]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:27:55 np0005626394.novalocal systemd[1]: Started Session c78 of User root. Feb 22 22:27:55 np0005626394.novalocal sudo[95978]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:27:55 np0005626394.novalocal sudo[95978]: pam_unix(sudo:session): session closed for user root Feb 22 22:27:55 np0005626394.novalocal systemd[1]: session-c78.scope: Deactivated successfully. Feb 22 22:27:56 np0005626394.novalocal sudo[95982]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 22:27:56 np0005626394.novalocal systemd[1]: Started Session c79 of User root. Feb 22 22:27:56 np0005626394.novalocal sudo[95982]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:27:56 np0005626394.novalocal sudo[95982]: pam_unix(sudo:session): session closed for user root Feb 22 22:27:56 np0005626394.novalocal systemd[1]: session-c79.scope: Deactivated successfully. Feb 22 22:27:56 np0005626394.novalocal sudo[95987]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:27:56 np0005626394.novalocal systemd[1]: Started Session c80 of User root. Feb 22 22:27:56 np0005626394.novalocal sudo[95987]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:27:56 np0005626394.novalocal sudo[95987]: pam_unix(sudo:session): session closed for user root Feb 22 22:27:56 np0005626394.novalocal systemd[1]: session-c80.scope: Deactivated successfully. Feb 22 22:27:57 np0005626394.novalocal systemd[1]: Stopping Redis persistent key-value database... Feb 22 22:27:57 np0005626394.novalocal redis-shutdown[96015]: Warning: Using a password with '-a' or '-u' option on the command line interface may not be safe. Feb 22 22:27:57 np0005626394.novalocal systemd[1]: redis.service: Deactivated successfully. Feb 22 22:27:57 np0005626394.novalocal systemd[1]: Stopped Redis persistent key-value database. Feb 22 22:27:57 np0005626394.novalocal systemd[1]: Starting Redis persistent key-value database... Feb 22 22:27:57 np0005626394.novalocal systemd[1]: Started Redis persistent key-value database. Feb 22 22:27:57 np0005626394.novalocal systemd[1]: Stopping Redis Sentinel... Feb 22 22:27:57 np0005626394.novalocal redis-shutdown[96048]: Warning: Using a password with '-a' or '-u' option on the command line interface may not be safe. Feb 22 22:27:57 np0005626394.novalocal redis-shutdown[96048]: Could not connect to Redis at ::1:0: Connection refused Feb 22 22:27:57 np0005626394.novalocal systemd[1]: redis-sentinel.service: Control process exited, code=exited, status=1/FAILURE Feb 22 22:27:57 np0005626394.novalocal systemd[1]: redis-sentinel.service: Failed with result 'exit-code'. Feb 22 22:27:57 np0005626394.novalocal systemd[1]: Stopped Redis Sentinel. Feb 22 22:27:57 np0005626394.novalocal systemd[1]: redis-sentinel.service: Consumed 1.164s CPU time, 11.0M memory peak. Feb 22 22:27:57 np0005626394.novalocal systemd[1]: Starting Redis Sentinel... Feb 22 22:27:57 np0005626394.novalocal systemd[1]: Started Redis Sentinel. Feb 22 22:28:04 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:28:04 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:28:04 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:28:17 np0005626394.novalocal crontab[96123]: (root) LIST (root) Feb 22 22:28:17 np0005626394.novalocal crontab[96124]: (root) LIST (keystone) Feb 22 22:28:17 np0005626394.novalocal crontab[96125]: (root) LIST (cinder) Feb 22 22:28:17 np0005626394.novalocal crontab[96126]: (root) LIST (glance) Feb 22 22:28:17 np0005626394.novalocal crontab[96127]: (root) LIST (nova) Feb 22 22:28:17 np0005626394.novalocal crontab[96128]: (root) LIST (manila) Feb 22 22:28:20 np0005626394.novalocal runuser[96134]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:21 np0005626394.novalocal runuser[96134]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:21 np0005626394.novalocal runuser[96188]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:21 np0005626394.novalocal runuser[96188]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:21 np0005626394.novalocal runuser[96240]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:22 np0005626394.novalocal runuser[96240]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:22 np0005626394.novalocal runuser[96294]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:23 np0005626394.novalocal runuser[96294]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:23 np0005626394.novalocal runuser[96346]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:23 np0005626394.novalocal runuser[96346]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:23 np0005626394.novalocal runuser[96398]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:24 np0005626394.novalocal runuser[96398]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:24 np0005626394.novalocal runuser[96450]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:25 np0005626394.novalocal runuser[96450]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:25 np0005626394.novalocal runuser[96504]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:25 np0005626394.novalocal runuser[96504]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:25 np0005626394.novalocal runuser[96556]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:26 np0005626394.novalocal runuser[96556]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:26 np0005626394.novalocal runuser[96608]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:27 np0005626394.novalocal runuser[96608]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:27 np0005626394.novalocal runuser[96672]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:28 np0005626394.novalocal runuser[96672]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:28 np0005626394.novalocal runuser[96724]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:28 np0005626394.novalocal runuser[96724]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:29 np0005626394.novalocal runuser[96778]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:29 np0005626394.novalocal runuser[96778]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:29 np0005626394.novalocal runuser[96830]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:30 np0005626394.novalocal runuser[96830]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:30 np0005626394.novalocal runuser[96888]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:31 np0005626394.novalocal runuser[96888]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:31 np0005626394.novalocal runuser[96941]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:31 np0005626394.novalocal runuser[96941]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:33 np0005626394.novalocal virtqemud[94888]: libvirt version: 11.10.0, package: 4.el9 (builder@centos.org, 2026-01-29-15:25:17, ) Feb 22 22:28:33 np0005626394.novalocal virtqemud[94888]: hostname: np0005626394.novalocal Feb 22 22:28:33 np0005626394.novalocal virtqemud[94888]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 22 22:28:33 np0005626394.novalocal virtqemud[94888]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 22 22:28:33 np0005626394.novalocal runuser[97025]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:34 np0005626394.novalocal runuser[97025]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:34 np0005626394.novalocal runuser[97077]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:35 np0005626394.novalocal runuser[97077]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:35 np0005626394.novalocal runuser[97137]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:36 np0005626394.novalocal runuser[97137]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:36 np0005626394.novalocal runuser[97190]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 22:28:36 np0005626394.novalocal runuser[97190]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 22:28:55 np0005626394.novalocal sudo[97304]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 22:28:55 np0005626394.novalocal systemd[1]: Started Session c81 of User root. Feb 22 22:28:55 np0005626394.novalocal sudo[97304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:28:55 np0005626394.novalocal sudo[97304]: pam_unix(sudo:session): session closed for user root Feb 22 22:28:55 np0005626394.novalocal systemd[1]: session-c81.scope: Deactivated successfully. Feb 22 22:28:55 np0005626394.novalocal sudo[97308]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:28:55 np0005626394.novalocal systemd[1]: Started Session c82 of User root. Feb 22 22:28:55 np0005626394.novalocal sudo[97308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:28:56 np0005626394.novalocal sudo[97308]: pam_unix(sudo:session): session closed for user root Feb 22 22:28:56 np0005626394.novalocal systemd[1]: session-c82.scope: Deactivated successfully. Feb 22 22:28:56 np0005626394.novalocal sudo[97312]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 22:28:56 np0005626394.novalocal systemd[1]: Started Session c83 of User root. Feb 22 22:28:56 np0005626394.novalocal sudo[97312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:28:56 np0005626394.novalocal sudo[97312]: pam_unix(sudo:session): session closed for user root Feb 22 22:28:56 np0005626394.novalocal systemd[1]: session-c83.scope: Deactivated successfully. Feb 22 22:28:56 np0005626394.novalocal sudo[97316]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:28:56 np0005626394.novalocal systemd[1]: Started Session c84 of User root. Feb 22 22:28:56 np0005626394.novalocal sudo[97316]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:28:56 np0005626394.novalocal sudo[97316]: pam_unix(sudo:session): session closed for user root Feb 22 22:28:56 np0005626394.novalocal systemd[1]: session-c84.scope: Deactivated successfully. Feb 22 22:29:05 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:29:05 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:29:05 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:29:19 np0005626394.novalocal sshd-session[97339]: Invalid user RPM from 80.94.95.115 port 60604 Feb 22 22:29:19 np0005626394.novalocal sshd-session[97339]: Connection closed by invalid user RPM 80.94.95.115 port 60604 [preauth] Feb 22 22:29:55 np0005626394.novalocal sudo[97409]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 22:29:55 np0005626394.novalocal systemd[1]: Started Session c85 of User root. Feb 22 22:29:55 np0005626394.novalocal sudo[97409]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:29:55 np0005626394.novalocal sudo[97409]: pam_unix(sudo:session): session closed for user root Feb 22 22:29:55 np0005626394.novalocal systemd[1]: session-c85.scope: Deactivated successfully. Feb 22 22:29:55 np0005626394.novalocal sudo[97413]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:29:55 np0005626394.novalocal systemd[1]: Started Session c86 of User root. Feb 22 22:29:55 np0005626394.novalocal sudo[97413]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:29:56 np0005626394.novalocal sudo[97413]: pam_unix(sudo:session): session closed for user root Feb 22 22:29:56 np0005626394.novalocal systemd[1]: session-c86.scope: Deactivated successfully. Feb 22 22:29:56 np0005626394.novalocal sudo[97418]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 22:29:56 np0005626394.novalocal systemd[1]: Started Session c87 of User root. Feb 22 22:29:56 np0005626394.novalocal sudo[97418]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:29:56 np0005626394.novalocal sudo[97418]: pam_unix(sudo:session): session closed for user root Feb 22 22:29:56 np0005626394.novalocal systemd[1]: session-c87.scope: Deactivated successfully. Feb 22 22:29:56 np0005626394.novalocal sudo[97422]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:29:56 np0005626394.novalocal systemd[1]: Started Session c88 of User root. Feb 22 22:29:56 np0005626394.novalocal sudo[97422]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:29:56 np0005626394.novalocal sudo[97422]: pam_unix(sudo:session): session closed for user root Feb 22 22:29:56 np0005626394.novalocal systemd[1]: session-c88.scope: Deactivated successfully. Feb 22 22:30:00 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:30:00 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:30:00 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:30:01 np0005626394.novalocal systemd[1]: Created slice User Slice of UID 161. Feb 22 22:30:01 np0005626394.novalocal systemd[1]: Starting User Runtime Directory /run/user/161... Feb 22 22:30:01 np0005626394.novalocal systemd[1]: Created slice User Slice of UID 163. Feb 22 22:30:01 np0005626394.novalocal systemd[1]: Starting User Runtime Directory /run/user/163... Feb 22 22:30:01 np0005626394.novalocal systemd[1]: Finished User Runtime Directory /run/user/161. Feb 22 22:30:01 np0005626394.novalocal systemd[1]: Starting User Manager for UID 161... Feb 22 22:30:01 np0005626394.novalocal systemd[1]: Finished User Runtime Directory /run/user/163. Feb 22 22:30:01 np0005626394.novalocal systemd[1]: Starting User Manager for UID 163... Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: pam_unix(systemd-user:session): session opened for user glance(uid=161) by glance(uid=0) Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: pam_unix(systemd-user:session): session opened for user keystone(uid=163) by keystone(uid=0) Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Queued start job for default target Main User Target. Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Queued start job for default target Main User Target. Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Created slice User Application Slice. Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Created slice User Application Slice. Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Started Daily Cleanup of User's Temporary Directories. Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Reached target Paths. Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Reached target Timers. Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Started Daily Cleanup of User's Temporary Directories. Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Reached target Paths. Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Reached target Timers. Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Starting D-Bus User Message Bus Socket... Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Starting D-Bus User Message Bus Socket... Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Listening on PipeWire PulseAudio. Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Listening on PipeWire PulseAudio. Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Listening on PipeWire Multimedia System Sockets. Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Listening on PipeWire Multimedia System Sockets. Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Starting Create User's Volatile Files and Directories... Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Starting Create User's Volatile Files and Directories... Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Finished Create User's Volatile Files and Directories. Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Finished Create User's Volatile Files and Directories. Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Listening on D-Bus User Message Bus Socket. Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Reached target Sockets. Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Listening on D-Bus User Message Bus Socket. Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Reached target Sockets. Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Reached target Basic System. Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Reached target Basic System. Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Reached target Main User Target. Feb 22 22:30:01 np0005626394.novalocal systemd[97445]: Startup finished in 238ms. Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Reached target Main User Target. Feb 22 22:30:01 np0005626394.novalocal systemd[97444]: Startup finished in 240ms. Feb 22 22:30:01 np0005626394.novalocal systemd[1]: Started User Manager for UID 163. Feb 22 22:30:01 np0005626394.novalocal systemd[1]: Started User Manager for UID 161. Feb 22 22:30:01 np0005626394.novalocal systemd[1]: Started Session 5 of User keystone. Feb 22 22:30:01 np0005626394.novalocal systemd[1]: Started Session 6 of User glance. Feb 22 22:30:01 np0005626394.novalocal CROND[97464]: (keystone) CMD (keystone-manage fernet_rotate) Feb 22 22:30:01 np0005626394.novalocal CROND[97465]: (glance) CMD (glance-cache-pruner) Feb 22 22:30:02 np0005626394.novalocal CROND[97438]: (glance) CMDOUT (2026-02-22 22:30:02.481 97465 INFO glance.image_cache [-] Image cache loaded driver 'centralized_db'.) Feb 22 22:30:02 np0005626394.novalocal CROND[97438]: (glance) CMDOUT (2026-02-22 22:30:02.805 97465 DEBUG glance.image_cache [None req-da14b172-1c61-4160-abb7-e7cdf454cdf9 - - - - - -] Image cache has free space, skipping prune... prune /usr/lib/python3.9/site-packages/glance/image_cache/__init__.py:291) Feb 22 22:30:02 np0005626394.novalocal CROND[97438]: (glance) CMDEND (glance-cache-pruner) Feb 22 22:30:02 np0005626394.novalocal systemd[1]: session-6.scope: Deactivated successfully. Feb 22 22:30:02 np0005626394.novalocal systemd[1]: session-6.scope: Consumed 1.358s CPU time. Feb 22 22:30:03 np0005626394.novalocal CROND[97439]: (keystone) CMDEND (keystone-manage fernet_rotate) Feb 22 22:30:03 np0005626394.novalocal systemd[1]: session-5.scope: Deactivated successfully. Feb 22 22:30:03 np0005626394.novalocal systemd[1]: session-5.scope: Consumed 1.905s CPU time. Feb 22 22:30:11 np0005626394.novalocal sudo[54921]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:12 np0005626394.novalocal sudo[98061]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-grjoakwhkrkgostgjzizayvftbysbrhu ; WORKSPACE=/var/log/weirdo-project /usr/bin/python3' Feb 22 22:30:12 np0005626394.novalocal sudo[98061]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:30:12 np0005626394.novalocal python3[98063]: ansible-command Invoked with chdir=/tmp/puppet-openstack creates=/var/log/weirdo-project/logs _raw_params=./copy_logs.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None removes=None stdin=None Feb 22 22:30:12 np0005626394.novalocal sudo[98186]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ceph /var/log/weirdo-project/logs/etc/ Feb 22 22:30:12 np0005626394.novalocal sudo[98186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:12 np0005626394.novalocal sudo[98186]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:12 np0005626394.novalocal sudo[98189]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/cinder /var/log/weirdo-project/logs/etc/ Feb 22 22:30:12 np0005626394.novalocal sudo[98189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:12 np0005626394.novalocal sudo[98189]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:12 np0005626394.novalocal sudo[98192]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/cinder /var/log/weirdo-project/logs Feb 22 22:30:12 np0005626394.novalocal sudo[98192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:12 np0005626394.novalocal sudo[98192]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:12 np0005626394.novalocal sudo[98195]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/glance /var/log/weirdo-project/logs/etc/ Feb 22 22:30:12 np0005626394.novalocal sudo[98195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:12 np0005626394.novalocal sudo[98195]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:12 np0005626394.novalocal sudo[98198]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/glance /var/log/weirdo-project/logs Feb 22 22:30:12 np0005626394.novalocal sudo[98198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:12 np0005626394.novalocal sudo[98198]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:12 np0005626394.novalocal sudo[98201]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/horizon /var/log/weirdo-project/logs Feb 22 22:30:12 np0005626394.novalocal sudo[98201]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:12 np0005626394.novalocal sudo[98201]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:12 np0005626394.novalocal sudo[98204]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/keystone /var/log/weirdo-project/logs/etc/ Feb 22 22:30:12 np0005626394.novalocal sudo[98204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:12 np0005626394.novalocal sudo[98204]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:12 np0005626394.novalocal sudo[98207]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/keystone /var/log/weirdo-project/logs Feb 22 22:30:12 np0005626394.novalocal sudo[98207]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:12 np0005626394.novalocal sudo[98207]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:12 np0005626394.novalocal sudo[98210]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/manila /var/log/weirdo-project/logs/etc/ Feb 22 22:30:12 np0005626394.novalocal sudo[98210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:12 np0005626394.novalocal sudo[98210]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:12 np0005626394.novalocal sudo[98213]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/manila /var/log/weirdo-project/logs Feb 22 22:30:12 np0005626394.novalocal sudo[98213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:12 np0005626394.novalocal sudo[98213]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:12 np0005626394.novalocal sudo[98216]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/neutron /var/log/weirdo-project/logs/etc/ Feb 22 22:30:12 np0005626394.novalocal sudo[98216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:12 np0005626394.novalocal sudo[98216]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:12 np0005626394.novalocal sudo[98219]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/neutron /var/log/weirdo-project/logs Feb 22 22:30:12 np0005626394.novalocal sudo[98219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:12 np0005626394.novalocal sudo[98219]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:12 np0005626394.novalocal sudo[98222]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/nova /var/log/weirdo-project/logs/etc/ Feb 22 22:30:12 np0005626394.novalocal sudo[98222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:12 np0005626394.novalocal sudo[98222]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:12 np0005626394.novalocal sudo[98225]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/nova /var/log/weirdo-project/logs Feb 22 22:30:12 np0005626394.novalocal sudo[98225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:12 np0005626394.novalocal sudo[98225]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98228]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/octavia /var/log/weirdo-project/logs/etc/ Feb 22 22:30:13 np0005626394.novalocal sudo[98228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal systemd[1]: Stopping User Manager for UID 161... Feb 22 22:30:13 np0005626394.novalocal systemd[97444]: Activating special unit Exit the Session... Feb 22 22:30:13 np0005626394.novalocal systemd[97444]: Stopped target Main User Target. Feb 22 22:30:13 np0005626394.novalocal systemd[97444]: Stopped target Basic System. Feb 22 22:30:13 np0005626394.novalocal systemd[97444]: Stopped target Paths. Feb 22 22:30:13 np0005626394.novalocal systemd[97444]: Stopped target Sockets. Feb 22 22:30:13 np0005626394.novalocal systemd[97444]: Stopped target Timers. Feb 22 22:30:13 np0005626394.novalocal systemd[97444]: Stopped Daily Cleanup of User's Temporary Directories. Feb 22 22:30:13 np0005626394.novalocal systemd[97444]: Closed D-Bus User Message Bus Socket. Feb 22 22:30:13 np0005626394.novalocal systemd[97444]: Closed PipeWire PulseAudio. Feb 22 22:30:13 np0005626394.novalocal systemd[97444]: Closed PipeWire Multimedia System Sockets. Feb 22 22:30:13 np0005626394.novalocal systemd[97444]: Stopped Create User's Volatile Files and Directories. Feb 22 22:30:13 np0005626394.novalocal systemd[97444]: Removed slice User Application Slice. Feb 22 22:30:13 np0005626394.novalocal systemd[97444]: Reached target Shutdown. Feb 22 22:30:13 np0005626394.novalocal systemd[97444]: Finished Exit the Session. Feb 22 22:30:13 np0005626394.novalocal systemd[97444]: Reached target Exit the Session. Feb 22 22:30:13 np0005626394.novalocal sudo[98228]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal systemd[1]: user@161.service: Deactivated successfully. Feb 22 22:30:13 np0005626394.novalocal systemd[1]: Stopped User Manager for UID 161. Feb 22 22:30:13 np0005626394.novalocal systemd[1]: Stopping User Runtime Directory /run/user/161... Feb 22 22:30:13 np0005626394.novalocal sudo[98231]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/octavia /var/log/weirdo-project/logs Feb 22 22:30:13 np0005626394.novalocal systemd[1]: run-user-161.mount: Deactivated successfully. Feb 22 22:30:13 np0005626394.novalocal systemd[1]: user-runtime-dir@161.service: Deactivated successfully. Feb 22 22:30:13 np0005626394.novalocal systemd[1]: Stopped User Runtime Directory /run/user/161. Feb 22 22:30:13 np0005626394.novalocal systemd[1]: Removed slice User Slice of UID 161. Feb 22 22:30:13 np0005626394.novalocal systemd[1]: user-161.slice: Consumed 1.616s CPU time. Feb 22 22:30:13 np0005626394.novalocal sudo[98231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98231]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98237]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ovn /var/log/weirdo-project/logs/etc/ Feb 22 22:30:13 np0005626394.novalocal sudo[98237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98237]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98240]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/ovn /var/log/weirdo-project/logs Feb 22 22:30:13 np0005626394.novalocal sudo[98240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98240]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98243]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/placement /var/log/weirdo-project/logs/etc/ Feb 22 22:30:13 np0005626394.novalocal sudo[98243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98243]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98246]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/placement /var/log/weirdo-project/logs Feb 22 22:30:13 np0005626394.novalocal sudo[98246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98246]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98249]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/tempest /var/log/weirdo-project/logs/etc/ Feb 22 22:30:13 np0005626394.novalocal sudo[98249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98249]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98252]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/puppet/puppet.conf /var/log/weirdo-project/logs/ Feb 22 22:30:13 np0005626394.novalocal sudo[98252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98252]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98256]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/journalctl --no-pager Feb 22 22:30:13 np0005626394.novalocal sudo[98256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98256]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98259]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rsyslog.d /var/log/weirdo-project/logs/etc/ Feb 22 22:30:13 np0005626394.novalocal sudo[98259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98259]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98262]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyslog.conf /var/log/weirdo-project/logs/etc/ Feb 22 22:30:13 np0005626394.novalocal sudo[98262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98262]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98265]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/network-scripts /var/log/weirdo-project/logs/etc/sysconfig/ Feb 22 22:30:13 np0005626394.novalocal sudo[98265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98265]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98268]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rabbitmq /var/log/weirdo-project/logs/etc/ Feb 22 22:30:13 np0005626394.novalocal sudo[98268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98268]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98271]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/rabbitmq /var/log/weirdo-project/logs Feb 22 22:30:13 np0005626394.novalocal sudo[98271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98271]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98274]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/my.cnf /var/log/weirdo-project/logs/etc/ Feb 22 22:30:13 np0005626394.novalocal sudo[98274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98274]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98277]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/my.cnf.d /var/log/weirdo-project/logs/etc/ Feb 22 22:30:13 np0005626394.novalocal sudo[98277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98277]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98280]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/mariadb /var/log/weirdo-project/logs/ Feb 22 22:30:13 np0005626394.novalocal sudo[98280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98280]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98283]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/iscsi /var/log/weirdo-project/logs/etc/ Feb 22 22:30:13 np0005626394.novalocal sudo[98283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98283]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98286]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dstat.log /var/log/weirdo-project/logs/ Feb 22 22:30:13 np0005626394.novalocal sudo[98286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98286]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98289]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iostat.log /var/log/weirdo-project/logs/ Feb 22 22:30:13 np0005626394.novalocal sudo[98289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98289]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98292]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iotop.log /var/log/weirdo-project/logs/ Feb 22 22:30:13 np0005626394.novalocal sudo[98292]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98292]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98295]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/libvirt /var/log/weirdo-project/logs/ Feb 22 22:30:13 np0005626394.novalocal sudo[98295]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98295]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98298]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/virsh net-list --all Feb 22 22:30:13 np0005626394.novalocal sudo[98298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal