Oct 13 20:14:46 localhost kernel: Linux version 5.14.0-621.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-11), GNU ld version 2.35.2-67.el9) #1 SMP PREEMPT_DYNAMIC Tue Sep 30 07:37:35 UTC 2025 Oct 13 20:14:46 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Oct 13 20:14:46 localhost kernel: Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-621.el9.x86_64 root=UUID=9839e2e1-98a2-4594-b609-79d514deb0a3 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Oct 13 20:14:46 localhost kernel: BIOS-provided physical RAM map: Oct 13 20:14:46 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 13 20:14:46 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 13 20:14:46 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 13 20:14:46 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Oct 13 20:14:46 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Oct 13 20:14:46 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 13 20:14:46 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 13 20:14:46 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable Oct 13 20:14:46 localhost kernel: NX (Execute Disable) protection: active Oct 13 20:14:46 localhost kernel: APIC: Static calls initialized Oct 13 20:14:46 localhost kernel: SMBIOS 2.8 present. Oct 13 20:14:46 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Oct 13 20:14:46 localhost kernel: Hypervisor detected: KVM Oct 13 20:14:46 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 13 20:14:46 localhost kernel: kvm-clock: using sched offset of 4693857235 cycles Oct 13 20:14:46 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 13 20:14:46 localhost kernel: tsc: Detected 2799.998 MHz processor Oct 13 20:14:46 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 13 20:14:46 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 13 20:14:46 localhost kernel: last_pfn = 0x240000 max_arch_pfn = 0x400000000 Oct 13 20:14:46 localhost kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Oct 13 20:14:46 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 13 20:14:46 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Oct 13 20:14:46 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Oct 13 20:14:46 localhost kernel: Using GB pages for direct mapping Oct 13 20:14:46 localhost kernel: RAMDISK: [mem 0x2d858000-0x32c23fff] Oct 13 20:14:46 localhost kernel: ACPI: Early table checksum verification disabled Oct 13 20:14:46 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Oct 13 20:14:46 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 13 20:14:46 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 13 20:14:46 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 13 20:14:46 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Oct 13 20:14:46 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 13 20:14:46 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 13 20:14:46 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Oct 13 20:14:46 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Oct 13 20:14:46 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Oct 13 20:14:46 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Oct 13 20:14:46 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Oct 13 20:14:46 localhost kernel: No NUMA configuration found Oct 13 20:14:46 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000023fffffff] Oct 13 20:14:46 localhost kernel: NODE_DATA(0) allocated [mem 0x23ffd5000-0x23fffffff] Oct 13 20:14:46 localhost kernel: crashkernel reserved: 0x00000000af000000 - 0x00000000bf000000 (256 MB) Oct 13 20:14:46 localhost kernel: Zone ranges: Oct 13 20:14:46 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 13 20:14:46 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 13 20:14:46 localhost kernel: Normal [mem 0x0000000100000000-0x000000023fffffff] Oct 13 20:14:46 localhost kernel: Device empty Oct 13 20:14:46 localhost kernel: Movable zone start for each node Oct 13 20:14:46 localhost kernel: Early memory node ranges Oct 13 20:14:46 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 13 20:14:46 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Oct 13 20:14:46 localhost kernel: node 0: [mem 0x0000000100000000-0x000000023fffffff] Oct 13 20:14:46 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000023fffffff] Oct 13 20:14:46 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 13 20:14:46 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 13 20:14:46 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Oct 13 20:14:46 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Oct 13 20:14:46 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 13 20:14:46 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 13 20:14:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 13 20:14:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 13 20:14:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 13 20:14:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 13 20:14:46 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 13 20:14:46 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 13 20:14:46 localhost kernel: TSC deadline timer available Oct 13 20:14:46 localhost kernel: CPU topo: Max. logical packages: 8 Oct 13 20:14:46 localhost kernel: CPU topo: Max. logical dies: 8 Oct 13 20:14:46 localhost kernel: CPU topo: Max. dies per package: 1 Oct 13 20:14:46 localhost kernel: CPU topo: Max. threads per core: 1 Oct 13 20:14:46 localhost kernel: CPU topo: Num. cores per package: 1 Oct 13 20:14:46 localhost kernel: CPU topo: Num. threads per package: 1 Oct 13 20:14:46 localhost kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Oct 13 20:14:46 localhost kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Oct 13 20:14:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Oct 13 20:14:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Oct 13 20:14:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Oct 13 20:14:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Oct 13 20:14:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Oct 13 20:14:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Oct 13 20:14:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Oct 13 20:14:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Oct 13 20:14:46 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Oct 13 20:14:46 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Oct 13 20:14:46 localhost kernel: Booting paravirtualized kernel on KVM Oct 13 20:14:46 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 13 20:14:46 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Oct 13 20:14:46 localhost kernel: percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 Oct 13 20:14:46 localhost kernel: pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 Oct 13 20:14:46 localhost kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Oct 13 20:14:46 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Oct 13 20:14:46 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-621.el9.x86_64 root=UUID=9839e2e1-98a2-4594-b609-79d514deb0a3 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Oct 13 20:14:46 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-621.el9.x86_64", will be passed to user space. Oct 13 20:14:46 localhost kernel: random: crng init done Oct 13 20:14:46 localhost kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Oct 13 20:14:46 localhost kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 13 20:14:46 localhost kernel: Fallback order for Node 0: 0 Oct 13 20:14:46 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 2064091 Oct 13 20:14:46 localhost kernel: Policy zone: Normal Oct 13 20:14:46 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 13 20:14:46 localhost kernel: software IO TLB: area num 8. Oct 13 20:14:46 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Oct 13 20:14:46 localhost kernel: ftrace: allocating 49162 entries in 193 pages Oct 13 20:14:46 localhost kernel: ftrace: allocated 193 pages with 3 groups Oct 13 20:14:46 localhost kernel: Dynamic Preempt: voluntary Oct 13 20:14:46 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Oct 13 20:14:46 localhost kernel: rcu: RCU event tracing is enabled. Oct 13 20:14:46 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Oct 13 20:14:46 localhost kernel: Trampoline variant of Tasks RCU enabled. Oct 13 20:14:46 localhost kernel: Rude variant of Tasks RCU enabled. Oct 13 20:14:46 localhost kernel: Tracing variant of Tasks RCU enabled. Oct 13 20:14:46 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 13 20:14:46 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Oct 13 20:14:46 localhost kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Oct 13 20:14:46 localhost kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Oct 13 20:14:46 localhost kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Oct 13 20:14:46 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Oct 13 20:14:46 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Oct 13 20:14:46 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Oct 13 20:14:46 localhost kernel: Console: colour VGA+ 80x25 Oct 13 20:14:46 localhost kernel: printk: console [ttyS0] enabled Oct 13 20:14:46 localhost kernel: ACPI: Core revision 20230331 Oct 13 20:14:46 localhost kernel: APIC: Switch to symmetric I/O mode setup Oct 13 20:14:46 localhost kernel: x2apic enabled Oct 13 20:14:46 localhost kernel: APIC: Switched APIC routing to: physical x2apic Oct 13 20:14:46 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Oct 13 20:14:46 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Oct 13 20:14:46 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 13 20:14:46 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Oct 13 20:14:46 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Oct 13 20:14:46 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 13 20:14:46 localhost kernel: Spectre V2 : Mitigation: Retpolines Oct 13 20:14:46 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Oct 13 20:14:46 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Oct 13 20:14:46 localhost kernel: RETBleed: Mitigation: untrained return thunk Oct 13 20:14:46 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 13 20:14:46 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Oct 13 20:14:46 localhost kernel: Speculative Return Stack Overflow: IBPB-extending microcode not applied! Oct 13 20:14:46 localhost kernel: Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options. Oct 13 20:14:46 localhost kernel: x86/bugs: return thunk changed Oct 13 20:14:46 localhost kernel: Speculative Return Stack Overflow: Vulnerable: Safe RET, no microcode Oct 13 20:14:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 13 20:14:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 13 20:14:46 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 13 20:14:46 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 13 20:14:46 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Oct 13 20:14:46 localhost kernel: Freeing SMP alternatives memory: 40K Oct 13 20:14:46 localhost kernel: pid_max: default: 32768 minimum: 301 Oct 13 20:14:46 localhost kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf Oct 13 20:14:46 localhost kernel: landlock: Up and running. Oct 13 20:14:46 localhost kernel: Yama: becoming mindful. Oct 13 20:14:46 localhost kernel: SELinux: Initializing. Oct 13 20:14:46 localhost kernel: LSM support for eBPF active Oct 13 20:14:46 localhost kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 13 20:14:46 localhost kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 13 20:14:46 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Oct 13 20:14:46 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Oct 13 20:14:46 localhost kernel: ... version: 0 Oct 13 20:14:46 localhost kernel: ... bit width: 48 Oct 13 20:14:46 localhost kernel: ... generic registers: 6 Oct 13 20:14:46 localhost kernel: ... value mask: 0000ffffffffffff Oct 13 20:14:46 localhost kernel: ... max period: 00007fffffffffff Oct 13 20:14:46 localhost kernel: ... fixed-purpose events: 0 Oct 13 20:14:46 localhost kernel: ... event mask: 000000000000003f Oct 13 20:14:46 localhost kernel: signal: max sigframe size: 1776 Oct 13 20:14:46 localhost kernel: rcu: Hierarchical SRCU implementation. Oct 13 20:14:46 localhost kernel: rcu: Max phase no-delay instances is 400. Oct 13 20:14:46 localhost kernel: smp: Bringing up secondary CPUs ... Oct 13 20:14:46 localhost kernel: smpboot: x86: Booting SMP configuration: Oct 13 20:14:46 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Oct 13 20:14:46 localhost kernel: smp: Brought up 1 node, 8 CPUs Oct 13 20:14:46 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Oct 13 20:14:46 localhost kernel: node 0 deferred pages initialised in 9ms Oct 13 20:14:46 localhost kernel: Memory: 7765984K/8388068K available (16384K kernel code, 5784K rwdata, 13864K rodata, 4188K init, 7196K bss, 616212K reserved, 0K cma-reserved) Oct 13 20:14:46 localhost kernel: devtmpfs: initialized Oct 13 20:14:46 localhost kernel: x86/mm: Memory block size: 128MB Oct 13 20:14:46 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 13 20:14:46 localhost kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Oct 13 20:14:46 localhost kernel: pinctrl core: initialized pinctrl subsystem Oct 13 20:14:46 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 13 20:14:46 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations Oct 13 20:14:46 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 13 20:14:46 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 13 20:14:46 localhost kernel: audit: initializing netlink subsys (disabled) Oct 13 20:14:46 localhost kernel: audit: type=2000 audit(1760400884.657:1): state=initialized audit_enabled=0 res=1 Oct 13 20:14:46 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Oct 13 20:14:46 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 13 20:14:46 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Oct 13 20:14:46 localhost kernel: cpuidle: using governor menu Oct 13 20:14:46 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 13 20:14:46 localhost kernel: PCI: Using configuration type 1 for base access Oct 13 20:14:46 localhost kernel: PCI: Using configuration type 1 for extended access Oct 13 20:14:46 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 13 20:14:46 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Oct 13 20:14:46 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Oct 13 20:14:46 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Oct 13 20:14:46 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Oct 13 20:14:46 localhost kernel: Demotion targets for Node 0: null Oct 13 20:14:46 localhost kernel: cryptd: max_cpu_qlen set to 1000 Oct 13 20:14:46 localhost kernel: ACPI: Added _OSI(Module Device) Oct 13 20:14:46 localhost kernel: ACPI: Added _OSI(Processor Device) Oct 13 20:14:46 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 13 20:14:46 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 13 20:14:46 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 13 20:14:46 localhost kernel: ACPI: _OSC evaluation for CPUs failed, trying _PDC Oct 13 20:14:46 localhost kernel: ACPI: Interpreter enabled Oct 13 20:14:46 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Oct 13 20:14:46 localhost kernel: ACPI: Using IOAPIC for interrupt routing Oct 13 20:14:46 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 13 20:14:46 localhost kernel: PCI: Using E820 reservations for host bridge windows Oct 13 20:14:46 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Oct 13 20:14:46 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 13 20:14:46 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Oct 13 20:14:46 localhost kernel: acpiphp: Slot [3] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [4] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [5] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [6] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [7] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [8] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [9] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [10] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [11] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [12] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [13] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [14] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [15] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [16] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [17] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [18] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [19] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [20] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [21] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [22] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [23] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [24] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [25] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [26] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [27] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [28] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [29] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [30] registered Oct 13 20:14:46 localhost kernel: acpiphp: Slot [31] registered Oct 13 20:14:46 localhost kernel: PCI host bridge to bus 0000:00 Oct 13 20:14:46 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 13 20:14:46 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 13 20:14:46 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 13 20:14:46 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 13 20:14:46 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x240000000-0x2bfffffff window] Oct 13 20:14:46 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 13 20:14:46 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Oct 13 20:14:46 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Oct 13 20:14:46 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Oct 13 20:14:46 localhost kernel: pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] Oct 13 20:14:46 localhost kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Oct 13 20:14:46 localhost kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Oct 13 20:14:46 localhost kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Oct 13 20:14:46 localhost kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Oct 13 20:14:46 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Oct 13 20:14:46 localhost kernel: pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] Oct 13 20:14:46 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Oct 13 20:14:46 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Oct 13 20:14:46 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Oct 13 20:14:46 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Oct 13 20:14:46 localhost kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Oct 13 20:14:46 localhost kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Oct 13 20:14:46 localhost kernel: pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] Oct 13 20:14:46 localhost kernel: pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] Oct 13 20:14:46 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 13 20:14:46 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Oct 13 20:14:46 localhost kernel: pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] Oct 13 20:14:46 localhost kernel: pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] Oct 13 20:14:46 localhost kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Oct 13 20:14:46 localhost kernel: pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] Oct 13 20:14:46 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Oct 13 20:14:46 localhost kernel: pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] Oct 13 20:14:46 localhost kernel: pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] Oct 13 20:14:46 localhost kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Oct 13 20:14:46 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Oct 13 20:14:46 localhost kernel: pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] Oct 13 20:14:46 localhost kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Oct 13 20:14:46 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint Oct 13 20:14:46 localhost kernel: pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] Oct 13 20:14:46 localhost kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Oct 13 20:14:46 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 13 20:14:46 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 13 20:14:46 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 13 20:14:46 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 13 20:14:46 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 13 20:14:46 localhost kernel: iommu: Default domain type: Translated Oct 13 20:14:46 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 13 20:14:46 localhost kernel: SCSI subsystem initialized Oct 13 20:14:46 localhost kernel: ACPI: bus type USB registered Oct 13 20:14:46 localhost kernel: usbcore: registered new interface driver usbfs Oct 13 20:14:46 localhost kernel: usbcore: registered new interface driver hub Oct 13 20:14:46 localhost kernel: usbcore: registered new device driver usb Oct 13 20:14:46 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Oct 13 20:14:46 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 13 20:14:46 localhost kernel: PTP clock support registered Oct 13 20:14:46 localhost kernel: EDAC MC: Ver: 3.0.0 Oct 13 20:14:46 localhost kernel: NetLabel: Initializing Oct 13 20:14:46 localhost kernel: NetLabel: domain hash size = 128 Oct 13 20:14:46 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Oct 13 20:14:46 localhost kernel: NetLabel: unlabeled traffic allowed by default Oct 13 20:14:46 localhost kernel: PCI: Using ACPI for IRQ routing Oct 13 20:14:46 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Oct 13 20:14:46 