virtqemud[94888]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 22 22:30:13 np0005626394.novalocal sudo[98298]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal systemd[1]: Stopping User Manager for UID 163... Feb 22 22:30:13 np0005626394.novalocal systemd[97445]: Activating special unit Exit the Session... Feb 22 22:30:13 np0005626394.novalocal systemd[97445]: Stopped target Main User Target. Feb 22 22:30:13 np0005626394.novalocal systemd[97445]: Stopped target Basic System. Feb 22 22:30:13 np0005626394.novalocal systemd[97445]: Stopped target Paths. Feb 22 22:30:13 np0005626394.novalocal systemd[97445]: Stopped target Sockets. Feb 22 22:30:13 np0005626394.novalocal systemd[97445]: Stopped target Timers. Feb 22 22:30:13 np0005626394.novalocal systemd[97445]: Stopped Daily Cleanup of User's Temporary Directories. Feb 22 22:30:13 np0005626394.novalocal systemd[97445]: Closed D-Bus User Message Bus Socket. Feb 22 22:30:13 np0005626394.novalocal systemd[97445]: Closed PipeWire PulseAudio. Feb 22 22:30:13 np0005626394.novalocal systemd[97445]: Closed PipeWire Multimedia System Sockets. Feb 22 22:30:13 np0005626394.novalocal systemd[97445]: Stopped Create User's Volatile Files and Directories. Feb 22 22:30:13 np0005626394.novalocal systemd[97445]: Removed slice User Application Slice. Feb 22 22:30:13 np0005626394.novalocal systemd[97445]: Reached target Shutdown. Feb 22 22:30:13 np0005626394.novalocal systemd[97445]: Finished Exit the Session. Feb 22 22:30:13 np0005626394.novalocal systemd[97445]: Reached target Exit the Session. Feb 22 22:30:13 np0005626394.novalocal sudo[98302]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/libvirt /var/log/weirdo-project/logs/etc/ Feb 22 22:30:13 np0005626394.novalocal systemd[1]: user@163.service: Deactivated successfully. Feb 22 22:30:13 np0005626394.novalocal systemd[1]: Stopped User Manager for UID 163. Feb 22 22:30:13 np0005626394.novalocal systemd[1]: Stopping User Runtime Directory /run/user/163... Feb 22 22:30:13 np0005626394.novalocal sudo[98302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal systemd[1]: run-user-163.mount: Deactivated successfully. Feb 22 22:30:13 np0005626394.novalocal sudo[98302]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal systemd[1]: user-runtime-dir@163.service: Deactivated successfully. Feb 22 22:30:13 np0005626394.novalocal systemd[1]: Stopped User Runtime Directory /run/user/163. Feb 22 22:30:13 np0005626394.novalocal systemd[1]: Removed slice User Slice of UID 163. Feb 22 22:30:13 np0005626394.novalocal systemd[1]: user-163.slice: Consumed 2.164s CPU time. Feb 22 22:30:13 np0005626394.novalocal sudo[98307]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig Feb 22 22:30:13 np0005626394.novalocal sudo[98307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98307]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98310]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openvswitch /var/log/weirdo-project/logs/etc/ Feb 22 22:30:13 np0005626394.novalocal sudo[98310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98310]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98313]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/openvswitch /var/log/weirdo-project/logs/ Feb 22 22:30:13 np0005626394.novalocal sudo[98313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:13 np0005626394.novalocal sudo[98313]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:13 np0005626394.novalocal sudo[98317]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Feb 22 22:30:13 np0005626394.novalocal sudo[98317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98317]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98320]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Feb 22 22:30:14 np0005626394.novalocal sudo[98320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98320]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98323]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-ssl Feb 22 22:30:14 np0005626394.novalocal sudo[98323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98323]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98326]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Feb 22 22:30:14 np0005626394.novalocal sudo[98326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98326]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98329]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Feb 22 22:30:14 np0005626394.novalocal sudo[98329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98329]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98332]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-ssl Feb 22 22:30:14 np0005626394.novalocal sudo[98332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98332]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98335]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ Feb 22 22:30:14 np0005626394.novalocal sudo[98335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98335]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98338]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ Feb 22 22:30:14 np0005626394.novalocal sudo[98338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98338]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98341]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sudoers.d /var/log/weirdo-project/logs/ Feb 22 22:30:14 np0005626394.novalocal sudo[98341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98341]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98344]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sudoers /var/log/weirdo-project/logs/sudoers.txt Feb 22 22:30:14 np0005626394.novalocal sudo[98344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98344]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98348]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/magic /etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ Feb 22 22:30:14 np0005626394.novalocal sudo[98348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98348]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98352]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.d/10-cinder_wsgi.conf /etc/httpd/conf.d/10-glance_wsgi.conf /etc/httpd/conf.d/10-keystone_wsgi.conf /etc/httpd/conf.d/10-manila_wsgi.conf /etc/httpd/conf.d/10-nova_api_wsgi.conf /etc/httpd/conf.d/10-nova_metadata_wsgi.conf /etc/httpd/conf.d/10-octavia_wsgi.conf /etc/httpd/conf.d/10-placement_wsgi.conf /etc/httpd/conf.d/15-horizon_ssl_vhost.conf /etc/httpd/conf.d/15-horizon_vhost.conf /etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/ Feb 22 22:30:14 np0005626394.novalocal sudo[98352]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98352]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98356]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.modules.d/alias.conf /etc/httpd/conf.modules.d/alias.load /etc/httpd/conf.modules.d/authz_core.load /etc/httpd/conf.modules.d/authz_host.load /etc/httpd/conf.modules.d/filter.load /etc/httpd/conf.modules.d/log_config.load /etc/httpd/conf.modules.d/mime.conf /etc/httpd/conf.modules.d/mime.load /etc/httpd/conf.modules.d/prefork.conf /etc/httpd/conf.modules.d/prefork.load /etc/httpd/conf.modules.d/setenvif.conf /etc/httpd/conf.modules.d/setenvif.load /etc/httpd/conf.modules.d/socache_shmcb.load /etc/httpd/conf.modules.d/ssl.conf /etc/httpd/conf.modules.d/ssl.load /etc/httpd/conf.modules.d/systemd.load /etc/httpd/conf.modules.d/unixd.load /etc/httpd/conf.modules.d/wsgi.conf /etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ Feb 22 22:30:14 np0005626394.novalocal sudo[98356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98356]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98359]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/httpd /var/log/weirdo-project/logs/apache Feb 22 22:30:14 np0005626394.novalocal sudo[98359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98359]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98362]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/redis /var/log/weirdo-project/logs/ Feb 22 22:30:14 np0005626394.novalocal sudo[98362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98362]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98365]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/redis /var/log/weirdo-project/logs/etc/ Feb 22 22:30:14 np0005626394.novalocal sudo[98365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98365]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98368]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/audit/audit.log /var/log/weirdo-project/logs/audit.log.txt Feb 22 22:30:14 np0005626394.novalocal sudo[98368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98368]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98371]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/spool/cron /var/log/weirdo-project/logs/ Feb 22 22:30:14 np0005626394.novalocal sudo[98371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98371]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98374]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/etc/tempest.conf /var/log/weirdo-project/logs/tempest.conf.txt Feb 22 22:30:14 np0005626394.novalocal sudo[98374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98374]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98377]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack-dashboard /var/log/weirdo-project/logs/etc/openstack-dashboard Feb 22 22:30:14 np0005626394.novalocal sudo[98377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98377]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98381]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt Feb 22 22:30:14 np0005626394.novalocal sudo[98381]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98381]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98384]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt Feb 22 22:30:14 np0005626394.novalocal sudo[98384]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98384]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98387]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt Feb 22 22:30:14 np0005626394.novalocal sudo[98387]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98387]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98390]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt Feb 22 22:30:14 np0005626394.novalocal sudo[98390]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98390]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98393]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt Feb 22 22:30:14 np0005626394.novalocal sudo[98393]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98393]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98396]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt Feb 22 22:30:14 np0005626394.novalocal sudo[98396]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98396]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98399]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt Feb 22 22:30:14 np0005626394.novalocal sudo[98399]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98399]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98402]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt Feb 22 22:30:14 np0005626394.novalocal sudo[98402]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98402]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98405]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt Feb 22 22:30:14 np0005626394.novalocal sudo[98405]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98405]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:14 np0005626394.novalocal sudo[98408]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt Feb 22 22:30:14 np0005626394.novalocal sudo[98408]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:14 np0005626394.novalocal sudo[98408]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:15 np0005626394.novalocal sudo[98411]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt Feb 22 22:30:15 np0005626394.novalocal sudo[98411]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:15 np0005626394.novalocal sudo[98411]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:15 np0005626394.novalocal sudo[98414]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt Feb 22 22:30:15 np0005626394.novalocal sudo[98414]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:15 np0005626394.novalocal sudo[98414]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:15 np0005626394.novalocal sudo[98418]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf Feb 22 22:30:15 np0005626394.novalocal sudo[98418]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:15 np0005626394.novalocal sudo[98418]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:15 np0005626394.novalocal sudo[98425]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf repolist -v Feb 22 22:30:15 np0005626394.novalocal sudo[98425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:17 np0005626394.novalocal sudo[98425]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:17 np0005626394.novalocal sudo[98430]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf list installed Feb 22 22:30:17 np0005626394.novalocal sudo[98430]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:17 np0005626394.novalocal sudo[98430]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:18 np0005626394.novalocal sudo[98433]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf module list Feb 22 22:30:18 np0005626394.novalocal sudo[98433]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:19 np0005626394.novalocal sudo[98433]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:19 np0005626394.novalocal sudo[98436]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/yum.repos.d /var/log/weirdo-project/logs/etc/yum.repos.d Feb 22 22:30:19 np0005626394.novalocal sudo[98436]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:19 np0005626394.novalocal sudo[98436]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:19 np0005626394.novalocal sudo[98440]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.log /var/log/weirdo-project/logs/dnf Feb 22 22:30:19 np0005626394.novalocal sudo[98440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:19 np0005626394.novalocal sudo[98440]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:19 np0005626394.novalocal sudo[98443]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.rpm.log /var/log/weirdo-project/logs/dnf Feb 22 22:30:19 np0005626394.novalocal sudo[98443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:19 np0005626394.novalocal sudo[98443]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:19 np0005626394.novalocal sudo[98449]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/passwd /var/log/weirdo-project/logs/etc Feb 22 22:30:19 np0005626394.novalocal sudo[98449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:19 np0005626394.novalocal sudo[98449]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:19 np0005626394.novalocal sudo[98452]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/group /var/log/weirdo-project/logs/etc Feb 22 22:30:19 np0005626394.novalocal sudo[98452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:19 np0005626394.novalocal sudo[98452]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:19 np0005626394.novalocal sudo[98455]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack /var/log/weirdo-project/logs/etc Feb 22 22:30:19 np0005626394.novalocal sudo[98455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:19 np0005626394.novalocal sudo[98455]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:19 np0005626394.novalocal sudo[98458]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml Feb 22 22:30:19 np0005626394.novalocal sudo[98458]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:19 np0005626394.novalocal sudo[98458]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:19 np0005626394.novalocal sudo[98465]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ps -eo user,pid,ppid,lwp,%cpu,%mem,size,rss,cmd Feb 22 22:30:19 np0005626394.novalocal sudo[98465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:19 np0005626394.novalocal sudo[98465]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:19 np0005626394.novalocal sudo[98468]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/ip -d address Feb 22 22:30:19 np0005626394.novalocal sudo[98468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:19 np0005626394.novalocal sudo[98468]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:19 np0005626394.novalocal sudo[98474]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl show Feb 22 22:30:19 np0005626394.novalocal sudo[98474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:19 np0005626394.novalocal sudo[98474]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:19 np0005626394.novalocal sudo[98477]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl list open_vswitch Feb 22 22:30:19 np0005626394.novalocal sudo[98477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:19 np0005626394.novalocal sudo[98477]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:19 np0005626394.novalocal sudo[98481]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Feb 22 22:30:19 np0005626394.novalocal sudo[98481]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:19 np0005626394.novalocal sudo[98481]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:19 np0005626394.novalocal sudo[98485]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Feb 22 22:30:19 np0005626394.novalocal sudo[98485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:19 np0005626394.novalocal sudo[98485]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:19 np0005626394.novalocal sudo[98488]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/netstat -tulpn Feb 22 22:30:19 np0005626394.novalocal sudo[98488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:19 np0005626394.novalocal sudo[98488]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:19 np0005626394.novalocal sudo[98491]: root : PWD=/tmp/puppet-openstack ; USER=root ; ENV=LC_CTYPE=C SYSTEMD_COLORS=false ; COMMAND=/bin/systemctl status --all --no-pager Feb 22 22:30:19 np0005626394.novalocal sudo[98491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:21 np0005626394.novalocal sudo[98491]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:21 np0005626394.novalocal sudo[98494]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t raw -vnxL Feb 22 22:30:21 np0005626394.novalocal sudo[98494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:21 np0005626394.novalocal sudo[98494]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:21 np0005626394.novalocal sudo[98497]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t filter -vnxL Feb 22 22:30:21 np0005626394.novalocal sudo[98497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:21 np0005626394.novalocal sudo[98497]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:21 np0005626394.novalocal sudo[98500]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t nat -vnxL Feb 22 22:30:21 np0005626394.novalocal sudo[98500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:21 np0005626394.novalocal sudo[98500]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:21 np0005626394.novalocal sudo[98503]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t mangle -vnxL Feb 22 22:30:21 np0005626394.novalocal sudo[98503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:21 np0005626394.novalocal sudo[98503]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:22 np0005626394.novalocal sudo[98506]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/fstab /var/log/weirdo-project/logs/etc/ Feb 22 22:30:22 np0005626394.novalocal sudo[98506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:22 np0005626394.novalocal sudo[98506]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:22 np0005626394.novalocal sudo[98509]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mount Feb 22 22:30:22 np0005626394.novalocal sudo[98509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:22 np0005626394.novalocal sudo[98509]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:22 np0005626394.novalocal sudo[98512]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/losetup -al Feb 22 22:30:22 np0005626394.novalocal sudo[98512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:22 np0005626394.novalocal sudo[98512]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:22 np0005626394.novalocal sudo[98515]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/pvs Feb 22 22:30:22 np0005626394.novalocal sudo[98515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:22 np0005626394.novalocal sudo[98515]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:22 np0005626394.novalocal sudo[98518]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/vgs Feb 22 22:30:22 np0005626394.novalocal sudo[98518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:22 np0005626394.novalocal sudo[98518]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:22 np0005626394.novalocal sudo[98521]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/lvs Feb 22 22:30:22 np0005626394.novalocal sudo[98521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:22 np0005626394.novalocal sudo[98521]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:22 np0005626394.novalocal sudo[98525]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/semanage boolean --list Feb 22 22:30:22 np0005626394.novalocal sudo[98525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:23 np0005626394.novalocal sudo[98525]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:26 np0005626394.novalocal sudo[98531]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_cells --verbose Feb 22 22:30:26 np0005626394.novalocal sudo[98531]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Feb 22 22:30:29 np0005626394.novalocal sudo[98531]: pam_unix(sudo:session): session closed for user nova Feb 22 22:30:29 np0005626394.novalocal sudo[98537]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_hosts Feb 22 22:30:29 np0005626394.novalocal sudo[98537]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Feb 22 22:30:31 np0005626394.novalocal sudo[98537]: pam_unix(sudo:session): session closed for user nova Feb 22 22:30:50 np0005626394.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 22:30:51 np0005626394.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 22:30:51 np0005626394.novalocal sudo[98599]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type d -execdir sudo chmod 755 {} ; Feb 22 22:30:51 np0005626394.novalocal sudo[98599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98602]: root : PWD=/var/log/weirdo-project ; USER=root ; COMMAND=/bin/chmod 755 ./logs Feb 22 22:30:51 np0005626394.novalocal sudo[98602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98602]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98605]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./etc Feb 22 22:30:51 np0005626394.novalocal sudo[98605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98605]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98608]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./sysconfig Feb 22 22:30:51 np0005626394.novalocal sudo[98608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98608]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98611]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 755 ./network-scripts Feb 22 22:30:51 np0005626394.novalocal sudo[98611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98611]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98615]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ceph Feb 22 22:30:51 np0005626394.novalocal sudo[98615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98615]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98620]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Feb 22 22:30:51 np0005626394.novalocal sudo[98620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98620]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98623]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./volumes Feb 22 22:30:51 np0005626394.novalocal sudo[98623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98623]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98626]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 22:30:51 np0005626394.novalocal sudo[98626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98626]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98630]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 22:30:51 np0005626394.novalocal sudo[98630]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98630]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98633]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Feb 22 22:30:51 np0005626394.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service. Feb 22 22:30:51 np0005626394.novalocal sudo[98633]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98633]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98640]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./glance Feb 22 22:30:51 np0005626394.novalocal sudo[98640]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98640]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98643]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./metadefs Feb 22 22:30:51 np0005626394.novalocal sudo[98643]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98643]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98646]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Feb 22 22:30:51 np0005626394.novalocal sudo[98646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98646]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98649]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 22:30:51 np0005626394.novalocal sudo[98649]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98649]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98652]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 22:30:51 np0005626394.novalocal sudo[98652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98652]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98655]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Feb 22 22:30:51 np0005626394.novalocal sudo[98655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98655]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98658]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 22:30:51 np0005626394.novalocal sudo[98658]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98658]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98661]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 22:30:51 np0005626394.novalocal sudo[98661]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98661]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98664]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./fernet-keys Feb 22 22:30:51 np0005626394.novalocal sudo[98664]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98664]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98667]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./credential-keys Feb 22 22:30:51 np0005626394.novalocal sudo[98667]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98667]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98670]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./policy.d Feb 22 22:30:51 np0005626394.novalocal sudo[98670]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98670]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98673]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./manila Feb 22 22:30:51 np0005626394.novalocal sudo[98673]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98673]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98676]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 22:30:51 np0005626394.novalocal sudo[98676]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98676]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98679]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 22:30:51 np0005626394.novalocal sudo[98679]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98679]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98682]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Feb 22 22:30:51 np0005626394.novalocal sudo[98682]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98682]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98685]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./kill_scripts Feb 22 22:30:51 np0005626394.novalocal sudo[98685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98685]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:51 np0005626394.novalocal sudo[98690]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Feb 22 22:30:51 np0005626394.novalocal sudo[98690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:51 np0005626394.novalocal sudo[98690]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98693]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-dhcp-agent Feb 22 22:30:52 np0005626394.novalocal sudo[98693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98693]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98696]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-l3-agent Feb 22 22:30:52 np0005626394.novalocal sudo[98696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98696]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98699]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-linuxbridge-cleanup Feb 22 22:30:52 np0005626394.novalocal sudo[98699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98699]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98702]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-metadata-agent Feb 22 22:30:52 np0005626394.novalocal sudo[98702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98702]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98705]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-netns-cleanup Feb 22 22:30:52 np0005626394.novalocal sudo[98705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98705]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98708]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovs-cleanup Feb 22 22:30:52 np0005626394.novalocal sudo[98708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98708]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98711]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-vpn-agent Feb 22 22:30:52 np0005626394.novalocal sudo[98711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98711]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98715]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-server Feb 22 22:30:52 np0005626394.novalocal sudo[98715]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98715]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98718]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovn-agent Feb 22 22:30:52 np0005626394.novalocal