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 13 20:14:46 localhost kernel: e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] Oct 13 20:14:46 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Oct 13 20:14:46 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Oct 13 20:14:46 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 13 20:14:46 localhost kernel: vgaarb: loaded Oct 13 20:14:46 localhost kernel: clocksource: Switched to clocksource kvm-clock Oct 13 20:14:46 localhost kernel: VFS: Disk quotas dquot_6.6.0 Oct 13 20:14:46 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 13 20:14:46 localhost kernel: pnp: PnP ACPI init Oct 13 20:14:46 localhost kernel: pnp 00:03: [dma 2] Oct 13 20:14:46 localhost kernel: pnp: PnP ACPI: found 5 devices Oct 13 20:14:46 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 13 20:14:46 localhost kernel: NET: Registered PF_INET protocol family Oct 13 20:14:46 localhost kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 13 20:14:46 localhost kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Oct 13 20:14:46 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 13 20:14:46 localhost kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 13 20:14:46 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 13 20:14:46 localhost kernel: TCP: Hash tables configured (established 65536 bind 65536) Oct 13 20:14:46 localhost kernel: MPTCP token hash table entries: 8192 (order: 5, 196608 bytes, linear) Oct 13 20:14:46 localhost kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 13 20:14:46 localhost kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 13 20:14:46 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 13 20:14:46 localhost kernel: NET: Registered PF_XDP protocol family Oct 13 20:14:46 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 13 20:14:46 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 13 20:14:46 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 13 20:14:46 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Oct 13 20:14:46 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x240000000-0x2bfffffff window] Oct 13 20:14:46 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Oct 13 20:14:46 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 13 20:14:46 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Oct 13 20:14:46 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x160 took 111803 usecs Oct 13 20:14:46 localhost kernel: PCI: CLS 0 bytes, default 64 Oct 13 20:14:46 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 13 20:14:46 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Oct 13 20:14:46 localhost kernel: Trying to unpack rootfs image as initramfs... Oct 13 20:14:46 localhost kernel: ACPI: bus type thunderbolt registered Oct 13 20:14:46 localhost kernel: Initialise system trusted keyrings Oct 13 20:14:46 localhost kernel: Key type blacklist registered Oct 13 20:14:46 localhost kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 Oct 13 20:14:46 localhost kernel: zbud: loaded Oct 13 20:14:46 localhost kernel: integrity: Platform Keyring initialized Oct 13 20:14:46 localhost kernel: integrity: Machine keyring initialized Oct 13 20:14:46 localhost kernel: Freeing initrd memory: 85808K Oct 13 20:14:46 localhost kernel: NET: Registered PF_ALG protocol family Oct 13 20:14:46 localhost kernel: xor: automatically using best checksumming function avx Oct 13 20:14:46 localhost kernel: Key type asymmetric registered Oct 13 20:14:46 localhost kernel: Asymmetric key parser 'x509' registered Oct 13 20:14:46 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Oct 13 20:14:46 localhost kernel: io scheduler mq-deadline registered Oct 13 20:14:46 localhost kernel: io scheduler kyber registered Oct 13 20:14:46 localhost kernel: io scheduler bfq registered Oct 13 20:14:46 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Oct 13 20:14:46 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Oct 13 20:14:46 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Oct 13 20:14:46 localhost kernel: ACPI: button: Power Button [PWRF] Oct 13 20:14:46 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Oct 13 20:14:46 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Oct 13 20:14:46 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Oct 13 20:14:46 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 13 20:14:46 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 13 20:14:46 localhost kernel: Non-volatile memory driver v1.3 Oct 13 20:14:46 localhost kernel: rdac: device handler registered Oct 13 20:14:46 localhost kernel: hp_sw: device handler registered Oct 13 20:14:46 localhost kernel: emc: device handler registered Oct 13 20:14:46 localhost kernel: alua: device handler registered Oct 13 20:14:46 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Oct 13 20:14:46 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Oct 13 20:14:46 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Oct 13 20:14:46 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Oct 13 20:14:46 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Oct 13 20:14:46 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Oct 13 20:14:46 localhost kernel: usb usb1: Product: UHCI Host Controller Oct 13 20:14:46 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-621.el9.x86_64 uhci_hcd Oct 13 20:14:46 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Oct 13 20:14:46 localhost kernel: hub 1-0:1.0: USB hub found Oct 13 20:14:46 localhost kernel: hub 1-0:1.0: 2 ports detected Oct 13 20:14:46 localhost kernel: usbcore: registered new interface driver usbserial_generic Oct 13 20:14:46 localhost kernel: usbserial: USB Serial support registered for generic Oct 13 20:14:46 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 13 20:14:46 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 13 20:14:46 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 13 20:14:46 localhost kernel: mousedev: PS/2 mouse device common for all mice Oct 13 20:14:46 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Oct 13 20:14:46 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Oct 13 20:14:46 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Oct 13 20:14:46 localhost kernel: rtc_cmos 00:04: registered as rtc0 Oct 13 20:14:46 localhost kernel: rtc_cmos 00:04: setting system clock to 2025-10-14T00:14:45 UTC (1760400885) Oct 13 20:14:46 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Oct 13 20:14:46 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Oct 13 20:14:46 localhost kernel: amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled Oct 13 20:14:46 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Oct 13 20:14:46 localhost kernel: usbcore: registered new interface driver usbhid Oct 13 20:14:46 localhost kernel: usbhid: USB HID core driver Oct 13 20:14:46 localhost kernel: drop_monitor: Initializing network drop monitor service Oct 13 20:14:46 localhost kernel: Initializing XFRM netlink socket Oct 13 20:14:46 localhost kernel: NET: Registered PF_INET6 protocol family Oct 13 20:14:46 localhost kernel: Segment Routing with IPv6 Oct 13 20:14:46 localhost kernel: NET: Registered PF_PACKET protocol family Oct 13 20:14:46 localhost kernel: mpls_gso: MPLS GSO support Oct 13 20:14:46 localhost kernel: IPI shorthand broadcast: enabled Oct 13 20:14:46 localhost kernel: AVX2 version of gcm_enc/dec engaged. Oct 13 20:14:46 localhost kernel: AES CTR mode by8 optimization enabled Oct 13 20:14:46 localhost kernel: sched_clock: Marking stable (1369015775, 147106403)->(1666772025, -150649847) Oct 13 20:14:46 localhost kernel: registered taskstats version 1 Oct 13 20:14:46 localhost kernel: Loading compiled-in X.509 certificates Oct 13 20:14:46 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 72f99a463516b0dfb027e50caab189f607ef1bc9' Oct 13 20:14:46 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Oct 13 20:14:46 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Oct 13 20:14:46 localhost kernel: Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' Oct 13 20:14:46 localhost kernel: Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' Oct 13 20:14:46 localhost kernel: Demotion targets for Node 0: null Oct 13 20:14:46 localhost kernel: page_owner is disabled Oct 13 20:14:46 localhost kernel: Key type .fscrypt registered Oct 13 20:14:46 localhost kernel: Key type fscrypt-provisioning registered Oct 13 20:14:46 localhost kernel: Key type big_key registered Oct 13 20:14:46 localhost kernel: Key type encrypted registered Oct 13 20:14:46 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Oct 13 20:14:46 localhost kernel: Loading compiled-in module X.509 certificates Oct 13 20:14:46 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 72f99a463516b0dfb027e50caab189f607ef1bc9' Oct 13 20:14:46 localhost kernel: ima: Allocated hash algorithm: sha256 Oct 13 20:14:46 localhost kernel: ima: No architecture policies found Oct 13 20:14:46 localhost kernel: evm: Initialising EVM extended attributes: Oct 13 20:14:46 localhost kernel: evm: security.selinux Oct 13 20:14:46 localhost kernel: evm: security.SMACK64 (disabled) Oct 13 20:14:46 localhost kernel: evm: security.SMACK64EXEC (disabled) Oct 13 20:14:46 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Oct 13 20:14:46 localhost kernel: evm: security.SMACK64MMAP (disabled) Oct 13 20:14:46 localhost kernel: evm: security.apparmor (disabled) Oct 13 20:14:46 localhost kernel: evm: security.ima Oct 13 20:14:46 localhost kernel: evm: security.capability Oct 13 20:14:46 localhost kernel: evm: HMAC attrs: 0x1 Oct 13 20:14:46 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Oct 13 20:14:46 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Oct 13 20:14:46 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Oct 13 20:14:46 localhost kernel: usb 1-1: Product: QEMU USB Tablet Oct 13 20:14:46 localhost kernel: usb 1-1: Manufacturer: QEMU Oct 13 20:14:46 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Oct 13 20:14:46 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Oct 13 20:14:46 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Oct 13 20:14:46 localhost kernel: Running certificate verification RSA selftest Oct 13 20:14:46 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Oct 13 20:14:46 localhost kernel: Running certificate verification ECDSA selftest Oct 13 20:14:46 localhost kernel: Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' Oct 13 20:14:46 localhost kernel: clk: Disabling unused clocks Oct 13 20:14:46 localhost kernel: Freeing unused decrypted memory: 2028K Oct 13 20:14:46 localhost kernel: Freeing unused kernel image (initmem) memory: 4188K Oct 13 20:14:46 localhost kernel: Write protecting the kernel read-only data: 30720k Oct 13 20:14:46 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 472K Oct 13 20:14:46 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Oct 13 20:14:46 localhost kernel: Run /init as init process Oct 13 20:14:46 localhost kernel: with arguments: Oct 13 20:14:46 localhost kernel: /init Oct 13 20:14:46 localhost kernel: with environment: Oct 13 20:14:46 localhost kernel: HOME=/ Oct 13 20:14:46 localhost kernel: TERM=linux Oct 13 20:14:46 localhost kernel: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-621.el9.x86_64 Oct 13 20:14:46 localhost systemd[1]: systemd 252-57.