sudo[98718]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98718]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98721]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Feb 22 22:30:52 np0005626394.novalocal sudo[98721]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98721]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98724]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./plugins Feb 22 22:30:52 np0005626394.novalocal sudo[98724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98724]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98727]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./ml2 Feb 22 22:30:52 np0005626394.novalocal sudo[98727]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98727]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98730]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./networking-ovn Feb 22 22:30:52 np0005626394.novalocal sudo[98730]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98730]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98733]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 22:30:52 np0005626394.novalocal sudo[98733]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98733]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98736]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 22:30:52 np0005626394.novalocal sudo[98736]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98736]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98739]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./nova Feb 22 22:30:52 np0005626394.novalocal sudo[98739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98739]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98742]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 22:30:52 np0005626394.novalocal sudo[98742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98742]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98745]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 22:30:52 np0005626394.novalocal sudo[98745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98745]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98748]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Feb 22 22:30:52 np0005626394.novalocal sudo[98748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98748]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98751]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Feb 22 22:30:52 np0005626394.novalocal sudo[98751]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98751]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98755]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-health-manager Feb 22 22:30:52 np0005626394.novalocal sudo[98755]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98755]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98758]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-driver-agent Feb 22 22:30:52 np0005626394.novalocal sudo[98758]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98758]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98761]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Feb 22 22:30:52 np0005626394.novalocal sudo[98761]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98761]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98764]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-worker Feb 22 22:30:52 np0005626394.novalocal sudo[98764]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98764]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98767]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-housekeeping Feb 22 22:30:52 np0005626394.novalocal sudo[98767]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98767]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98770]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-api Feb 22 22:30:52 np0005626394.novalocal sudo[98770]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98770]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98774]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./certs Feb 22 22:30:52 np0005626394.novalocal sudo[98774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98774]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal setroubleshoot[98596]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l 7e8da2ac-3e1e-4ce0-a3eb-d8a5ef7ba7ee Feb 22 22:30:52 np0005626394.novalocal sudo[98777]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 22:30:52 np0005626394.novalocal sudo[98777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98777]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal setroubleshoot[98596]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 22:30:52 np0005626394.novalocal sudo[98780]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 22:30:52 np0005626394.novalocal sudo[98780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98780]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98783]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Feb 22 22:30:52 np0005626394.novalocal sudo[98783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98783]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98786]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./placement Feb 22 22:30:52 np0005626394.novalocal sudo[98786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98786]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98789]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 22:30:52 np0005626394.novalocal sudo[98789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98789]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98792]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 22:30:52 np0005626394.novalocal sudo[98792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98792]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98795]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./tempest Feb 22 22:30:52 np0005626394.novalocal sudo[98795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98795]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98798]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rsyslog.d Feb 22 22:30:52 np0005626394.novalocal sudo[98798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98798]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98801]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Feb 22 22:30:52 np0005626394.novalocal sudo[98801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98801]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98804]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 22:30:52 np0005626394.novalocal sudo[98804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98804]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:52 np0005626394.novalocal sudo[98807]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 22:30:52 np0005626394.novalocal sudo[98807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:52 np0005626394.novalocal sudo[98807]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98810]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./my.cnf.d Feb 22 22:30:53 np0005626394.novalocal sudo[98810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98810]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98813]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./iscsi Feb 22 22:30:53 np0005626394.novalocal sudo[98813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98813]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98816]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Feb 22 22:30:53 np0005626394.novalocal sudo[98816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98816]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98819]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./storage Feb 22 22:30:53 np0005626394.novalocal sudo[98819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98819]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98822]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/storage ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Feb 22 22:30:53 np0005626394.novalocal sudo[98822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98822]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98825]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./secrets Feb 22 22:30:53 np0005626394.novalocal sudo[98825]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98825]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98828]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Feb 22 22:30:53 np0005626394.novalocal sudo[98828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98828]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98831]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./networks Feb 22 22:30:53 np0005626394.novalocal sudo[98831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98831]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98834]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Feb 22 22:30:53 np0005626394.novalocal sudo[98834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98834]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98837]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Feb 22 22:30:53 np0005626394.novalocal sudo[98837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98837]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98840]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./nwfilter Feb 22 22:30:53 np0005626394.novalocal sudo[98840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98840]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98843]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Feb 22 22:30:53 np0005626394.novalocal sudo[98843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98843]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98846]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./httpd Feb 22 22:30:53 np0005626394.novalocal sudo[98846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98846]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98849]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf Feb 22 22:30:53 np0005626394.novalocal sudo[98849]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98849]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98852]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Feb 22 22:30:53 np0005626394.novalocal sudo[98852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98852]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98855]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.modules.d Feb 22 22:30:53 np0005626394.novalocal sudo[98855]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98855]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98858]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./redis Feb 22 22:30:53 np0005626394.novalocal sudo[98858]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98858]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98861]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 22:30:53 np0005626394.novalocal sudo[98861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98861]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98864]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 22:30:53 np0005626394.novalocal sudo[98864]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98864]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98867]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack-dashboard Feb 22 22:30:53 np0005626394.novalocal sudo[98867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98867]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98870]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./default_policies.txt Feb 22 22:30:53 np0005626394.novalocal sudo[98870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98870]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98873]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./enabled.txt Feb 22 22:30:53 np0005626394.novalocal sudo[98873]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98873]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98876]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./local_settings.d.txt Feb 22 22:30:53 np0005626394.novalocal sudo[98876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98876]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98879]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./nova_policy.d.txt Feb 22 22:30:53 np0005626394.novalocal sudo[98879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98879]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98882]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./ssl.txt Feb 22 22:30:53 np0005626394.novalocal sudo[98882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98882]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98885]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 22:30:53 np0005626394.novalocal sudo[98885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98885]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98888]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./yum.repos.d Feb 22 22:30:53 np0005626394.novalocal sudo[98888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98888]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98891]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack Feb 22 22:30:53 np0005626394.novalocal sudo[98891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98891]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98894]: root : PWD=/var/log/weirdo-project/logs/etc/openstack ; USER=root ; COMMAND=/bin/chmod 755 ./puppet Feb 22 22:30:53 np0005626394.novalocal sudo[98894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98894]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98897]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Feb 22 22:30:53 np0005626394.novalocal sudo[98897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98897]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98900]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./glance Feb 22 22:30:53 np0005626394.novalocal sudo[98900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98900]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98903]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./horizon Feb 22 22:30:53 np0005626394.novalocal sudo[98903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98903]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98906]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Feb 22 22:30:53 np0005626394.novalocal sudo[98906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98906]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98909]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./manila Feb 22 22:30:53 np0005626394.novalocal sudo[98909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98909]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:53 np0005626394.novalocal sudo[98912]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Feb 22 22:30:53 np0005626394.novalocal sudo[98912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:53 np0005626394.novalocal sudo[98912]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98915]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./nova Feb 22 22:30:54 np0005626394.novalocal sudo[98915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98915]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98918]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Feb 22 22:30:54 np0005626394.novalocal sudo[98918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98918]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98921]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Feb 22 22:30:54 np0005626394.novalocal sudo[98921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98921]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98924]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./placement Feb 22 22:30:54 np0005626394.novalocal sudo[98924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98924]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98927]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Feb 22 22:30:54 np0005626394.novalocal sudo[98927]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98927]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98930]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./mariadb Feb 22 22:30:54 np0005626394.novalocal sudo[98930]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98930]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98933]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Feb 22 22:30:54 np0005626394.novalocal sudo[98933]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98933]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98936]: root : PWD=/var/log/weirdo-project/logs/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Feb 22 22:30:54 np0005626394.novalocal sudo[98936]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98936]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98939]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Feb 22 22:30:54 np0005626394.novalocal sudo[98939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98939]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98942]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./sudoers.d Feb 22 22:30:54 np0005626394.novalocal sudo[98942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98942]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98945]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./apache Feb 22 22:30:54 np0005626394.novalocal sudo[98945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98945]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98948]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./redis Feb 22 22:30:54 np0005626394.novalocal sudo[98948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98948]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98951]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cron Feb 22 22:30:54 np0005626394.novalocal sudo[98951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98951]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98954]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./dnf Feb 22 22:30:54 np0005626394.novalocal sudo[98954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98954]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98957]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openstack_resources Feb 22 22:30:54 np0005626394.novalocal sudo[98957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98957]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98599]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98960]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type f -execdir sudo chmod 644 {} ; Feb 22 22:30:54 np0005626394.novalocal sudo[98960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98963]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20260222_222726.log Feb 22 22:30:54 np0005626394.novalocal sudo[98963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98963]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98966]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.log Feb 22 22:30:54 np0005626394.novalocal sudo[98966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98966]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98969]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./readme-ifcfg-rh.txt Feb 22 22:30:54 np0005626394.novalocal sudo[98969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98969]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98972]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-eth0 Feb 22 22:30:54 np0005626394.novalocal sudo[98972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98972]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98975]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-loop1 Feb 22 22:30:54 np0005626394.novalocal sudo[98975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98975]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98978]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-br-ex Feb 22 22:30:54 np0005626394.novalocal sudo[98978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98978]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98981]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions-ipv6 Feb 22 22:30:54 np0005626394.novalocal sudo[98981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98981]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98984]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup Feb 22 22:30:54 np0005626394.novalocal sudo[98984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98984]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98987]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-lo Feb 22 22:30:54 np0005626394.novalocal sudo[98987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98987]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98990]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown Feb 22 22:30:54 np0005626394.novalocal sudo[98990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98990]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98993]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-eth Feb 22 22:30:54 np0005626394.novalocal sudo[98993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98993]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98996]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ipv6 Feb 22 22:30:54 np0005626394.novalocal sudo[98996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98996]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[98999]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ovs Feb 22 22:30:54 np0005626394.novalocal sudo[98999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[98999]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[99002]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-post Feb 22 22:30:54 np0005626394.novalocal sudo[99002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[99002]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[99005]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-routes Feb 22 22:30:54 np0005626394.novalocal sudo[99005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[99005]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[99008]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-tunnel Feb 22 22:30:54 np0005626394.novalocal sudo[99008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[99008]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[99011]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-aliases Feb 22 22:30:54 np0005626394.novalocal sudo[99011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[99011]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[99014]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-eth Feb 22 22:30:54 np0005626394.novalocal sudo[99014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[99014]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[99017]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ipv6 Feb 22 22:30:54 np0005626394.novalocal sudo[99017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[99017]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[99020]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ovs Feb 22 22:30:54 np0005626394.novalocal sudo[99020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:54 np0005626394.novalocal sudo[99020]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:54 np0005626394.novalocal sudo[99023]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-post Feb 22 22:30:54 np0005626394.novalocal sudo[99023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99023]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99026]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-routes Feb 22 22:30:55 np0005626394.novalocal sudo[99026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99026]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99029]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-tunnel Feb 22 22:30:55 np0005626394.novalocal sudo[99029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99029]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99032]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./init.ipv6-global Feb 22 22:30:55 np0005626394.novalocal sudo[99032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99032]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99035]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions Feb 22 22:30:55 np0005626394.novalocal sudo[99035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99035]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99038]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-guests Feb 22 22:30:55 np0005626394.novalocal sudo[99038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99038]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99041]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd Feb 22 22:30:55 np0005626394.novalocal sudo[99041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99041]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99044]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller Feb 22 22:30:55 np0005626394.novalocal sudo[99044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99044]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99047]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626394.novalocal.pem Feb 22 22:30:55 np0005626394.novalocal sudo[99047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99047]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99050]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 22 22:30:55 np0005626394.novalocal sudo[99050]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99050]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99053]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.conf Feb 22 22:30:55 np0005626394.novalocal sudo[99053]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99053]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99057]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./resource_filters.json Feb 22 22:30:55 np0005626394.novalocal sudo[99055]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 22:30:55 np0005626394.novalocal sudo[99057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99057]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal systemd[1]: Started Session c89 of User root. Feb 22 22:30:55 np0005626394.novalocal sudo[99061]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 22 22:30:55 np0005626394.novalocal sudo[99055]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:30:55 np0005626394.novalocal sudo[99061]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99061]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99065]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 22:30:55 np0005626394.novalocal sudo[99065]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99065]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99068]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api-paste.ini Feb 22 22:30:55 np0005626394.novalocal sudo[99068]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99068]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99071]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api.conf Feb 22 22:30:55 np0005626394.novalocal sudo[99071]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99071]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99074]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-cache.conf Feb 22 22:30:55 np0005626394.novalocal sudo[99074]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99074]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99077]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-image-import.conf Feb 22 22:30:55 np0005626394.novalocal sudo[99077]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99077]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99080]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-scrubber.conf Feb 22 22:30:55 np0005626394.novalocal sudo[99080]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99080]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99083]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-swift.conf Feb 22 22:30:55 np0005626394.novalocal sudo[99083]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99083]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99086]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 22 22:30:55 np0005626394.novalocal sudo[99086]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99086]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99090]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./schema-image.json Feb 22 22:30:55 np0005626394.novalocal sudo[99090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99090]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99093]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 22:30:55 np0005626394.novalocal sudo[99093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99093]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99096]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-processor-allocation-setting-data.json Feb 22 22:30:55 np0005626394.novalocal sudo[99096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99096]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99055]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal systemd[1]: session-c89.scope: Deactivated successfully. Feb 22 22:30:55 np0005626394.novalocal sudo[99099]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-resource-allocation-setting-data.json Feb 22 22:30:55 np0005626394.novalocal sudo[99099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99099]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99100]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:30:55 np0005626394.novalocal sudo[99103]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-storage-allocation-setting-data.json Feb 22 22:30:55 np0005626394.novalocal systemd[1]: Started Session c90 of User root. Feb 22 22:30:55 np0005626394.novalocal sudo[99100]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:30:55 np0005626394.novalocal sudo[99103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99103]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99108]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-virtual-system-setting-data.json Feb 22 22:30:55 np0005626394.novalocal sudo[99108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99108]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99111]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-disk-filter.json Feb 22 22:30:55 np0005626394.novalocal sudo[99111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99111]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99114]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-iops-filter.json Feb 22 22:30:55 np0005626394.novalocal sudo[99114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99114]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99117]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-num-instances.json Feb 22 22:30:55 np0005626394.novalocal sudo[99117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99117]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99120]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-mode.json Feb 22 22:30:55 np0005626394.novalocal sudo[99120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99120]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99123]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-pinning.json Feb 22 22:30:55 np0005626394.novalocal sudo[99123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99123]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99127]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-memory-backing.json Feb 22 22:30:55 np0005626394.novalocal sudo[99127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99127]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal sudo[99130]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-shutdown.json Feb 22 22:30:55 np0005626394.novalocal sudo[99130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:55 np0005626394.novalocal sudo[99100]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:55 np0005626394.novalocal systemd[1]: session-c90.scope: Deactivated successfully. Feb 22 22:30:55 np0005626394.novalocal sudo[99130]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99133]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-host-capabilities.json Feb 22 22:30:56 np0005626394.novalocal sudo[99133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99133]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99134]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 22:30:56 np0005626394.novalocal systemd[1]: Started Session c91 of User root. Feb 22 22:30:56 np0005626394.novalocal sudo[99134]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:30:56 np0005626394.novalocal sudo[99138]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-hypervisor.json Feb 22 22:30:56 np0005626394.novalocal sudo[99138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99138]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99142]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-instance-data.json Feb 22 22:30:56 np0005626394.novalocal sudo[99142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99142]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99145]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt-image.json Feb 22 22:30:56 np0005626394.novalocal sudo[99145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99145]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99148]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt.json Feb 22 22:30:56 np0005626394.novalocal sudo[99148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99148]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99151]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-quota.json Feb 22 22:30:56 np0005626394.novalocal sudo[99151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99151]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99154]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-randomgen.json Feb 22 22:30:56 np0005626394.novalocal sudo[99154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99154]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99157]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vcputopology.json Feb 22 22:30:56 np0005626394.novalocal sudo[99157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99157]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99160]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-flavor.json Feb 22 22:30:56 np0005626394.novalocal sudo[99160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99160]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99163]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-quota-flavor.json Feb 22 22:30:56 np0005626394.novalocal sudo[99163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99163]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99166]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware.json Feb 22 22:30:56 np0005626394.novalocal sudo[99166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99166]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99170]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm-hw.json Feb 22 22:30:56 np0005626394.novalocal sudo[99170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99170]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99173]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm.json Feb 22 22:30:56 np0005626394.novalocal sudo[99173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99173]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99176]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-watchdog.json Feb 22 22:30:56 np0005626394.novalocal sudo[99176]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99176]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99134]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal systemd[1]: session-c91.scope: Deactivated successfully. Feb 22 22:30:56 np0005626394.novalocal sudo[99179]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-xenapi.json Feb 22 22:30:56 np0005626394.novalocal sudo[99179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99179]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99180]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 22:30:56 np0005626394.novalocal sudo[99183]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./glance-common-image-props.json Feb 22 22:30:56 np0005626394.novalocal systemd[1]: Started Session c92 of User root. Feb 22 22:30:56 np0005626394.novalocal sudo[99180]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 22:30:56 np0005626394.novalocal sudo[99183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99183]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99188]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./image-signature-verification.json Feb 22 22:30:56 np0005626394.novalocal sudo[99188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99188]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99191]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./operating-system.json Feb 22 22:30:56 np0005626394.novalocal sudo[99191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99191]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99194]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-databases.json Feb 22 22:30:56 np0005626394.novalocal sudo[99194]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99194]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99197]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-runtimes.json Feb 22 22:30:56 np0005626394.novalocal sudo[99197]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99197]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99200]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-webservers.json Feb 22 22:30:56 np0005626394.novalocal sudo[99200]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99200]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99203]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./storage-volume-type.json Feb 22 22:30:56 np0005626394.novalocal sudo[99203]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99203]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99206]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626394.novalocal.pem Feb 22 22:30:56 np0005626394.novalocal sudo[99206]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99206]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99210]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626394.novalocal.pem Feb 22 22:30:56 np0005626394.novalocal sudo[99210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99210]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99213]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Feb 22 22:30:56 np0005626394.novalocal sudo[99213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99180]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99213]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal systemd[1]: session-c92.scope: Deactivated successfully. Feb 22 22:30:56 np0005626394.novalocal sudo[99216]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Feb 22 22:30:56 np0005626394.novalocal sudo[99216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99216]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99219]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./2 Feb 22 22:30:56 np0005626394.novalocal sudo[99219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99219]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99222]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Feb 22 22:30:56 np0005626394.novalocal sudo[99222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99222]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99225]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Feb 22 22:30:56 np0005626394.novalocal sudo[99225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99225]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99228]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./default_catalog.templates Feb 22 22:30:56 np0005626394.novalocal sudo[99228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99228]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99231]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.conf Feb 22 22:30:56 np0005626394.novalocal sudo[99231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99231]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99234]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf Feb 22 22:30:56 np0005626394.novalocal sudo[99234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99234]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99237]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./sso_callback_template.html Feb 22 22:30:56 np0005626394.novalocal sudo[99237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99237]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99240]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 22:30:56 np0005626394.novalocal sudo[99240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99240]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:56 np0005626394.novalocal sudo[99243]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626394.novalocal.pem Feb 22 22:30:56 np0005626394.novalocal sudo[99243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:56 np0005626394.novalocal sudo[99243]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99246]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 22 22:30:57 np0005626394.novalocal sudo[99246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99246]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99249]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila.conf Feb 22 22:30:57 np0005626394.novalocal sudo[99249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99249]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99252]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 22 22:30:57 np0005626394.novalocal sudo[99252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99252]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99257]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 22:30:57 np0005626394.novalocal sudo[99257]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99257]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99260]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.conf Feb 22 22:30:57 np0005626394.novalocal sudo[99260]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99260]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99263]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 22 22:30:57 np0005626394.novalocal sudo[99263]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99263]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99266]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 22 22:30:57 np0005626394.novalocal sudo[99266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99266]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99269]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./dhcp_agent.ini Feb 22 22:30:57 np0005626394.novalocal sudo[99269]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99269]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99272]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./l3_agent.ini Feb 22 22:30:57 np0005626394.novalocal sudo[99272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99272]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99275]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./metadata_agent.ini Feb 22 22:30:57 np0005626394.novalocal sudo[99275]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99275]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99278]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_vpn_agent.ini Feb 22 22:30:57 np0005626394.novalocal sudo[99278]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99278]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99281]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_vpnaas.conf Feb 22 22:30:57 np0005626394.novalocal sudo[99281]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99281]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99284]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./vpn_agent.ini Feb 22 22:30:57 np0005626394.novalocal sudo[99284]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99284]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99287]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Feb 22 22:30:57 np0005626394.novalocal sudo[99287]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99287]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99290]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Feb 22 22:30:57 np0005626394.novalocal sudo[99290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99290]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99293]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Feb 22 22:30:57 np0005626394.novalocal sudo[99293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99293]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99296]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Feb 22 22:30:57 np0005626394.novalocal sudo[99296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99296]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99299]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Feb 22 22:30:57 np0005626394.novalocal sudo[99299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99299]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99302]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 22:30:57 np0005626394.novalocal sudo[99302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99302]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99305]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./README Feb 22 22:30:57 np0005626394.novalocal sudo[99305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99305]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99308]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ml2_conf.ini Feb 22 22:30:57 np0005626394.novalocal sudo[99308]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99308]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99311]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_agent.ini Feb 22 22:30:57 np0005626394.novalocal sudo[99311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99311]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99314]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./sriov_agent.ini Feb 22 22:30:57 np0005626394.novalocal sudo[99314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99314]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99317]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626394.novalocal.pem Feb 22 22:30:57 np0005626394.novalocal sudo[99317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99317]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99320]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626394.novalocal.pem Feb 22 22:30:57 np0005626394.novalocal sudo[99320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99320]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99323]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 22 22:30:57 np0005626394.novalocal sudo[99323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99323]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99326]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova.conf Feb 22 22:30:57 np0005626394.novalocal sudo[99326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99326]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99329]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./release Feb 22 22:30:57 np0005626394.novalocal sudo[99329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99329]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99332]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 22 22:30:57 np0005626394.novalocal sudo[99332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99332]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99335]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 22:30:57 np0005626394.novalocal sudo[99335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99335]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99338]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.conf Feb 22 22:30:57 np0005626394.novalocal sudo[99338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99338]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99341]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.conf Feb 22 22:30:57 np0005626394.novalocal sudo[99341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99341]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99344]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 22:30:57 np0005626394.novalocal sudo[99344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99344]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99347]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Feb 22 22:30:57 np0005626394.novalocal sudo[99347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99347]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99350]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Feb 22 22:30:57 np0005626394.novalocal sudo[99350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99350]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99353]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Feb 22 22:30:57 np0005626394.novalocal sudo[99353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99353]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:57 np0005626394.novalocal sudo[99356]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Feb 22 22:30:57 np0005626394.novalocal sudo[99356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:57 np0005626394.novalocal sudo[99356]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99359]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Feb 22 22:30:58 np0005626394.novalocal sudo[99359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99359]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99362]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.cert.pem Feb 22 22:30:58 np0005626394.novalocal sudo[99362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99362]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99365]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.key.pem Feb 22 22:30:58 np0005626394.novalocal sudo[99365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99365]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99368]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client_ca.cert.pem Feb 22 22:30:58 np0005626394.novalocal sudo[99368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99368]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99371]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client.cert-and-key.pem Feb 22 22:30:58 np0005626394.novalocal sudo[99371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99371]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99374]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626394.novalocal.pem Feb 22 22:30:58 np0005626394.novalocal sudo[99374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99374]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99377]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626394.novalocal.pem Feb 22 22:30:58 np0005626394.novalocal sudo[99377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99377]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99380]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.conf Feb 22 22:30:58 np0005626394.novalocal sudo[99380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99380]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99383]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 22:30:58 np0005626394.novalocal sudo[99383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99383]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99386]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./accounts.yaml.sample Feb 22 22:30:58 np0005626394.novalocal sudo[99386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99386]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99389]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./allow-list.yaml Feb 22 22:30:58 np0005626394.novalocal sudo[99389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99389]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99392]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf.sample Feb 22 22:30:58 np0005626394.novalocal sudo[99392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99392]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99395]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./rbac-persona-accounts.yaml.sample Feb 22 22:30:58 np0005626394.novalocal sudo[99395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99395]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99398]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf Feb 22 22:30:58 np0005626394.novalocal sudo[99398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99398]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99401]: root : PWD=/var/log/weirdo-project/logs/etc/rsyslog.d ; USER=root ; COMMAND=/bin/chmod 644 ./21-cloudinit.conf Feb 22 22:30:58 np0005626394.novalocal sudo[99401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99401]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99404]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyslog.conf Feb 22 22:30:58 np0005626394.novalocal sudo[99404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99404]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99407]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.conf Feb 22 22:30:58 np0005626394.novalocal sudo[99407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99407]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99410]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.config Feb 22 22:30:58 np0005626394.novalocal sudo[99410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99410]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99413]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq-env.conf Feb 22 22:30:58 np0005626394.novalocal sudo[99413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99413]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99416]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./inetrc Feb 22 22:30:58 np0005626394.novalocal sudo[99416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99416]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99419]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmqadmin.conf Feb 22 22:30:58 np0005626394.novalocal sudo[99419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99419]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99422]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./enabled_plugins Feb 22 22:30:58 np0005626394.novalocal sudo[99422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99422]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99425]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626394.novalocal.pem Feb 22 22:30:58 np0005626394.novalocal sudo[99425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99425]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99428]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./my.cnf Feb 22 22:30:58 np0005626394.novalocal sudo[99428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99428]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99431]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./client.cnf Feb 22 22:30:58 np0005626394.novalocal sudo[99431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99431]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99434]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./server.cnf Feb 22 22:30:58 np0005626394.novalocal sudo[99434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99434]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99437]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_gssapi.cnf Feb 22 22:30:58 np0005626394.novalocal sudo[99437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99437]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99440]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./enable_encryption.preset Feb 22 22:30:58 np0005626394.novalocal sudo[99440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99440]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99443]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb-server.cnf Feb 22 22:30:58 np0005626394.novalocal sudo[99443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99443]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99446]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./spider.cnf Feb 22 22:30:58 np0005626394.novalocal sudo[99446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99446]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99449]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mysql-clients.cnf Feb 22 22:30:58 np0005626394.novalocal sudo[99449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99449]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99452]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626394.novalocal.pem Feb 22 22:30:58 np0005626394.novalocal sudo[99452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99452]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99455]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./iscsid.conf Feb 22 22:30:58 np0005626394.novalocal sudo[99455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99455]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99458]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./initiatorname.iscsi Feb 22 22:30:58 np0005626394.novalocal sudo[99458]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99458]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99461]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 644 ./default.xml Feb 22 22:30:58 np0005626394.novalocal sudo[99461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99461]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99464]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-admin.conf Feb 22 22:30:58 np0005626394.novalocal sudo[99464]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99464]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:58 np0005626394.novalocal sudo[99467]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt.conf Feb 22 22:30:58 np0005626394.novalocal sudo[99467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:58 np0005626394.novalocal sudo[99467]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99470]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlockd.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99470]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99473]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlogd.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99473]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99476]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtproxyd.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99476]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99479]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtstoraged.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99479]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99482]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirtd.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99482]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99485]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtinterfaced.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99485]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99488]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./network.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99488]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99491]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnetworkd.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99491]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99494]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnodedevd.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99494]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99497]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnwfilterd.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99497]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99500]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-lockd.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99500]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99503]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99503]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99506]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtqemud.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99506]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99509]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtsecretd.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99509]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99512]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Feb 22 22:30:59 np0005626394.novalocal sudo[99512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99512]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99515]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-privkey.pem Feb 22 22:30:59 np0005626394.novalocal sudo[99515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99515]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99518]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./default.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99518]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99521]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./.conf.db.