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 13 20:14:46 localhost systemd[1]: Detected virtualization kvm. Oct 13 20:14:46 localhost systemd[1]: Detected architecture x86-64. Oct 13 20:14:46 localhost systemd[1]: Running in initrd. Oct 13 20:14:46 localhost systemd[1]: No hostname configured, using default hostname. Oct 13 20:14:46 localhost systemd[1]: Hostname set to . Oct 13 20:14:46 localhost systemd[1]: Initializing machine ID from VM UUID. Oct 13 20:14:46 localhost systemd[1]: Queued start job for default target Initrd Default Target. Oct 13 20:14:46 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Oct 13 20:14:46 localhost systemd[1]: Reached target Local Encrypted Volumes. Oct 13 20:14:46 localhost systemd[1]: Reached target Initrd /usr File System. Oct 13 20:14:46 localhost systemd[1]: Reached target Local File Systems. Oct 13 20:14:46 localhost systemd[1]: Reached target Path Units. Oct 13 20:14:46 localhost systemd[1]: Reached target Slice Units. Oct 13 20:14:46 localhost systemd[1]: Reached target Swaps. Oct 13 20:14:46 localhost systemd[1]: Reached target Timer Units. Oct 13 20:14:46 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Oct 13 20:14:46 localhost systemd[1]: Listening on Journal Socket (/dev/log). Oct 13 20:14:46 localhost systemd[1]: Listening on Journal Socket. Oct 13 20:14:46 localhost systemd[1]: Listening on udev Control Socket. Oct 13 20:14:46 localhost systemd[1]: Listening on udev Kernel Socket. Oct 13 20:14:46 localhost systemd[1]: Reached target Socket Units. Oct 13 20:14:46 localhost systemd[1]: Starting Create List of Static Device Nodes... Oct 13 20:14:46 localhost systemd[1]: Starting Journal Service... Oct 13 20:14:46 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Oct 13 20:14:46 localhost systemd[1]: Starting Apply Kernel Variables... Oct 13 20:14:46 localhost systemd[1]: Starting Create System Users... Oct 13 20:14:46 localhost systemd[1]: Starting Setup Virtual Console... Oct 13 20:14:46 localhost systemd[1]: Finished Create List of Static Device Nodes. Oct 13 20:14:46 localhost systemd[1]: Finished Apply Kernel Variables. Oct 13 20:14:46 localhost systemd[1]: Finished Create System Users. Oct 13 20:14:46 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Oct 13 20:14:46 localhost systemd-journald[302]: Journal started Oct 13 20:14:46 localhost systemd-journald[302]: Runtime Journal (/run/log/journal/91510e9823c747eeb17ea5de348b60f1) is 8.0M, max 153.6M, 145.6M free. Oct 13 20:14:46 localhost systemd-sysusers[307]: Creating group 'users' with GID 100. Oct 13 20:14:46 localhost systemd-sysusers[307]: Creating group 'dbus' with GID 81. Oct 13 20:14:46 localhost systemd-sysusers[307]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Oct 13 20:14:46 localhost systemd[1]: Started Journal Service. Oct 13 20:14:46 localhost systemd[1]: Starting Create Volatile Files and Directories... Oct 13 20:14:46 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Oct 13 20:14:46 localhost systemd[1]: Finished Create Volatile Files and Directories. Oct 13 20:14:46 localhost systemd[1]: Finished Setup Virtual Console. Oct 13 20:14:46 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Oct 13 20:14:46 localhost systemd[1]: Starting dracut cmdline hook... Oct 13 20:14:46 localhost dracut-cmdline[322]: dracut-9 dracut-057-102.git20250818.el9 Oct 13 20:14:46 localhost dracut-cmdline[322]: Using kernel command line parameters: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-621.el9.x86_64 root=UUID=9839e2e1-98a2-4594-b609-79d514deb0a3 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Oct 13 20:14:46 localhost systemd[1]: Finished dracut cmdline hook. Oct 13 20:14:46 localhost systemd[1]: Starting dracut pre-udev hook... Oct 13 20:14:46 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 13 20:14:46 localhost kernel: device-mapper: uevent: version 1.0.3 Oct 13 20:14:46 localhost kernel: device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev Oct 13 20:14:46 localhost kernel: RPC: Registered named UNIX socket transport module. Oct 13 20:14:46 localhost kernel: RPC: Registered udp transport module. Oct 13 20:14:46 localhost kernel: RPC: Registered tcp transport module. Oct 13 20:14:46 localhost kernel: RPC: Registered tcp-with-tls transport module. Oct 13 20:14:46 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Oct 13 20:14:47 localhost rpc.statd[439]: Version 2.5.4 starting Oct 13 20:14:47 localhost rpc.statd[439]: Initializing NSM state Oct 13 20:14:47 localhost rpc.idmapd[444]: Setting log level to 0 Oct 13 20:14:47 localhost systemd[1]: Finished dracut pre-udev hook. Oct 13 20:14:47 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Oct 13 20:14:47 localhost systemd-udevd[457]: Using default interface naming scheme 'rhel-9.0'. Oct 13 20:14:47 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Oct 13 20:14:47 localhost systemd[1]: Starting dracut pre-trigger hook... Oct 13 20:14:47 localhost systemd[1]: Finished dracut pre-trigger hook. Oct 13 20:14:47 localhost systemd[1]: Starting Coldplug All udev Devices... Oct 13 20:14:47 localhost systemd[1]: Created slice Slice /system/modprobe. Oct 13 20:14:47 localhost systemd[1]: Starting Load Kernel Module configfs... Oct 13 20:14:47 localhost systemd[1]: Finished Coldplug All udev Devices. Oct 13 20:14:47 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 13 20:14:47 localhost systemd[1]: Finished Load Kernel Module configfs. Oct 13 20:14:47 localhost systemd[1]: Mounting Kernel Configuration File System... Oct 13 20:14:47 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Oct 13 20:14:47 localhost systemd[1]: Reached target Network. Oct 13 20:14:47 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Oct 13 20:14:47 localhost systemd[1]: Starting dracut initqueue hook... Oct 13 20:14:47 localhost systemd[1]: Mounted Kernel Configuration File System. Oct 13 20:14:47 localhost systemd[1]: Reached target System Initialization. Oct 13 20:14:47 localhost systemd[1]: Reached target Basic System. Oct 13 20:14:47 localhost kernel: virtio_blk virtio2: 8/0/0 default/read/poll queues Oct 13 20:14:47 localhost kernel: virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) Oct 13 20:14:47 localhost kernel: vda: vda1 Oct 13 20:14:47 localhost kernel: libata version 3.00 loaded. Oct 13 20:14:47 localhost kernel: ata_piix 0000:00:01.1: version 2.13 Oct 13 20:14:47 localhost systemd-udevd[461]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:14:47 localhost kernel: scsi host0: ata_piix Oct 13 20:14:47 localhost kernel: scsi host1: ata_piix Oct 13 20:14:47 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 Oct 13 20:14:47 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 Oct 13 20:14:47 localhost systemd[1]: Found device /dev/disk/by-uuid/9839e2e1-98a2-4594-b609-79d514deb0a3. Oct 13 20:14:47 localhost systemd[1]: Reached target Initrd Root Device. Oct 13 20:14:47 localhost kernel: ata1: found unknown device (class 0) Oct 13 20:14:47 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Oct 13 20:14:47 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Oct 13 20:14:47 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Oct 13 20:14:47 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Oct 13 20:14:47 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 13 20:14:47 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 Oct 13 20:14:47 localhost systemd[1]: Finished dracut initqueue hook. Oct 13 20:14:47 localhost systemd[1]: Reached target Preparation for Remote File Systems. Oct 13 20:14:47 localhost systemd[1]: Reached target Remote Encrypted Volumes. Oct 13 20:14:47 localhost systemd[1]: Reached target Remote File Systems. Oct 13 20:14:47 localhost systemd[1]: Starting dracut pre-mount hook... Oct 13 20:14:47 localhost systemd[1]: Finished dracut pre-mount hook. Oct 13 20:14:47 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/9839e2e1-98a2-4594-b609-79d514deb0a3... Oct 13 20:14:47 localhost systemd-fsck[553]: /usr/sbin/fsck.xfs: XFS file system. Oct 13 20:14:47 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/9839e2e1-98a2-4594-b609-79d514deb0a3. Oct 13 20:14:47 localhost systemd[1]: Mounting /sysroot... Oct 13 20:14:48 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Oct 13 20:14:48 localhost kernel: XFS (vda1): Mounting V5 Filesystem 9839e2e1-98a2-4594-b609-79d514deb0a3 Oct 13 20:14:48 localhost kernel: XFS (vda1): Ending clean mount Oct 13 20:14:48 localhost systemd[1]: Mounted /sysroot. Oct 13 20:14:48 localhost systemd[1]: Reached target Initrd Root File System. Oct 13 20:14:48 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Oct 13 20:14:48 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Oct 13 20:14:48 localhost systemd[1]: Reached target Initrd File Systems. Oct 13 20:14:48 localhost systemd[1]: Reached target Initrd Default Target. Oct 13 20:14:48 localhost systemd[1]: Starting dracut mount hook... Oct 13 20:14:48 localhost systemd[1]: Finished dracut mount hook. Oct 13 20:14:48 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Oct 13 20:14:48 localhost rpc.idmapd[444]: exiting on signal 15 Oct 13 20:14:48 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Oct 13 20:14:48 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Oct 13 20:14:48 localhost systemd[1]: Stopped target Network. Oct 13 20:14:48 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Oct 13 20:14:48 localhost systemd[1]: Stopped target Timer Units. Oct 13 20:14:48 localhost systemd[1]: dbus.socket: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Oct 13 20:14:48 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Oct 13 20:14:48 localhost systemd[1]: Stopped target Initrd Default Target. Oct 13 20:14:48 localhost systemd[1]: Stopped target Basic System. Oct 13 20:14:48 localhost systemd[1]: Stopped target Initrd Root Device. Oct 13 20:14:48 localhost systemd[1]: Stopped target Initrd /usr File System. Oct 13 20:14:48 localhost systemd[1]: Stopped target Path Units. Oct 13 20:14:48 localhost systemd[1]: Stopped target Remote File Systems. Oct 13 20:14:48 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Oct 13 20:14:48 localhost systemd[1]: Stopped target Slice Units. Oct 13 20:14:48 localhost systemd[1]: Stopped target Socket Units. Oct 13 20:14:48 localhost systemd[1]: Stopped target System Initialization. Oct 13 20:14:48 localhost systemd[1]: Stopped target Local File Systems. Oct 13 20:14:48 localhost systemd[1]: Stopped target Swaps. Oct 13 20:14:48 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped dracut mount hook. Oct 13 20:14:48 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped dracut pre-mount hook. Oct 13 20:14:48 localhost systemd[1]: Stopped target Local Encrypted Volumes. Oct 13 20:14:48 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Oct 13 20:14:48 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped dracut initqueue hook. Oct 13 20:14:48 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped Apply Kernel Variables. Oct 13 20:14:48 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped Create Volatile Files and Directories. Oct 13 20:14:48 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped Coldplug All udev Devices. Oct 13 20:14:48 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped dracut pre-trigger hook. Oct 13 20:14:48 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Oct 13 20:14:48 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped Setup Virtual Console. Oct 13 20:14:48 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Oct 13 20:14:48 localhost systemd[1]: systemd-udevd.service: Consumed 1.037s CPU time. Oct 13 20:14:48 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Oct 13 20:14:48 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Closed udev Control Socket. Oct 13 20:14:48 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Closed udev Kernel Socket. Oct 13 20:14:48 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped dracut pre-udev hook. Oct 13 20:14:48 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped dracut cmdline hook. Oct 13 20:14:48 localhost systemd[1]: Starting Cleanup udev Database... Oct 13 20:14:48 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Oct 13 20:14:48 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped Create List of Static Device Nodes. Oct 13 20:14:48 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Stopped Create System Users. Oct 13 20:14:48 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 13 20:14:48 localhost systemd[1]: Finished Cleanup udev Database. Oct 13 20:14:48 localhost systemd[1]: Reached target Switch Root. Oct 13 20:14:49 localhost systemd[1]: Starting Switch Root... Oct 13 20:14:49 localhost systemd[1]: Switching root. Oct 13 20:14:49 localhost systemd-journald[302]: Journal stopped Oct 13 20:14:50 localhost systemd-journald[302]: Received SIGTERM from PID 1 (systemd). Oct 13 20:14:50 localhost kernel: audit: type=1404 audit(1760400889.380:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Oct 13 20:14:50 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 13 20:14:50 localhost kernel: SELinux: policy capability open_perms=1 Oct 13 20:14:50 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 13 20:14:50 localhost kernel: SELinux: policy capability always_check_network=0 Oct 13 20:14:50 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 13 20:14:50 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 13 20:14:50 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 13 20:14:50 localhost kernel: audit: type=1403 audit(1760400889.564:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 13 20:14:50 localhost systemd[1]: Successfully loaded SELinux policy in 187.909ms. Oct 13 20:14:50 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 28.028ms. Oct 13 20:14:50 localhost systemd[1]: systemd 252-57.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 13 20:14:50 localhost systemd[1]: Detected virtualization kvm. Oct 13 20:14:50 localhost systemd[1]: Detected architecture x86-64. Oct 13 20:14:50 localhost systemd-rc-local-generator[634]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:14:50 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 13 20:14:50 localhost systemd[1]: Stopped Switch Root. Oct 13 20:14:50 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 13 20:14:50 localhost systemd[1]: Created slice Slice /system/getty. Oct 13 20:14:50 localhost systemd[1]: Created slice Slice /system/serial-getty. Oct 13 20:14:50 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Oct 13 20:14:50 localhost systemd[1]: Created slice User and Session Slice. Oct 13 20:14:50 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Oct 13 20:14:50 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Oct 13 20:14:50 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Oct 13 20:14:50 localhost systemd[1]: Reached target Local Encrypted Volumes. Oct 13 20:14:50 localhost systemd[1]: Stopped target Switch Root. Oct 13 20:14:50 localhost systemd[1]: Stopped target Initrd File Systems. Oct 13 20:14:50 localhost systemd[1]: Stopped target Initrd Root File System. Oct 13 20:14:50 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Oct 13 20:14:50 localhost systemd[1]: Reached target Path Units. Oct 13 20:14:50 localhost systemd[1]: Reached target rpc_pipefs.target. Oct 13 20:14:50 localhost systemd[1]: Reached target Slice Units. Oct 13 20:14:50 localhost systemd[1]: Reached target Swaps. Oct 13 20:14:50 localhost systemd[1]: Reached target Local Verity Protected Volumes. Oct 13 20:14:50 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Oct 13 20:14:50 localhost systemd[1]: Reached target RPC Port Mapper. Oct 13 20:14:50 localhost systemd[1]: Listening on Process Core Dump Socket. Oct 13 20:14:50 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Oct 13 20:14:50 localhost systemd[1]: Listening on udev Control Socket. Oct 13 20:14:50 localhost systemd[1]: Listening on udev Kernel Socket. Oct 13 20:14:50 localhost systemd[1]: Mounting Huge Pages File System... Oct 13 20:14:50 localhost systemd[1]: Mounting POSIX Message Queue File System... Oct 13 20:14:50 localhost systemd[1]: Mounting Kernel Debug File System... Oct 13 20:14:50 localhost systemd[1]: Mounting Kernel Trace File System... Oct 13 20:14:50 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Oct 13 20:14:50 localhost systemd[1]: Starting Create List of Static Device Nodes... Oct 13 20:14:50 localhost systemd[1]: Starting Load Kernel Module configfs... Oct 13 20:14:50 localhost systemd[1]: Starting Load Kernel Module drm... Oct 13 20:14:50 localhost systemd[1]: Starting Load Kernel Module efi_pstore... Oct 13 20:14:50 localhost systemd[1]: Starting Load Kernel Module fuse... Oct 13 20:14:50 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Oct 13 20:14:50 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 13 20:14:50 localhost systemd[1]: Stopped File System Check on Root Device. Oct 13 20:14:50 localhost systemd[1]: Stopped Journal Service. Oct 13 20:14:50 localhost systemd[1]: Starting Journal Service... Oct 13 20:14:50 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Oct 13 20:14:50 localhost systemd[1]: Starting Generate network units from Kernel command line... Oct 13 20:14:50 localhost systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 13 20:14:50 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Oct 13 20:14:50 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Oct 13 20:14:50 localhost systemd[1]: Starting Apply Kernel Variables... Oct 13 20:14:50 localhost kernel: fuse: init (API version 7.37) Oct 13 20:14:50 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Oct 13 20:14:50 localhost systemd[1]: Starting Coldplug All udev Devices... Oct 13 20:14:50 localhost systemd[1]: Mounted Huge Pages File System. Oct 13 20:14:50 localhost systemd[1]: Mounted POSIX Message Queue File System. Oct 13 20:14:50 localhost systemd-journald[675]: Journal started Oct 13 20:14:50 localhost systemd-journald[675]: Runtime Journal (/run/log/journal/a1727ec20198bc6caf436a6e13c4ff5e) is 8.0M, max 153.6M, 145.6M free. Oct 13 20:14:50 localhost systemd[1]: Queued start job for default target Multi-User System. Oct 13 20:14:50 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Oct 13 20:14:50 localhost systemd[1]: Started Journal Service. Oct 13 20:14:50 localhost systemd[1]: Mounted Kernel Debug File System. Oct 13 20:14:50 localhost systemd[1]: Mounted Kernel Trace File System. Oct 13 20:14:50 localhost systemd[1]: Finished Create List of Static Device Nodes. Oct 13 20:14:50 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 13 20:14:50 localhost systemd[1]: Finished Load Kernel Module configfs. Oct 13 20:14:50 localhost systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 13 20:14:50 localhost systemd[1]: Finished Load Kernel Module efi_pstore. Oct 13 20:14:50 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 13 20:14:50 localhost systemd[1]: Finished Load Kernel Module fuse. Oct 13 20:14:50 localhost kernel: ACPI: bus type drm_connector registered Oct 13 20:14:50 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Oct 13 20:14:50 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 13 20:14:50 localhost systemd[1]: Finished Load Kernel Module drm. Oct 13 20:14:50 localhost systemd[1]: Finished Generate network units from Kernel command line. Oct 13 20:14:50 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Oct 13 20:14:50 localhost systemd[1]: Mounting FUSE Control File System... Oct 13 20:14:50 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Oct 13 20:14:50 localhost systemd[1]: Starting Rebuild Hardware Database... Oct 13 20:14:50 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Oct 13 20:14:50 localhost systemd[1]: Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 13 20:14:50 localhost systemd[1]: Starting Load/Save OS Random Seed... Oct 13 20:14:50 localhost systemd[1]: Starting Create System Users... Oct 13 20:14:50 localhost systemd[1]: Finished Apply Kernel Variables. Oct 13 20:14:50 localhost systemd[1]: Mounted FUSE Control File System. Oct 13 20:14:50 localhost systemd-journald[675]: Runtime Journal (/run/log/journal/a1727ec20198bc6caf436a6e13c4ff5e) is 8.0M, max 153.6M, 145.6M free. Oct 13 20:14:50 localhost systemd-journald[675]: Received client request to flush runtime journal. Oct 13 20:14:50 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Oct 13 20:14:50 localhost systemd[1]: Finished Load/Save OS Random Seed. Oct 13 20:14:50 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Oct 13 20:14:50 localhost systemd[1]: Finished Create System Users. Oct 13 20:14:50 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Oct 13 20:14:50 localhost systemd[1]: Finished Coldplug All udev Devices. Oct 13 20:14:50 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Oct 13 20:14:50 localhost systemd[1]: Reached target Preparation for Local File Systems. Oct 13 20:14:50 localhost systemd[1]: Reached target Local File Systems. Oct 13 20:14:50 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Oct 13 20:14:50 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Oct 13 20:14:50 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Oct 13 20:14:50 localhost systemd[1]: Update Boot Loader Random Seed was skipped because no trigger condition checks were met. Oct 13 20:14:50 localhost systemd[1]: Starting Automatic Boot Loader Update... Oct 13 20:14:50 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Oct 13 20:14:50 localhost systemd[1]: Starting Create Volatile Files and Directories... Oct 13 20:14:50 localhost bootctl[691]: Couldn't find EFI system partition, skipping. Oct 13 20:14:50 localhost systemd[1]: Finished Automatic Boot Loader Update. Oct 13 20:14:50 localhost systemd[1]: Finished Create Volatile Files and Directories. Oct 13 20:14:50 localhost