~lock~ Feb 22 22:30:59 np0005626394.novalocal sudo[99521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99521]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99524]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./conf.db Feb 22 22:30:59 np0005626394.novalocal sudo[99524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99524]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99527]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./system-id.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99527]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99527]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99530]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-req.pem Feb 22 22:30:59 np0005626394.novalocal sudo[99530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99530]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99533]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Feb 22 22:30:59 np0005626394.novalocal sudo[99533]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99533]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99536]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-req.pem Feb 22 22:30:59 np0005626394.novalocal sudo[99536]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99536]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99539]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Feb 22 22:30:59 np0005626394.novalocal sudo[99539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99539]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99542]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-req.pem Feb 22 22:30:59 np0005626394.novalocal sudo[99542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99542]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99545]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-cert.pem Feb 22 22:30:59 np0005626394.novalocal sudo[99545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99545]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99548]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Feb 22 22:30:59 np0005626394.novalocal sudo[99548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99548]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99551]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./httpd.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99551]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99554]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./magic Feb 22 22:30:59 np0005626394.novalocal sudo[99554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99554]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99557]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./ports.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99557]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99560]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-cinder_wsgi.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99560]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99563]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-glance_wsgi.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99563]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99566]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-keystone_wsgi.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99566]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99569]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-manila_wsgi.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99569]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99572]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_api_wsgi.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99572]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99575]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_metadata_wsgi.conf Feb 22 22:30:59 np0005626394.novalocal sudo[99575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:30:59 np0005626394.novalocal sudo[99575]: pam_unix(sudo:session): session closed for user root Feb 22 22:30:59 np0005626394.novalocal sudo[99578]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-octavia_wsgi.conf Feb 22 22:31:00 np0005626394.novalocal sudo[99578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99578]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 22:31:00 np0005626394.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 22:31:00 np0005626394.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 22:31:00 np0005626394.novalocal sudo[99582]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-placement_wsgi.conf Feb 22 22:31:00 np0005626394.novalocal sudo[99582]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99582]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99585]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_ssl_vhost.conf Feb 22 22:31:00 np0005626394.novalocal sudo[99585]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99585]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99588]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_vhost.conf Feb 22 22:31:00 np0005626394.novalocal sudo[99588]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99588]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99591]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./openstack-dashboard.conf Feb 22 22:31:00 np0005626394.novalocal sudo[99591]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99591]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99594]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.conf Feb 22 22:31:00 np0005626394.novalocal sudo[99594]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99594]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99597]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.load Feb 22 22:31:00 np0005626394.novalocal sudo[99597]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99597]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99600]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_core.load Feb 22 22:31:00 np0005626394.novalocal sudo[99600]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99600]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99603]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_host.load Feb 22 22:31:00 np0005626394.novalocal sudo[99603]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99603]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99606]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./filter.load Feb 22 22:31:00 np0005626394.novalocal sudo[99606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99606]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99609]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./log_config.load Feb 22 22:31:00 np0005626394.novalocal sudo[99609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99609]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99612]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.conf Feb 22 22:31:00 np0005626394.novalocal sudo[99612]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99612]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99615]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.load Feb 22 22:31:00 np0005626394.novalocal sudo[99615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99615]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99618]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.conf Feb 22 22:31:00 np0005626394.novalocal sudo[99618]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99618]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99621]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.load Feb 22 22:31:00 np0005626394.novalocal sudo[99621]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99621]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99624]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.conf Feb 22 22:31:00 np0005626394.novalocal sudo[99624]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99624]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99627]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.load Feb 22 22:31:00 np0005626394.novalocal sudo[99627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99627]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99630]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./socache_shmcb.load Feb 22 22:31:00 np0005626394.novalocal sudo[99630]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99630]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99633]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.conf Feb 22 22:31:00 np0005626394.novalocal sudo[99633]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99633]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99636]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.load Feb 22 22:31:00 np0005626394.novalocal sudo[99636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99636]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99639]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./systemd.load Feb 22 22:31:00 np0005626394.novalocal sudo[99639]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99639]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99642]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./unixd.load Feb 22 22:31:00 np0005626394.novalocal sudo[99642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99642]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99645]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.conf Feb 22 22:31:00 np0005626394.novalocal sudo[99645]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99645]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99648]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.load Feb 22 22:31:00 np0005626394.novalocal sudo[99648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99648]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99651]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf Feb 22 22:31:00 np0005626394.novalocal sudo[99651]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99651]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99654]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf.puppet Feb 22 22:31:00 np0005626394.novalocal sudo[99654]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99654]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99657]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf.puppet Feb 22 22:31:00 np0005626394.novalocal sudo[99657]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99657]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99660]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf Feb 22 22:31:00 np0005626394.novalocal sudo[99660]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99660]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99663]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626394.novalocal.pem Feb 22 22:31:00 np0005626394.novalocal sudo[99663]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99663]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99666]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./.secret_key_store Feb 22 22:31:00 np0005626394.novalocal sudo[99666]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99666]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99669]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_policy.yaml.txt Feb 22 22:31:00 np0005626394.novalocal sudo[99669]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99669]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99672]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./manila.yaml Feb 22 22:31:00 np0005626394.novalocal sudo[99672]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99672]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:00 np0005626394.novalocal sudo[99675]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./README.txt Feb 22 22:31:00 np0005626394.novalocal sudo[99675]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:00 np0005626394.novalocal sudo[99675]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99678]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.yaml Feb 22 22:31:01 np0005626394.novalocal sudo[99678]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99678]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99681]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./glance.yaml Feb 22 22:31:01 np0005626394.novalocal sudo[99681]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99681]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99684]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.yaml Feb 22 22:31:01 np0005626394.novalocal sudo[99684]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99684]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99687]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.yaml Feb 22 22:31:01 np0005626394.novalocal sudo[99687]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99687]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99690]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./nova.yaml Feb 22 22:31:01 np0005626394.novalocal sudo[99690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99690]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99693]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./glance_policy.yaml.txt Feb 22 22:31:01 np0005626394.novalocal sudo[99693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99693]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99696]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_policy.yaml.txt Feb 22 22:31:01 np0005626394.novalocal sudo[99696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99696]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99699]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./local_settings.txt Feb 22 22:31:01 np0005626394.novalocal sudo[99699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99699]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99702]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_10_set_custom_theme.py.example Feb 22 22:31:01 np0005626394.novalocal sudo[99702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99702]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99705]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_11_toggle_angular_features.py.example Feb 22 22:31:01 np0005626394.novalocal sudo[99705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99705]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99708]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_2010_integration_tests_deprecated.py.example Feb 22 22:31:01 np0005626394.novalocal sudo[99708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99708]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99711]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_20_integration_tests_scaffolds.py.example Feb 22 22:31:01 np0005626394.novalocal sudo[99711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99711]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99714]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_9030_profiler_settings.py.example Feb 22 22:31:01 np0005626394.novalocal sudo[99714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99714]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99717]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_90_manila_shares.py Feb 22 22:31:01 np0005626394.novalocal sudo[99717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99717]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99720]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./manila_policy.yaml.txt Feb 22 22:31:01 np0005626394.novalocal sudo[99720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99720]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99723]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_policy.yaml.txt Feb 22 22:31:01 np0005626394.novalocal sudo[99723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99723]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99726]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./api-extensions.yaml Feb 22 22:31:01 np0005626394.novalocal sudo[99726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99726]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99729]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./nova_policy.yaml.txt Feb 22 22:31:01 np0005626394.novalocal sudo[99729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99729]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99732]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626394.novalocal.pem Feb 22 22:31:01 np0005626394.novalocal sudo[99732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99732]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99735]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyncd.conf Feb 22 22:31:01 np0005626394.novalocal sudo[99735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99735]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99738]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos-addons.repo Feb 22 22:31:01 np0005626394.novalocal sudo[99738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99738]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99741]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos.repo Feb 22 22:31:01 np0005626394.novalocal sudo[99741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99741]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99744]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean-deps.repo Feb 22 22:31:01 np0005626394.novalocal sudo[99744]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99744]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99747]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean.repo Feb 22 22:31:01 np0005626394.novalocal sudo[99747]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99747]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99750]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./redhat.repo Feb 22 22:31:01 np0005626394.novalocal sudo[99750]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99750]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99753]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./passwd Feb 22 22:31:01 np0005626394.novalocal sudo[99753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99753]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99756]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./group Feb 22 22:31:01 np0005626394.novalocal sudo[99756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99756]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99759]: root : PWD=/var/log/weirdo-project/logs/etc/openstack/puppet ; USER=root ; COMMAND=/bin/chmod 644 ./admin-clouds.yaml Feb 22 22:31:01 np0005626394.novalocal sudo[99759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99759]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99762]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./fstab Feb 22 22:31:01 np0005626394.novalocal sudo[99762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99762]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99765]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-api.log Feb 22 22:31:01 np0005626394.novalocal sudo[99765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99765]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99768]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Feb 22 22:31:01 np0005626394.novalocal sudo[99768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99768]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99771]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./volume.log Feb 22 22:31:01 np0005626394.novalocal sudo[99771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99771]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99774]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-manage.log Feb 22 22:31:01 np0005626394.novalocal sudo[99774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99774]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99777]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./backup.log Feb 22 22:31:01 np0005626394.novalocal sudo[99777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99777]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:01 np0005626394.novalocal sudo[99780]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./cache.log Feb 22 22:31:01 np0005626394.novalocal sudo[99780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:01 np0005626394.novalocal sudo[99780]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99783]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./api.log Feb 22 22:31:02 np0005626394.novalocal sudo[99783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99783]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Deactivated successfully. Feb 22 22:31:02 np0005626394.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Consumed 1.204s CPU time. Feb 22 22:31:02 np0005626394.novalocal sudo[99786]: root : PWD=/var/log/weirdo-project/logs/horizon ; USER=root ; COMMAND=/bin/chmod 644 ./horizon.log Feb 22 22:31:02 np0005626394.novalocal sudo[99786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99786]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99790]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.log Feb 22 22:31:02 np0005626394.novalocal sudo[99790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99790]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99793]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone-manage.log Feb 22 22:31:02 np0005626394.novalocal sudo[99793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99793]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99796]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Feb 22 22:31:02 np0005626394.novalocal sudo[99796]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99796]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99799]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-manage.log Feb 22 22:31:02 np0005626394.novalocal sudo[99799]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99799]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99802]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./share.log Feb 22 22:31:02 np0005626394.novalocal sudo[99802]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99802]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99805]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./data.log Feb 22 22:31:02 np0005626394.novalocal sudo[99805]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99805]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99808]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Feb 22 22:31:02 np0005626394.novalocal sudo[99808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99808]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99811]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./server.log Feb 22 22:31:02 np0005626394.novalocal sudo[99811]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99811]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99814]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron-ovn-agent.log Feb 22 22:31:02 np0005626394.novalocal sudo[99814]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99814]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99817]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-vpn-agent.log Feb 22 22:31:02 np0005626394.novalocal sudo[99817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99817]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99820]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Feb 22 22:31:02 np0005626394.novalocal sudo[99820]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99820]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99823]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-manage.log Feb 22 22:31:02 np0005626394.novalocal sudo[99823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99823]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99826]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-conductor.log Feb 22 22:31:02 np0005626394.novalocal sudo[99826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99826]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99829]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.log Feb 22 22:31:02 np0005626394.novalocal sudo[99829]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99829]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99832]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-novncproxy.log Feb 22 22:31:02 np0005626394.novalocal sudo[99832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99832]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99835]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-scheduler.log Feb 22 22:31:02 np0005626394.novalocal sudo[99835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99835]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99838]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-api.log Feb 22 22:31:02 np0005626394.novalocal sudo[99838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99838]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99841]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./health-manager.log Feb 22 22:31:02 np0005626394.novalocal sudo[99841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99841]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99844]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./housekeeping.log Feb 22 22:31:02 np0005626394.novalocal sudo[99844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99844]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99847]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./driver-agent.log Feb 22 22:31:02 np0005626394.novalocal sudo[99847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99847]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99850]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./worker.log Feb 22 22:31:02 np0005626394.novalocal sudo[99850]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99850]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99853]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-nb.log Feb 22 22:31:02 np0005626394.novalocal sudo[99853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99853]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99856]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-sb.log Feb 22 22:31:02 np0005626394.novalocal sudo[99856]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99856]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99859]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd.log Feb 22 22:31:02 np0005626394.novalocal sudo[99859]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99859]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99862]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller.log Feb 22 22:31:02 np0005626394.novalocal sudo[99862]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99862]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99865]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Feb 22 22:31:02 np0005626394.novalocal sudo[99865]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99865]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99868]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-connection.txt Feb 22 22:31:02 np0005626394.novalocal sudo[99868]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99868]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99871]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-ssl.txt Feb 22 22:31:02 np0005626394.novalocal sudo[99871]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99871]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99874]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Feb 22 22:31:02 np0005626394.novalocal sudo[99874]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99874]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99877]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-connection.txt Feb 22 22:31:02 np0005626394.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 22:31:02 np0005626394.novalocal systemd[1]: setroubleshootd.service: Consumed 1.116s CPU time. Feb 22 22:31:02 np0005626394.novalocal sudo[99877]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99877]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99880]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-ssl.txt Feb 22 22:31:02 np0005626394.novalocal sudo[99880]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99880]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99883]: root : PWD=/var/log/weirdo-project/logs/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.log Feb 22 22:31:02 np0005626394.novalocal sudo[99883]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99883]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99886]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.conf Feb 22 22:31:02 np0005626394.novalocal sudo[99886]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99886]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99889]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./syslog.txt Feb 22 22:31:02 np0005626394.novalocal sudo[99889]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99889]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99892]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6.log Feb 22 22:31:02 np0005626394.novalocal sudo[99892]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99892]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:02 np0005626394.novalocal sudo[99895]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6_upgrade.log Feb 22 22:31:02 np0005626394.novalocal sudo[99895]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:02 np0005626394.novalocal sudo[99895]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99898]: root : PWD=/var/log/weirdo-project/logs/mariadb ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb.log Feb 22 22:31:03 np0005626394.novalocal sudo[99898]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99898]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99901]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./dstat.log Feb 22 22:31:03 np0005626394.novalocal sudo[99901]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99901]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99904]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iostat.log Feb 22 22:31:03 np0005626394.novalocal sudo[99904]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99904]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99907]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iotop.log Feb 22 22:31:03 np0005626394.novalocal sudo[99907]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99907]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99910]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./virsh-net-list.txt Feb 22 22:31:03 np0005626394.novalocal sudo[99910]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99910]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99913]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-pki.log Feb 22 22:31:03 np0005626394.novalocal sudo[99913]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99913]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99916]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server.log Feb 22 22:31:03 np0005626394.novalocal sudo[99916]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99916]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99919]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vswitchd.log Feb 22 22:31:03 np0005626394.novalocal sudo[99919]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99919]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99922]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./zuul Feb 22 22:31:03 np0005626394.novalocal sudo[99922]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99922]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99925]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./90-cloud-init-users Feb 22 22:31:03 np0005626394.novalocal sudo[99925]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99925]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99928]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./neutron Feb 22 22:31:03 np0005626394.novalocal sudo[99928]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99928]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99931]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Feb 22 22:31:03 np0005626394.novalocal sudo[99931]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99931]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99934]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./glance Feb 22 22:31:03 np0005626394.novalocal sudo[99934]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99934]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99937]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./nova Feb 22 22:31:03 np0005626394.novalocal sudo[99937]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99937]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99940]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./manila Feb 22 22:31:03 np0005626394.novalocal sudo[99940]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99940]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99943]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./sudoers.txt Feb 22 22:31:03 np0005626394.novalocal sudo[99943]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99943]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99946]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./error_log Feb 22 22:31:03 np0005626394.novalocal sudo[99946]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99946]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99949]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_error.log Feb 22 22:31:03 np0005626394.novalocal sudo[99949]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99949]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99952]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_error.log Feb 22 22:31:03 np0005626394.novalocal sudo[99952]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99952]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99955]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_error_ssl.log Feb 22 22:31:03 np0005626394.novalocal sudo[99955]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99955]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99958]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_error_ssl.log Feb 22 22:31:03 np0005626394.novalocal sudo[99958]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99958]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99961]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_error_ssl.log Feb 22 22:31:03 np0005626394.novalocal sudo[99961]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99961]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99964]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_error_ssl.log Feb 22 22:31:03 np0005626394.novalocal sudo[99964]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99964]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99967]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_error_ssl.log Feb 22 22:31:03 np0005626394.novalocal sudo[99967]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99967]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99970]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_error_ssl.log Feb 22 22:31:03 np0005626394.novalocal sudo[99970]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99970]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99973]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_error_ssl.log Feb 22 22:31:03 np0005626394.novalocal sudo[99973]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99973]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99976]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_error_ssl.log Feb 22 22:31:03 np0005626394.novalocal sudo[99976]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99976]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99979]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_access.log Feb 22 22:31:03 np0005626394.novalocal sudo[99979]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99979]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99982]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_access.log Feb 22 22:31:03 np0005626394.novalocal sudo[99982]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99982]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99985]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_access_ssl.log Feb 22 22:31:03 np0005626394.novalocal sudo[99985]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99985]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99988]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_access_ssl.log Feb 22 22:31:03 np0005626394.novalocal sudo[99988]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99988]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99991]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_access_ssl.log Feb 22 22:31:03 np0005626394.novalocal sudo[99991]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99991]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99994]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_access_ssl.log Feb 22 22:31:03 np0005626394.novalocal sudo[99994]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99994]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[99997]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_access_ssl.log Feb 22 22:31:03 np0005626394.novalocal sudo[99997]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[99997]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[100000]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_access_ssl.log Feb 22 22:31:03 np0005626394.novalocal sudo[100000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:03 np0005626394.novalocal sudo[100000]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:03 np0005626394.novalocal sudo[100003]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_access_ssl.log Feb 22 22:31:04 np0005626394.novalocal sudo[100003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100003]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100006]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_access_ssl.log Feb 22 22:31:04 np0005626394.novalocal sudo[100006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100006]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100009]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.log Feb 22 22:31:04 np0005626394.novalocal sudo[100009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100009]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100012]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.log Feb 22 22:31:04 np0005626394.novalocal sudo[100012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100012]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100015]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./audit.log.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100015]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100018]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./manila Feb 22 22:31:04 np0005626394.novalocal sudo[100018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100018]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100021]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./keystone Feb 22 22:31:04 np0005626394.novalocal sudo[100021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100021]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100024]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Feb 22 22:31:04 np0005626394.novalocal sudo[100024]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100024]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100027]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./nova Feb 22 22:31:04 np0005626394.novalocal sudo[100027]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100027]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100030]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./glance Feb 22 22:31:04 np0005626394.novalocal sudo[100030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100030]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100033]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100033]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100036]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./rpm-qa.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100036]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100039]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./repolist.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100039]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100042]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./installed-packages.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100042]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100045]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./modulelist.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100045]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100048]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.log Feb 22 22:31:04 np0005626394.novalocal sudo[100048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100048]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100051]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.rpm.log Feb 22 22:31:04 np0005626394.novalocal sudo[100051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100051]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100054]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./gem-list.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100054]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100057]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./df.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100057]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100060]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./free.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100060]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100063]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lsmod.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100063]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100066]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./cpuinfo.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100066]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100069]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ps.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100069]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100072]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ip_-d_address.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100072]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100075]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./brctl_show.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100075]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100078]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_show.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100078]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100081]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_list_open_vswitch.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100081]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100084]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100084]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100087]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100087]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100087]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100090]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./netstat.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100090]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100093]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./systemctl.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100093]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100096]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iptables.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100096]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100099]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./mount.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100099]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100102]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./losetup_-al.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100102]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100105]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lvm.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100105]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100108]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./semanage-boolean-list.txt Feb 22 22:31:04 np0005626394.novalocal sudo[100108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:04 np0005626394.novalocal sudo[100108]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:04 np0005626394.novalocal sudo[100111]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.txt Feb 22 22:31:05 np0005626394.novalocal sudo[100111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100111]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100114]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./nova.txt Feb 22 22:31:05 np0005626394.novalocal sudo[100114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100114]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100117]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./placement.txt Feb 22 22:31:05 np0005626394.novalocal sudo[100117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100117]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100120]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.txt Feb 22 22:31:05 np0005626394.novalocal sudo[100120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100120]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100123]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./glance.txt Feb 22 22:31:05 np0005626394.novalocal sudo[100123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100123]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100126]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.txt Feb 22 22:31:05 np0005626394.novalocal sudo[100126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100126]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100129]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./manila.txt Feb 22 22:31:05 np0005626394.novalocal sudo[100129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100129]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100132]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.txt Feb 22 22:31:05 np0005626394.novalocal sudo[100132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100132]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100135]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./nova-cell_v2.txt Feb 22 22:31:05 np0005626394.novalocal sudo[100135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100135]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[98960]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100140]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chown -R 0:0 /var/log/weirdo-project/logs Feb 22 22:31:05 np0005626394.novalocal sudo[100140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100140]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100143]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type l -execdir sudo rm -f {} ; Feb 22 22:31:05 np0005626394.novalocal sudo[100143]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100146]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Feb 22 22:31:05 np0005626394.novalocal sudo[100146]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100146]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100149]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./glance_cinder_store.filters Feb 22 22:31:05 np0005626394.novalocal sudo[100149]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100149]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100152]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Feb 22 22:31:05 np0005626394.novalocal sudo[100152]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100152]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100155]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./ovn.ini Feb 22 22:31:05 np0005626394.novalocal sudo[100155]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100155]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100158]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./plugin.ini Feb 22 22:31:05 np0005626394.novalocal sudo[100158]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100158]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100161]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn.ini Feb 22 22:31:05 np0005626394.novalocal sudo[100161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100161]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100164]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks/autostart ; USER=root ; COMMAND=/bin/rm -f ./default.xml Feb 22 22:31:05 np0005626394.novalocal sudo[100164]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100164]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100167]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_admin_add_share_panel_group.py Feb 22 22:31:05 np0005626394.novalocal sudo[100167]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100167]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100170]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_project_add_share_panel_group.py Feb 22 22:31:05 np0005626394.novalocal sudo[100170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100170]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100173]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_admin_add_shares_panel_to_share_panel_group.py Feb 22 22:31:05 np0005626394.novalocal sudo[100173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100173]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100176]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_project_add_shares_panel_to_share_panel_group.py Feb 22 22:31:05 np0005626394.novalocal sudo[100176]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100176]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100179]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_admin_add_share_snapshots_panel_to_share_panel_group.py Feb 22 22:31:05 np0005626394.novalocal sudo[100179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100179]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100182]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_project_add_share_snapshots_panel_to_share_panel_group.py Feb 22 22:31:05 np0005626394.novalocal sudo[100182]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100182]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100185]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9030_manila_admin_add_share_types_panel_to_share_panel_group.py Feb 22 22:31:05 np0005626394.novalocal sudo[100185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100185]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100188]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_admin_add_share_networks_panel_to_share_panel_group.py Feb 22 22:31:05 np0005626394.novalocal sudo[100188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100188]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100191]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_project_add_share_networks_panel_to_share_panel_group.py Feb 22 22:31:05 np0005626394.novalocal sudo[100191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100191]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100194]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_admin_add_security_services_panel_to_share_panel_group.py Feb 22 22:31:05 np0005626394.novalocal sudo[100194]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100194]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100197]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_project_add_security_services_panel_to_share_panel_group.py Feb 22 22:31:05 np0005626394.novalocal sudo[100197]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100197]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100200]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9060_manila_admin_add_share_servers_panel_to_share_panel_group.py Feb 22 22:31:05 np0005626394.novalocal sudo[100200]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100200]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100203]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9070_manila_admin_add_share_instances_panel_to_share_panel_group.py Feb 22 22:31:05 np0005626394.novalocal sudo[100203]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:05 np0005626394.novalocal sudo[100203]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:05 np0005626394.novalocal sudo[100206]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_admin_add_share_groups_panel_to_share_panel_group.py Feb 22 22:31:05 np0005626394.novalocal sudo[100206]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100206]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100209]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_project_add_share_groups_panel_to_share_panel_group.py Feb 22 22:31:06 np0005626394.novalocal sudo[100209]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100209]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100212]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_admin_add_share_group_snapshots_panel_to_share_panel_group.py Feb 22 22:31:06 np0005626394.novalocal sudo[100212]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100212]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100215]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_project_add_share_group_snapshots_panel_to_share_panel_group.py Feb 22 22:31:06 np0005626394.novalocal sudo[100215]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100215]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100218]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9090_manila_admin_add_share_group_types_panel_to_share_panel_group.py Feb 22 22:31:06 np0005626394.novalocal sudo[100218]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100218]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100221]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_admin_add_user_messages_panel_to_share_panel_group.py Feb 22 22:31:06 np0005626394.novalocal sudo[100221]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100221]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100224]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_project_add_user_messages_panel_to_share_panel_group.py Feb 22 22:31:06 np0005626394.novalocal sudo[100224]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100224]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100143]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100228]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20260222_222726.log /var/log/weirdo-project/logs/puppet-20260222_222726.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100228]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100231]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet.log /var/log/weirdo-project/logs/puppet.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100231]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100234]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-api.log /var/log/weirdo-project/logs/cinder/cinder-api.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100234]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100237]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/scheduler.log /var/log/weirdo-project/logs/cinder/scheduler.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100237]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100240]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/volume.log /var/log/weirdo-project/logs/cinder/volume.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100240]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100243]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-manage.log /var/log/weirdo-project/logs/cinder/cinder-manage.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100243]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100246]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/backup.log /var/log/weirdo-project/logs/cinder/backup.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100246]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100249]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/cache.log /var/log/weirdo-project/logs/glance/cache.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100249]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100252]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/api.log /var/log/weirdo-project/logs/glance/api.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100252]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100255]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/horizon/horizon.log /var/log/weirdo-project/logs/horizon/horizon.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100255]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100258]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone.log /var/log/weirdo-project/logs/keystone/keystone.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100258]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100261]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone-manage.log /var/log/weirdo-project/logs/keystone/keystone-manage.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100261]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100264]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/scheduler.log /var/log/weirdo-project/logs/manila/scheduler.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100264]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100267]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-manage.log /var/log/weirdo-project/logs/manila/manila-manage.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100267]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100270]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/share.log /var/log/weirdo-project/logs/manila/share.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100270]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100273]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/data.log /var/log/weirdo-project/logs/manila/data.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100273]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100276]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/privsep-helper.log /var/log/weirdo-project/logs/manila/privsep-helper.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100276]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100276]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100279]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/server.log /var/log/weirdo-project/logs/neutron/server.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100279]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100282]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.log /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100282]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100285]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.log /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100285]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100288]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/privsep-helper.log /var/log/weirdo-project/logs/neutron/privsep-helper.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100288]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100291]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-manage.log /var/log/weirdo-project/logs/nova/nova-manage.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100291]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100294]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-conductor.log /var/log/weirdo-project/logs/nova/nova-conductor.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100294]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:06 np0005626394.novalocal sudo[100297]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-compute.log /var/log/weirdo-project/logs/nova/nova-compute.txt Feb 22 22:31:06 np0005626394.novalocal sudo[100297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:06 np0005626394.novalocal sudo[100297]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100300]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-novncproxy.log /var/log/weirdo-project/logs/nova/nova-novncproxy.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100300]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100303]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-scheduler.log /var/log/weirdo-project/logs/nova/nova-scheduler.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100303]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100303]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100307]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-api.log /var/log/weirdo-project/logs/nova/nova-api.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100307]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100311]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/health-manager.log /var/log/weirdo-project/logs/octavia/health-manager.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100311]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100314]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/housekeeping.log /var/log/weirdo-project/logs/octavia/housekeeping.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100314]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100317]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/driver-agent.log /var/log/weirdo-project/logs/octavia/driver-agent.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100317]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100320]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/worker.log /var/log/weirdo-project/logs/octavia/worker.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100320]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100323]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100323]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100326]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100326]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100329]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-northd.log /var/log/weirdo-project/logs/ovn/ovn-northd.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100329]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100332]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-controller.log /var/log/weirdo-project/logs/ovn/ovn-controller.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100332]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100335]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/placement/placement.log /var/log/weirdo-project/logs/placement/placement.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100335]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100338]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100338]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100341]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100341]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100344]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/mariadb/mariadb.log /var/log/weirdo-project/logs/mariadb/mariadb.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100344]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100347]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dstat.log /var/log/weirdo-project/logs/dstat.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100347]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100350]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iostat.log /var/log/weirdo-project/logs/iostat.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100350]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100353]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iotop.log /var/log/weirdo-project/logs/iotop.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100353]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100356]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-pki.log /var/log/weirdo-project/logs/openvswitch/ovs-pki.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100356]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100359]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovsdb-server.log /var/log/weirdo-project/logs/openvswitch/ovsdb-server.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100359]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100362]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.log /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100362]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100365]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_error.log /var/log/weirdo-project/logs/apache/horizon_error.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100365]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100368]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_error.log /var/log/weirdo-project/logs/apache/horizon_ssl_error.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100368]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100371]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100371]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100374]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100374]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100377]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100377]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100380]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100380]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100383]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100383]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100386]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100386]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100389]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100389]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:07 np0005626394.novalocal sudo[100392]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.txt Feb 22 22:31:07 np0005626394.novalocal sudo[100392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:07 np0005626394.novalocal sudo[100392]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100395]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_access.log /var/log/weirdo-project/logs/apache/horizon_access.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100395]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100398]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_access.log /var/log/weirdo-project/logs/apache/horizon_ssl_access.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100398]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100401]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100401]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100404]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100404]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100407]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100407]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100410]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100410]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100413]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100413]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100416]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100416]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100419]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100419]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100422]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100422]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100425]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/redis.log /var/log/weirdo-project/logs/redis/redis.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100425]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100428]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/sentinel.log /var/log/weirdo-project/logs/redis/sentinel.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100428]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100431]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.log /var/log/weirdo-project/logs/dnf/dnf.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100431]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100434]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.rpm.log /var/log/weirdo-project/logs/dnf/dnf.rpm.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100434]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100438]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/zuul /var/log/weirdo-project/logs/sudoers.d/zuul.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100438]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100441]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100441]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100444]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/neutron /var/log/weirdo-project/logs/sudoers.d/neutron.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100444]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100447]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/cinder /var/log/weirdo-project/logs/sudoers.d/cinder.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100447]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100450]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/glance /var/log/weirdo-project/logs/sudoers.d/glance.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100450]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100453]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/nova /var/log/weirdo-project/logs/sudoers.d/nova.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100453]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100456]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/manila /var/log/weirdo-project/logs/sudoers.d/manila.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100456]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100459]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100459]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100462]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100462]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100465]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100465]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100468]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100468]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100471]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100471]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100474]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100474]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100477]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100477]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100480]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100480]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100483]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100483]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100486]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100486]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100489]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100489]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100492]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100492]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100495]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes.txt Feb 22 22:31:08 np0005626394.novalocal sudo[100495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:08 np0005626394.novalocal sudo[100495]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:08 np0005626394.novalocal sudo[100498]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100498]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100501]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100501]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100504]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100504]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100507]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100507]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100510]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100510]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100510]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100513]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100513]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100513]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100516]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100516]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100516]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100519]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100519]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100522]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100522]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100525]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100525]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100528]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100528]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100531]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100531]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100534]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100534]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100537]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005626394.novalocal.pem /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005626394.novalocal.pem.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100537]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100540]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/api-paste.ini /var/log/weirdo-project/logs/etc/cinder/api-paste.ini.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100540]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100543]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/cinder.conf /var/log/weirdo-project/logs/etc/cinder/cinder.conf.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100543]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100546]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/resource_filters.json /var/log/weirdo-project/logs/etc/cinder/resource_filters.json.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100546]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100549]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100549]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100552]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/policy.yaml /var/log/weirdo-project/logs/etc/cinder/policy.yaml.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100552]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100555]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100555]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100555]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100558]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api.conf /var/log/weirdo-project/logs/etc/glance/glance-api.conf.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100558]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100558]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100561]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-cache.conf /var/log/weirdo-project/logs/etc/glance/glance-cache.conf.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100561]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100564]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100564]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100564]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100567]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100567]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100567]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100570]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-swift.conf /var/log/weirdo-project/logs/etc/glance/glance-swift.conf.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100570]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100570]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100573]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/rootwrap.conf /var/log/weirdo-project/logs/etc/glance/rootwrap.conf.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100573]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100573]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100576]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/schema-image.json /var/log/weirdo-project/logs/etc/glance/schema-image.json.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100576]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100576]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100579]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/policy.yaml /var/log/weirdo-project/logs/etc/glance/policy.yaml.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100579]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100579]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100582]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100582]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100582]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100585]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100585]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100585]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100588]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100588]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100588]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100591]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100591]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100591]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100594]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100594]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100594]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100597]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100597]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100597]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100600]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100600]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100600]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:09 np0005626394.novalocal sudo[100603]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json.txt Feb 22 22:31:09 np0005626394.novalocal sudo[100603]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:09 np0005626394.novalocal sudo[100603]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100606]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100606]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100609]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100609]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100612]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100612]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100612]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100615]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100615]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100618]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100618]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100618]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100621]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100621]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100621]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100624]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100624]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100624]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100627]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100627]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100630]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100630]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100630]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100633]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100633]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100633]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100636]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100636]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100639]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100639]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100639]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100642]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100642]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100645]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100645]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100645]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100648]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100648]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100651]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100651]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100651]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100654]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100654]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100654]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100657]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100657]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100657]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100660]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100660]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100660]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100663]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100663]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100663]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100666]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100666]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100666]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100669]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100669]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100669]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100672]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100672]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100672]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100675]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100675]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100675]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100678]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100678]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100678]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100681]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005626394.novalocal.pem /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005626394.novalocal.pem.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100681]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100681]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100684]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005626394.novalocal.pem /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005626394.novalocal.pem.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100684]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100684]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100687]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100687]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100687]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100690]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100690]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100693]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100693]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:10 np0005626394.novalocal sudo[100696]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/1 /var/log/weirdo-project/logs/etc/keystone/credential-keys/1.txt Feb 22 22:31:10 np0005626394.novalocal sudo[100696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:10 np0005626394.novalocal sudo[100696]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100699]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/0 /var/log/weirdo-project/logs/etc/keystone/credential-keys/0.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100699]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100702]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100702]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100705]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/keystone.conf /var/log/weirdo-project/logs/etc/keystone/keystone.conf.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100705]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100708]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/logging.conf /var/log/weirdo-project/logs/etc/keystone/logging.conf.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100708]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100711]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100711]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100714]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.yaml /var/log/weirdo-project/logs/etc/keystone/policy.yaml.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100714]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100717]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005626394.novalocal.pem /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005626394.novalocal.pem.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100717]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100720]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/api-paste.ini /var/log/weirdo-project/logs/etc/manila/api-paste.ini.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100720]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100723]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/manila.conf /var/log/weirdo-project/logs/etc/manila/manila.conf.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100723]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100726]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/rootwrap.conf /var/log/weirdo-project/logs/etc/manila/rootwrap.conf.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100726]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100729]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/policy.yaml /var/log/weirdo-project/logs/etc/manila/policy.yaml.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100729]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100732]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron.conf /var/log/weirdo-project/logs/etc/neutron/neutron.conf.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100732]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100735]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100735]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100738]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/api-paste.ini /var/log/weirdo-project/logs/etc/neutron/api-paste.ini.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100738]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100741]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100741]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100744]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100744]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100744]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100747]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100747]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100747]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100750]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100750]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100750]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100753]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100753]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100756]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100756]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100759]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100759]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100762]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100762]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100765]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100765]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100768]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100768]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100771]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100771]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100774]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/policy.yaml /var/log/weirdo-project/logs/etc/neutron/policy.yaml.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100774]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100777]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/conf.d/README /var/log/weirdo-project/logs/etc/neutron/conf.d/README.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100777]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100780]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100780]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100783]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100783]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100786]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100786]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100789]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005626394.novalocal.pem /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005626394.novalocal.pem.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100789]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100792]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005626394.novalocal.pem /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005626394.novalocal.pem.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100792]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100795]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/api-paste.ini /var/log/weirdo-project/logs/etc/nova/api-paste.ini.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100795]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100798]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova.conf /var/log/weirdo-project/logs/etc/nova/nova.conf.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100798]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100801]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/release /var/log/weirdo-project/logs/etc/nova/release.txt Feb 22 22:31:11 np0005626394.novalocal sudo[100801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:11 np0005626394.novalocal sudo[100801]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:11 np0005626394.novalocal sudo[100804]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/rootwrap.conf /var/log/weirdo-project/logs/etc/nova/rootwrap.conf.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100804]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100807]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.yaml /var/log/weirdo-project/logs/etc/nova/policy.yaml.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100807]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100810]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova-compute.conf /var/log/weirdo-project/logs/etc/nova/nova-compute.conf.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100810]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100813]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/octavia.conf /var/log/weirdo-project/logs/etc/octavia/octavia.conf.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100813]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100816]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/policy.yaml /var/log/weirdo-project/logs/etc/octavia/policy.yaml.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100816]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100819]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100819]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100822]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100822]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100825]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100825]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100825]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100828]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100828]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100831]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100831]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100834]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100834]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100837]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100837]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100840]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100840]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100843]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100843]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100846]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005626394.novalocal.pem /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005626394.novalocal.pem.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100846]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100849]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005626394.novalocal.pem /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005626394.novalocal.pem.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100849]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100849]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100852]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/placement.conf /var/log/weirdo-project/logs/etc/placement/placement.conf.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100852]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100855]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.yaml /var/log/weirdo-project/logs/etc/placement/policy.yaml.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100855]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100855]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100858]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100858]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100858]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100861]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100861]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100864]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100864]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100864]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100867]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100867]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100870]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/tempest.conf /var/log/weirdo-project/logs/etc/tempest/tempest.conf.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100870]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100873]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100873]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100873]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100876]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.conf /var/log/weirdo-project/logs/etc/rsyslog.conf.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100876]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100879]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100879]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100882]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100882]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100885]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100885]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100888]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/inetrc /var/log/weirdo-project/logs/etc/rabbitmq/inetrc.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100888]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100891]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100891]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100894]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100894]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100897]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005626394.novalocal.pem /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005626394.novalocal.pem.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100897]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:12 np0005626394.novalocal sudo[100900]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf /var/log/weirdo-project/logs/etc/my.cnf.txt Feb 22 22:31:12 np0005626394.novalocal sudo[100900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:12 np0005626394.novalocal sudo[100900]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100903]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100903]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100906]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100906]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100909]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100909]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100912]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100912]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100915]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100915]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100918]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100918]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100921]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100921]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100924]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/np0005626394.novalocal.pem /var/log/weirdo-project/logs/etc/my.cnf.d/np0005626394.novalocal.pem.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100924]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100927]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100927]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100927]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100930]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100930]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100930]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100933]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100933]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100933]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100936]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100936]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100936]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100939]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100939]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100942]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100942]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100945]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100945]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100948]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100948]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100951]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100951]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100954]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100954]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100957]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100957]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100960]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/network.conf /var/log/weirdo-project/logs/etc/libvirt/network.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100960]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100963]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100963]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100966]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100966]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100969]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100969]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100972]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100972]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100975]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu.conf /var/log/weirdo-project/logs/etc/libvirt/qemu.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100975]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100978]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100978]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100981]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100981]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100984]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100984]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100987]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100987]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100990]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/default.conf /var/log/weirdo-project/logs/etc/openvswitch/default.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100990]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100993]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~ /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100993]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100996]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/conf.db /var/log/weirdo-project/logs/etc/openvswitch/conf.db.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100996]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:13 np0005626394.novalocal sudo[100999]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf.txt Feb 22 22:31:13 np0005626394.novalocal sudo[100999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:13 np0005626394.novalocal sudo[100999]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101002]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101002]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101005]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101005]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101008]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101008]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101011]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101011]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101014]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101014]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101017]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101017]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101020]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101020]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101023]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101023]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101026]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/magic /var/log/weirdo-project/logs/etc/httpd/conf/magic.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101026]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101029]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101029]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101032]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101032]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101035]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101035]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101038]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101038]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101041]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101041]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101044]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101044]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101047]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101047]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101050]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101050]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101050]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101053]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101053]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101053]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101056]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101056]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101056]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101059]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101059]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101059]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101062]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101062]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101062]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101065]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101065]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101065]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101068]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101068]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101068]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101071]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101071]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101071]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101074]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101074]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101074]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101077]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101077]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101077]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101080]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101080]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101080]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101083]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101083]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101083]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101086]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101086]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101086]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101089]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101089]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101089]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101092]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101092]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101092]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101095]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101095]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101095]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101098]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load.txt Feb 22 22:31:14 np0005626394.novalocal sudo[101098]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:14 np0005626394.novalocal sudo[101098]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:14 np0005626394.novalocal sudo[101101]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101101]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101101]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101104]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101104]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101104]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101107]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101107]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101107]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101110]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101110]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101110]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101113]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101113]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101113]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101116]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101116]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101116]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101119]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101119]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101119]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101122]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf /var/log/weirdo-project/logs/etc/redis/redis.conf.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101122]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101122]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101125]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101125]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101125]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101128]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101128]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101131]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf /var/log/weirdo-project/logs/etc/redis/sentinel.conf.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101131]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101131]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101134]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005626394.novalocal.pem /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005626394.novalocal.pem.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101134]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101137]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101137]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101137]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101140]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101140]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101143]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101143]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101143]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101146]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101146]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101146]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101149]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101149]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101149]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101152]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101152]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101152]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101155]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101155]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101155]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101158]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101158]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101158]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101161]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101161]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101164]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101164]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101164]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101167]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101167]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101167]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101170]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101170]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101173]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101173]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101176]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101176]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101176]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101179]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101179]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101182]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101182]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101182]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101185]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101185]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101188]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101188]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101191]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101191]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101194]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101194]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101194]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101197]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101197]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101197]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101200]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101200]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101200]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101203]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005626394.novalocal.pem /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005626394.novalocal.pem.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101203]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101203]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101206]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101206]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101206]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:15 np0005626394.novalocal sudo[101209]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo.txt Feb 22 22:31:15 np0005626394.novalocal sudo[101209]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:15 np0005626394.novalocal sudo[101209]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:16 np0005626394.novalocal sudo[101212]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo.txt Feb 22 22:31:16 np0005626394.novalocal sudo[101212]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:16 np0005626394.novalocal sudo[101212]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:16 np0005626394.novalocal sudo[101215]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo.txt Feb 22 22:31:16 np0005626394.novalocal sudo[101215]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:16 np0005626394.novalocal sudo[101215]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:16 np0005626394.novalocal sudo[101218]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo.txt Feb 22 22:31:16 np0005626394.novalocal sudo[101218]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:16 np0005626394.novalocal sudo[101218]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:16 np0005626394.novalocal sudo[101221]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo.txt Feb 22 22:31:16 np0005626394.novalocal sudo[101221]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:16 np0005626394.novalocal sudo[101221]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:16 np0005626394.novalocal sudo[101224]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/passwd /var/log/weirdo-project/logs/etc/passwd.txt Feb 22 22:31:16 np0005626394.novalocal sudo[101224]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:16 np0005626394.novalocal sudo[101224]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:16 np0005626394.novalocal sudo[101227]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/group /var/log/weirdo-project/logs/etc/group.txt Feb 22 22:31:16 np0005626394.novalocal sudo[101227]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:16 np0005626394.novalocal sudo[101227]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:16 np0005626394.novalocal sudo[101230]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml.txt Feb 22 22:31:16 np0005626394.novalocal sudo[101230]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:16 np0005626394.novalocal sudo[101230]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:16 np0005626394.novalocal sudo[101233]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/fstab /var/log/weirdo-project/logs/etc/fstab.txt Feb 22 22:31:16 np0005626394.novalocal sudo[101233]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 22:31:16 np0005626394.novalocal sudo[101233]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:16 np0005626394.novalocal sudo[98061]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:16 np0005626394.novalocal sudo[101337]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ssvzalhvvzbkqumqgurwwrlaqzvkdrrm ; /usr/bin/python3' Feb 22 22:31:16 np0005626394.novalocal sudo[101337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:31:16 np0005626394.novalocal python3[101339]: ansible-command Invoked with creates=/var/log/weirdo/cpuinfo.txt _raw_params=cat /proc/cpuinfo >/var/log/weirdo/cpuinfo.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 22:31:16 np0005626394.novalocal sudo[101337]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:16 np0005626394.novalocal sudo[101345]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ahmzuahiuaknceizvenpeaifnzsrvfya ; /usr/bin/python3' Feb 22 22:31:16 np0005626394.novalocal sudo[101345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:31:16 np0005626394.novalocal python3[101347]: ansible-command Invoked with creates=/var/log/weirdo/df.txt _raw_params=df -h >/var/log/weirdo/df.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 22:31:16 np0005626394.novalocal sudo[101345]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:16 np0005626394.novalocal sudo[101352]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ahrszlxnqisqkqakenbjsgppdtfpoolr ; /usr/bin/python3' Feb 22 22:31:16 np0005626394.novalocal sudo[101352]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:31:17 np0005626394.novalocal python3[101354]: ansible-command Invoked with creates=/var/log/weirdo/dmesg.txt _raw_params=dmesg -T >/var/log/weirdo/dmesg.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 22:31:17 np0005626394.novalocal sudo[101352]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:17 np0005626394.novalocal sudo[101361]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wemhuhzclwqrwbkihuhokpwsbqaemkqc ; /usr/bin/python3' Feb 22 22:31:17 np0005626394.novalocal sudo[101361]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:31:17 np0005626394.novalocal python3[101363]: ansible-command Invoked with creates=/var/log/weirdo/fdisk.txt _raw_params=fdisk -l >/var/log/weirdo/fdisk.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 22:31:17 np0005626394.novalocal sudo[101361]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:17 np0005626394.novalocal sudo[101368]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gsrqugxreciqqsjlyxwcwzgprundcswn ; /usr/bin/python3' Feb 22 22:31:17 np0005626394.novalocal sudo[101368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:31:17 np0005626394.novalocal python3[101370]: ansible-command Invoked with creates=/var/log/weirdo/getenforce.txt _raw_params=getenforce >/var/log/weirdo/getenforce.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 22:31:17 np0005626394.novalocal sudo[101368]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:17 np0005626394.novalocal sudo[101375]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-aykdvowmystlrszeugmlvhhqetkbrgip ; /usr/bin/python3' Feb 22 22:31:17 np0005626394.novalocal sudo[101375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:31:17 np0005626394.novalocal python3[101377]: ansible-command Invoked with creates=/var/log/weirdo/hosts.txt _raw_params=cat /etc/hosts >/var/log/weirdo/hosts.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 22:31:17 np0005626394.novalocal sudo[101375]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:17 np0005626394.novalocal sudo[101382]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cbvbmsuirvesmgihqnwjacdxrdimdopo ; /usr/bin/python3' Feb 22 22:31:17 np0005626394.novalocal sudo[101382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:31:18 np0005626394.novalocal python3[101384]: ansible-command Invoked with creates=/var/log/weirdo/ip.txt _raw_params=ip a >/var/log/weirdo/ip.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 22:31:18 np0005626394.novalocal sudo[101382]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:18 np0005626394.novalocal sudo[101389]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mytpsfkdaodschaqrhvjrvcccqifbjke ; /usr/bin/python3' Feb 22 22:31:18 np0005626394.novalocal sudo[101389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:31:18 np0005626394.novalocal python3[101391]: ansible-command Invoked with creates=/var/log/weirdo/iptables.txt _raw_params=iptables -vnL >/var/log/weirdo/iptables.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 22:31:18 np0005626394.novalocal sudo[101389]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:18 np0005626394.novalocal sudo[101396]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kzuwilcvgsruyyqsfyuethsbjeehqlpv ; /usr/bin/python3' Feb 22 22:31:18 np0005626394.novalocal sudo[101396]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:31:18 np0005626394.novalocal python3[101398]: ansible-command Invoked with creates=/var/log/weirdo/iptables_nat.txt _raw_params=iptables -vnL -t nat >/var/log/weirdo/iptables_nat.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 22:31:18 np0005626394.novalocal sudo[101396]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:18 np0005626394.novalocal sudo[101403]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lplyhxzcraqtzfdnipnsbpxbrqtiglpm ; /usr/bin/python3' Feb 22 22:31:18 np0005626394.novalocal sudo[101403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:31:18 np0005626394.novalocal python3[101405]: ansible-command Invoked with creates=/var/log/weirdo/iptables_mangle.txt _raw_params=iptables -vnL -t mangle >/var/log/weirdo/iptables_mangle.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 22:31:18 np0005626394.novalocal sudo[101403]: pam_unix(sudo:session): session closed for user root Feb 22 22:31:18 np0005626394.novalocal sudo[101410]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fqyqtofcsrplrcimnmpnxtuakfwbgucp ; /usr/bin/python3' Feb 22 22:31:18 np0005626394.novalocal sudo[101410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 22:31:18 np0005626394.novalocal python3[101412]: ansible-command Invoked with creates=/var/log/weirdo/journalctl.txt _raw_params=journalctl --no-pager >/var/log/weirdo/journalctl.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None