systemd[1]: Starting Security Auditing Service... Oct 13 20:14:50 localhost systemd[1]: Starting RPC Bind... Oct 13 20:14:50 localhost systemd[1]: Starting Rebuild Journal Catalog... Oct 13 20:14:50 localhost auditd[697]: audit dispatcher initialized with q_depth=2000 and 1 active plugins Oct 13 20:14:50 localhost auditd[697]: Init complete, auditd 3.1.5 listening for events (startup state enable) Oct 13 20:14:50 localhost systemd[1]: Finished Rebuild Journal Catalog. Oct 13 20:14:50 localhost systemd[1]: Started RPC Bind. Oct 13 20:14:50 localhost augenrules[702]: /sbin/augenrules: No change Oct 13 20:14:50 localhost augenrules[718]: No rules Oct 13 20:14:50 localhost augenrules[718]: enabled 1 Oct 13 20:14:50 localhost augenrules[718]: failure 1 Oct 13 20:14:50 localhost augenrules[718]: pid 697 Oct 13 20:14:50 localhost augenrules[718]: rate_limit 0 Oct 13 20:14:50 localhost augenrules[718]: backlog_limit 8192 Oct 13 20:14:50 localhost augenrules[718]: lost 0 Oct 13 20:14:50 localhost augenrules[718]: backlog 3 Oct 13 20:14:50 localhost augenrules[718]: backlog_wait_time 60000 Oct 13 20:14:50 localhost augenrules[718]: backlog_wait_time_actual 0 Oct 13 20:14:50 localhost augenrules[718]: enabled 1 Oct 13 20:14:50 localhost augenrules[718]: failure 1 Oct 13 20:14:50 localhost augenrules[718]: pid 697 Oct 13 20:14:50 localhost augenrules[718]: rate_limit 0 Oct 13 20:14:50 localhost augenrules[718]: backlog_limit 8192 Oct 13 20:14:50 localhost augenrules[718]: lost 0 Oct 13 20:14:50 localhost augenrules[718]: backlog 0 Oct 13 20:14:50 localhost augenrules[718]: backlog_wait_time 60000 Oct 13 20:14:50 localhost augenrules[718]: backlog_wait_time_actual 0 Oct 13 20:14:50 localhost augenrules[718]: enabled 1 Oct 13 20:14:50 localhost augenrules[718]: failure 1 Oct 13 20:14:50 localhost augenrules[718]: pid 697 Oct 13 20:14:50 localhost augenrules[718]: rate_limit 0 Oct 13 20:14:50 localhost augenrules[718]: backlog_limit 8192 Oct 13 20:14:50 localhost augenrules[718]: lost 0 Oct 13 20:14:50 localhost augenrules[718]: backlog 0 Oct 13 20:14:50 localhost augenrules[718]: backlog_wait_time 60000 Oct 13 20:14:50 localhost augenrules[718]: backlog_wait_time_actual 0 Oct 13 20:14:50 localhost systemd[1]: Started Security Auditing Service. Oct 13 20:14:50 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Oct 13 20:14:50 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Oct 13 20:14:51 localhost systemd[1]: Finished Rebuild Hardware Database. Oct 13 20:14:51 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Oct 13 20:14:51 localhost systemd-udevd[727]: Using default interface naming scheme 'rhel-9.0'. Oct 13 20:14:51 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Oct 13 20:14:51 localhost systemd[1]: Starting Load Kernel Module configfs... Oct 13 20:14:51 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Oct 13 20:14:51 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 13 20:14:51 localhost systemd[1]: Finished Load Kernel Module configfs. Oct 13 20:14:51 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Oct 13 20:14:51 localhost systemd-udevd[730]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:14:51 localhost systemd[1]: Starting Update is Completed... Oct 13 20:14:51 localhost systemd[1]: Finished Update is Completed. Oct 13 20:14:51 localhost systemd[1]: Reached target System Initialization. Oct 13 20:14:51 localhost systemd[1]: Started dnf makecache --timer. Oct 13 20:14:51 localhost systemd[1]: Started Daily rotation of log files. Oct 13 20:14:51 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Oct 13 20:14:51 localhost systemd[1]: Reached target Timer Units. Oct 13 20:14:51 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Oct 13 20:14:51 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Oct 13 20:14:51 localhost systemd[1]: Reached target Socket Units. Oct 13 20:14:51 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Oct 13 20:14:51 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Oct 13 20:14:51 localhost kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Oct 13 20:14:51 localhost kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Oct 13 20:14:51 localhost systemd[1]: Starting D-Bus System Message Bus... Oct 13 20:14:51 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 13 20:14:51 localhost systemd[1]: Started D-Bus System Message Bus. Oct 13 20:14:51 localhost systemd[1]: Reached target Basic System. Oct 13 20:14:51 localhost dbus-broker-lau[772]: Ready Oct 13 20:14:51 localhost systemd[1]: Starting NTP client/server... Oct 13 20:14:51 localhost systemd[1]: Starting Cloud-init: Local Stage (pre-network)... Oct 13 20:14:51 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Oct 13 20:14:51 localhost systemd[1]: Starting IPv4 firewall with iptables... Oct 13 20:14:51 localhost systemd[1]: Started irqbalance daemon. Oct 13 20:14:51 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Oct 13 20:14:51 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 13 20:14:51 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 13 20:14:51 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 13 20:14:51 localhost systemd[1]: Reached target sshd-keygen.target. Oct 13 20:14:51 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Oct 13 20:14:51 localhost systemd[1]: Reached target User and Group Name Lookups. Oct 13 20:14:51 localhost systemd[1]: Starting User Login Management... Oct 13 20:14:51 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Oct 13 20:14:51 localhost chronyd[795]: chronyd version 4.6.1 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Oct 13 20:14:51 localhost chronyd[795]: Loaded 0 symmetric keys Oct 13 20:14:51 localhost chronyd[795]: Using right/UTC timezone to obtain leap second data Oct 13 20:14:51 localhost chronyd[795]: Loaded seccomp filter (level 2) Oct 13 20:14:51 localhost systemd[1]: Started NTP client/server. Oct 13 20:14:51 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Oct 13 20:14:51 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Oct 13 20:14:51 localhost kernel: Console: switching to colour dummy device 80x25 Oct 13 20:14:51 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Oct 13 20:14:51 localhost kernel: [drm] features: -context_init Oct 13 20:14:51 localhost kernel: [drm] number of scanouts: 1 Oct 13 20:14:51 localhost kernel: [drm] number of cap sets: 0 Oct 13 20:14:51 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Oct 13 20:14:51 localhost kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Oct 13 20:14:51 localhost kernel: Console: switching to colour frame buffer device 128x48 Oct 13 20:14:51 localhost kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Oct 13 20:14:51 localhost systemd-logind[793]: New seat seat0. Oct 13 20:14:51 localhost systemd-logind[793]: Watching system buttons on /dev/input/event0 (Power Button) Oct 13 20:14:51 localhost systemd-logind[793]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Oct 13 20:14:51 localhost systemd[1]: Started User Login Management. Oct 13 20:14:51 localhost kernel: kvm_amd: TSC scaling supported Oct 13 20:14:51 localhost kernel: kvm_amd: Nested Virtualization enabled Oct 13 20:14:51 localhost kernel: kvm_amd: Nested Paging enabled Oct 13 20:14:51 localhost kernel: kvm_amd: LBR virtualization supported Oct 13 20:14:51 localhost kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Oct 13 20:14:51 localhost kernel: Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled Oct 13 20:14:51 localhost iptables.init[785]: iptables: Applying firewall rules: [ OK ] Oct 13 20:14:51 localhost systemd[1]: Finished IPv4 firewall with iptables. Oct 13 20:14:52 localhost cloud-init[838]: Cloud-init v. 24.4-7.el9 running 'init-local' at Tue, 14 Oct 2025 00:14:52 +0000. Up 8.02 seconds. Oct 13 20:14:52 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3 Oct 13 20:14:52 localhost kernel: ISO 9660 Extensions: RRIP_1991A Oct 13 20:14:52 localhost systemd[1]: run-cloud\x2dinit-tmp-tmppxik7kbx.mount: Deactivated successfully. Oct 13 20:14:52 localhost systemd[1]: Starting Hostname Service... Oct 13 20:14:52 localhost systemd[1]: Started Hostname Service. Oct 13 20:14:52 np0005486557.novalocal systemd-hostnamed[852]: Hostname set to (static) Oct 13 20:14:52 np0005486557.novalocal systemd[1]: Finished Cloud-init: Local Stage (pre-network). Oct 13 20:14:52 np0005486557.novalocal systemd[1]: Reached target Preparation for Network. Oct 13 20:14:52 np0005486557.novalocal systemd[1]: Starting Network Manager... Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9375] NetworkManager (version 1.54.1-1.el9) is starting... (boot:9a9938fa-c926-4355-817f-1943089f4f02) Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9379] Read config: /etc/NetworkManager/NetworkManager.conf, /run/NetworkManager/conf.d/15-carrier-timeout.conf Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9568] manager[0x55ffd9dc8080]: monitoring kernel firmware directory '/lib/firmware'. Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9623] hostname: hostname: using hostnamed Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9624] hostname: static hostname changed from (none) to "np0005486557.novalocal" Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9628] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9807] manager[0x55ffd9dc8080]: rfkill: Wi-Fi hardware radio set enabled Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9807] manager[0x55ffd9dc8080]: rfkill: WWAN hardware radio set enabled Oct 13 20:14:52 np0005486557.novalocal systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9877] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.54.1-1.el9/libnm-device-plugin-team.so) Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9878] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9878] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9878] manager: Networking is enabled by state file Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9880] settings: Loaded settings plugin: keyfile (internal) Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9927] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.54.1-1.el9/libnm-settings-plugin-ifcfg-rh.so") Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9960] Warning: the ifcfg-rh plugin is deprecated, please migrate connections to the keyfile format using "nmcli connection migrate" Oct 13 20:14:52 np0005486557.novalocal systemd[1]: Starting Network Manager Script Dispatcher Service... Oct 13 20:14:52 np0005486557.novalocal NetworkManager[856]: [1760400892.9995] dhcp: init: Using DHCP client 'internal' Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0001] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0037] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0058] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', managed-type: 'external') Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0073] device (lo): Activation: starting connection 'lo' (23afe670-0f3a-4e7d-931c-510551740501) Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0090] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0096] device (eth0): state change: unmanaged -> unavailable (reason 'managed', managed-type: 'external') Oct 13 20:14:53 np0005486557.novalocal systemd[1]: Started Network Manager. Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0142] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0149] device (lo): state change: disconnected -> prepare (reason 'none', managed-type: 'external') Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0154] device (lo): state change: prepare -> config (reason 'none', managed-type: 'external') Oct 13 20:14:53 np0005486557.novalocal systemd[1]: Reached target Network. Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0156] device (lo): state change: config -> ip-config (reason 'none', managed-type: 'external') Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0159] device (eth0): carrier: link connected Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0163] device (lo): state change: ip-config -> ip-check (reason 'none', managed-type: 'external') Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0174] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', managed-type: 'full') Oct 13 20:14:53 np0005486557.novalocal systemd[1]: Starting Network Manager Wait Online... Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0186] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0193] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0195] device (eth0): state change: disconnected -> prepare (reason 'none', managed-type: 'full') Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0198] manager: NetworkManager state is now CONNECTING Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0201] device (eth0): state change: prepare -> config (reason 'none', managed-type: 'full') Oct 13 20:14:53 np0005486557.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0214] device (eth0): state change: config -> ip-config (reason 'none', managed-type: 'full') Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0218] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Oct 13 20:14:53 np0005486557.novalocal systemd[1]: Started Network Manager Script Dispatcher Service. Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0268] device (lo): state change: ip-check -> secondaries (reason 'none', managed-type: 'external') Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0271] dhcp4 (eth0): state changed new lease, address=38.102.83.224 Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0275] device (lo): state change: secondaries -> activated (reason 'none', managed-type: 'external') Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0285] device (lo): Activation: successful, device activated. Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0305] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0340] device (eth0): state change: ip-config -> ip-check (reason 'none', managed-type: 'full') Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0371] device (eth0): state change: ip-check -> secondaries (reason 'none', managed-type: 'full') Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0373] device (eth0): state change: secondaries -> activated (reason 'none', managed-type: 'full') Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0378] manager: NetworkManager state is now CONNECTED_SITE Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0381] device (eth0): Activation: successful, device activated. Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0390] manager: NetworkManager state is now CONNECTED_GLOBAL Oct 13 20:14:53 np0005486557.novalocal NetworkManager[856]: [1760400893.0397] manager: startup complete Oct 13 20:14:53 np0005486557.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Oct 13 20:14:53 np0005486557.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Oct 13 20:14:53 np0005486557.novalocal systemd[1]: Reached target NFS client services. Oct 13 20:14:53 np0005486557.novalocal systemd[1]: Reached target Preparation for Remote File Systems. Oct 13 20:14:53 np0005486557.novalocal systemd[1]: Reached target Remote File Systems. Oct 13 20:14:53 np0005486557.novalocal systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 13 20:14:53 np0005486557.novalocal systemd[1]: Finished Network Manager Wait Online. Oct 13 20:14:53 np0005486557.novalocal systemd[1]: Starting Cloud-init: Network Stage... Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: Cloud-init v. 24.4-7.el9 running 'init' at Tue, 14 Oct 2025 00:14:53 +0000. Up 9.16 seconds. Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: | eth0 | True | 38.102.83.224 | 255.255.255.0 | global | fa:16:3e:aa:e7:3f | Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: | eth0 | True | fe80::f816:3eff:feaa:e73f/64 | . | link | fa:16:3e:aa:e7:3f | Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: | lo | True | ::1/128 | . | host | . | Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: +-------+-------------+---------+-----------+-------+ Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: | Route | Destination | Gateway | Interface | Flags | Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: +-------+-------------+---------+-----------+-------+ Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: | 3 | multicast | :: | eth0 | U | Oct 13 20:14:53 np0005486557.novalocal cloud-init[919]: ci-info: +-------+-------------+---------+-----------+-------+ Oct 13 20:14:54 np0005486557.novalocal useradd[985]: new group: name=cloud-user, GID=1001 Oct 13 20:14:54 np0005486557.novalocal useradd[985]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Oct 13 20:14:54 np0005486557.novalocal useradd[985]: add 'cloud-user' to group 'adm' Oct 13 20:14:54 np0005486557.novalocal useradd[985]: add 'cloud-user' to group 'systemd-journal' Oct 13 20:14:54 np0005486557.novalocal useradd[985]: add 'cloud-user' to shadow group 'adm' Oct 13 20:14:54 np0005486557.novalocal useradd[985]: add 'cloud-user' to shadow group 'systemd-journal' Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: Generating public/private rsa key pair. Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: The key fingerprint is: Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: SHA256:0sgHHucES2PIs66NU/K61MFBJG6h+FMwdsRgCRaeX2o root@np0005486557.novalocal Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: The key's randomart image is: Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: +---[RSA 3072]----+ Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: |.+XB=.= | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: |+=oB=o + | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: |ooo o++ o | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | o.o++ O | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | oEo = S | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | ooo. o | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | .B. | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | .+ o | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | o+ | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: +----[SHA256]-----+ Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: Generating public/private ecdsa key pair. Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: The key fingerprint is: Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: SHA256:Sk+i05qHM+07yzEhiRwX9KRj4CZNOqiTlp3Rqe0Iqo8 root@np0005486557.novalocal Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: The key's randomart image is: Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: +---[ECDSA 256]---+ Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | o.o . | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: |.= ..=. | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: |= =.=o. | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: |.*o==o | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: |++o+o.+ S | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: |o.. o= * | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: |. .o+= . | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: |.. +=+o | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: |E.. o==+ | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: +----[SHA256]-----+ Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: Generating public/private ed25519 key pair. Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: The key fingerprint is: Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: SHA256:NwqrT90KVkGE2uCvfMZu06jWXw87OntcA6FVXIIiskM root@np0005486557.novalocal Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: The key's randomart image is: Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: +--[ED25519 256]--+ Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | oo +o.. | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | E o.. + .. | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | o * ..+ . | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | = . ... | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | o. S o. | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | .= + .o | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | . +=oo.+. . | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | ++O.oo++ | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: | .oBoo==... | Oct 13 20:14:54 np0005486557.novalocal cloud-init[919]: +----[SHA256]-----+ Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Finished Cloud-init: Network Stage. Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Reached target Cloud-config availability. Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Reached target Network is Online. Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Starting Cloud-init: Config Stage... Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Starting Notify NFS peers of a restart... Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Starting System Logging Service... Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Starting OpenSSH server daemon... Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Starting Permit User Sessions... Oct 13 20:14:54 np0005486557.novalocal sm-notify[1000]: Version 2.5.4 starting Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Started Notify NFS peers of a restart. Oct 13 20:14:54 np0005486557.novalocal sshd[1002]: Server listening on 0.0.0.0 port 22. Oct 13 20:14:54 np0005486557.novalocal sshd[1002]: Server listening on :: port 22. Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Started OpenSSH server daemon. Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Finished Permit User Sessions. Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Started Command Scheduler. Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Started Getty on tty1. Oct 13 20:14:54 np0005486557.novalocal rsyslogd[1001]: [origin software="rsyslogd" swVersion="8.2506.0-2.el9" x-pid="1001" x-info="https://www.rsyslog.com"] start Oct 13 20:14:54 np0005486557.novalocal rsyslogd[1001]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2506.0-2.el9 try https://www.rsyslog.com/e/2040 ] Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Started Serial Getty on ttyS0. Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Reached target Login Prompts. Oct 13 20:14:54 np0005486557.novalocal crond[1005]: (CRON) STARTUP (1.5.7) Oct 13 20:14:54 np0005486557.novalocal crond[1005]: (CRON) INFO (Syslog will be used instead of sendmail.) Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Started System Logging Service. Oct 13 20:14:54 np0005486557.novalocal crond[1005]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 13% if used.) Oct 13 20:14:54 np0005486557.novalocal crond[1005]: (CRON) INFO (running with inotify support) Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Reached target Multi-User System. Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Starting Record Runlevel Change in UTMP... Oct 13 20:14:54 np0005486557.novalocal sshd-session[1004]: Connection reset by 38.102.83.114 port 60754 [preauth] Oct 13 20:14:54 np0005486557.novalocal systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 13 20:14:54 np0005486557.novalocal systemd[1]: Finished Record Runlevel Change in UTMP. Oct 13 20:14:54 np0005486557.novalocal sshd-session[1013]: Unable to negotiate with 38.102.83.114 port 60768: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Oct 13 20:14:54 np0005486557.novalocal sshd-session[1017]: Unable to negotiate with 38.102.83.114 port 60788: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Oct 13 20:14:54 np0005486557.novalocal sshd-session[1019]: Unable to negotiate with 38.102.83.114 port 60804: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Oct 13 20:14:54 np0005486557.novalocal rsyslogd[1001]: imjournal: journal files changed, reloading... [v8.2506.0-2.el9 try https://www.rsyslog.com/e/0 ] Oct 13 20:14:54 np0005486557.novalocal sshd-session[1023]: Connection reset by 38.102.83.114 port 60826 [preauth] Oct 13 20:14:55 np0005486557.novalocal sshd-session[1025]: Unable to negotiate with 38.102.83.114 port 60832: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth] Oct 13 20:14:55 np0005486557.novalocal sshd-session[1015]: Connection closed by 38.102.83.114 port 60778 [preauth] Oct 13 20:14:55 np0005486557.novalocal sshd-session[1027]: Unable to negotiate with 38.102.83.114 port 60848: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Oct 13 20:14:55 np0005486557.novalocal sshd-session[1021]: Connection closed by 38.102.83.114 port 60818 [preauth] Oct 13 20:14:55 np0005486557.novalocal cloud-init[1031]: Cloud-init v. 24.4-7.el9 running 'modules:config' at Tue, 14 Oct 2025 00:14:55 +0000. Up 10.87 seconds. Oct 13 20:14:55 np0005486557.novalocal systemd[1]: Finished Cloud-init: Config Stage. Oct 13 20:14:55 np0005486557.novalocal systemd[1]: Starting Cloud-init: Final Stage... Oct 13 20:14:55 np0005486557.novalocal cloud-init[1035]: Cloud-init v. 24.4-7.el9 running 'modules:final' at Tue, 14 Oct 2025 00:14:55 +0000. Up 11.26 seconds. Oct 13 20:14:55 np0005486557.novalocal cloud-init[1037]: ############################################################# Oct 13 20:14:55 np0005486557.novalocal cloud-init[1038]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Oct 13 20:14:55 np0005486557.novalocal cloud-init[1040]: 256 SHA256:Sk+i05qHM+07yzEhiRwX9KRj4CZNOqiTlp3Rqe0Iqo8 root@np0005486557.novalocal (ECDSA) Oct 13 20:14:55 np0005486557.novalocal cloud-init[1042]: 256 SHA256:NwqrT90KVkGE2uCvfMZu06jWXw87OntcA6FVXIIiskM root@np0005486557.novalocal (ED25519) Oct 13 20:14:55 np0005486557.novalocal cloud-init[1044]: 3072 SHA256:0sgHHucES2PIs66NU/K61MFBJG6h+FMwdsRgCRaeX2o root@np0005486557.novalocal (RSA) Oct 13 20:14:55 np0005486557.novalocal cloud-init[1045]: -----END SSH HOST KEY FINGERPRINTS----- Oct 13 20:14:55 np0005486557.novalocal cloud-init[1046]: ############################################################# Oct 13 20:14:55 np0005486557.novalocal cloud-init[1035]: Cloud-init v. 24.4-7.el9 finished at Tue, 14 Oct 2025 00:14:55 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 11.50 seconds Oct 13 20:14:55 np0005486557.novalocal systemd[1]: Finished Cloud-init: Final Stage. Oct 13 20:14:55 np0005486557.novalocal systemd[1]: Reached target Cloud-init target. Oct 13 20:14:55 np0005486557.novalocal systemd[1]: Startup finished in 1.865s (kernel) + 3.296s (initrd) + 6.418s (userspace) = 11.580s. Oct 13 20:14:57 np0005486557.novalocal chronyd[795]: Selected source 167.160.187.12 (2.centos.pool.ntp.org) Oct 13 20:14:57 np0005486557.novalocal chronyd[795]: System clock TAI offset set to 37 seconds Oct 13 20:15:02 np0005486557.novalocal irqbalance[787]: Cannot change IRQ 25 affinity: Operation not permitted Oct 13 20:15:02 np0005486557.novalocal irqbalance[787]: IRQ 25 affinity is now unmanaged Oct 13 20:15:02 np0005486557.novalocal irqbalance[787]: Cannot change IRQ 31 affinity: Operation not permitted Oct 13 20:15:02 np0005486557.novalocal irqbalance[787]: IRQ 31 affinity is now unmanaged Oct 13 20:15:02 np0005486557.novalocal irqbalance[787]: Cannot change IRQ 28 affinity: Operation not permitted Oct 13 20:15:02 np0005486557.novalocal irqbalance[787]: IRQ 28 affinity is now unmanaged Oct 13 20:15:02 np0005486557.novalocal irqbalance[787]: Cannot change IRQ 32 affinity: Operation not permitted Oct 13 20:15:02 np0005486557.novalocal irqbalance[787]: IRQ 32 affinity is now unmanaged Oct 13 20:15:02 np0005486557.novalocal irqbalance[787]: Cannot change IRQ 30 affinity: Operation not permitted Oct 13 20:15:02 np0005486557.novalocal irqbalance[787]: IRQ 30 affinity is now unmanaged Oct 13 20:15:02 np0005486557.novalocal irqbalance[787]: Cannot change IRQ 29 affinity: Operation not permitted Oct 13 20:15:02 np0005486557.novalocal irqbalance[787]: IRQ 29 affinity is now unmanaged Oct 13 20:15:03 np0005486557.novalocal systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Oct 13 20:15:06 np0005486557.novalocal sshd-session[1052]: Accepted publickey for zuul-worker from 38.102.83.114 port 39110 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Oct 13 20:15:06 np0005486557.novalocal systemd[1]: Created slice User Slice of UID 1000. Oct 13 20:15:06 np0005486557.novalocal systemd[1]: Starting User Runtime Directory /run/user/1000... Oct 13 20:15:06 np0005486557.novalocal systemd-logind[793]: New session 1 of user zuul-worker. Oct 13 20:15:06 np0005486557.novalocal systemd[1]: Finished User Runtime Directory /run/user/1000. Oct 13 20:15:06 np0005486557.novalocal systemd[1]: Starting User Manager for UID 1000... Oct 13 20:15:06 np0005486557.novalocal systemd[1056]: pam_unix(systemd-user:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Oct 13 20:15:06 np0005486557.novalocal systemd[1056]: Queued start job for default target Main User Target. Oct 13 20:15:06 np0005486557.novalocal systemd[1056]: Created slice User Application Slice. Oct 13 20:15:06 np0005486557.novalocal systemd[1056]: Started Mark boot as successful after the user session has run 2 minutes. Oct 13 20:15:06 np0005486557.novalocal systemd[1056]: Started Daily Cleanup of User's Temporary Directories. Oct 13 20:15:06 np0005486557.novalocal systemd[1056]: Reached target Paths. Oct 13 20:15:06 np0005486557.novalocal systemd[1056]: Reached target Timers. Oct 13 20:15:06 np0005486557.novalocal systemd[1056]: Starting D-Bus User Message Bus Socket... Oct 13 20:15:06 np0005486557.novalocal systemd[1056]: Starting Create User's Volatile Files and Directories... Oct 13 20:15:06 np0005486557.novalocal systemd[1056]: Listening on D-Bus User Message Bus Socket. Oct 13 20:15:06 np0005486557.novalocal systemd[1056]: Reached target Sockets. Oct 13 20:15:06 np0005486557.novalocal systemd[1056]: Finished Create User's Volatile Files and Directories. Oct 13 20:15:06 np0005486557.novalocal systemd[1056]: Reached target Basic System. Oct 13 20:15:06 np0005486557.novalocal systemd[1056]: Reached target Main User Target. Oct 13 20:15:06 np0005486557.novalocal systemd[1056]: Startup finished in 203ms. Oct 13 20:15:06 np0005486557.novalocal systemd[1]: Started User Manager for UID 1000. Oct 13 20:15:06 np0005486557.novalocal systemd[1]: Started Session 1 of User zuul-worker. Oct 13 20:15:06 np0005486557.novalocal sshd-session[1052]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Oct 13 20:15:07 np0005486557.novalocal python3[1138]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 13 20:15:08 np0005486557.novalocal python3[1166]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 13 20:15:15 np0005486557.novalocal python3[1224]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 13 20:15:15 np0005486557.novalocal python3[1264]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Oct 13 20:15:17 np0005486557.novalocal python3[1290]: ansible-authorized_key Invoked with user=zuul-worker state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 13 20:15:18 np0005486557.novalocal python3[1314]: ansible-file Invoked with state=directory path=/home/zuul-worker/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:18 np0005486557.novalocal python3[1413]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 13 20:15:19 np0005486557.novalocal python3[1484]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760400918.2609713-163-276630068578577/source dest=/home/zuul-worker/.ssh/id_rsa mode=384 force=False _original_basename=c1f3288eea38494da7df4d2eb7ceed1d_id_rsa follow=False checksum=0e74f35e4f0ce1b40f8375f39845edb67f9a60ca backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:19 np0005486557.novalocal python3[1607]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 13 20:15:19 np0005486557.novalocal python3[1678]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760400919.260673-174-105844101656457/source dest=/home/zuul-worker/.ssh/id_rsa.pub mode=420 force=False _original_basename=c1f3288eea38494da7df4d2eb7ceed1d_id_rsa.pub follow=False checksum=72ea1781527e17e58e17311b308f3777dc01b6da backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:21 np0005486557.novalocal python3[1726]: ansible-ping Invoked with data=pong Oct 13 20:15:22 np0005486557.novalocal python3[1750]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 13 20:15:22 np0005486557.novalocal systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 13 20:15:23 np0005486557.novalocal python3[1810]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Oct 13 20:15:24 np0005486557.novalocal python3[1842]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:25 np0005486557.novalocal python3[1866]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:25 np0005486557.novalocal python3[1890]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:25 np0005486557.novalocal python3[1914]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:25 np0005486557.novalocal python3[1938]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:26 np0005486557.novalocal python3[1962]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:29 np0005486557.novalocal python3[1986]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Oct 13 20:15:30 np0005486557.novalocal sshd-session[1989]: Accepted publickey for zuul-worker from 38.102.83.114 port 41804 ssh2: RSA SHA256:Y9O1bmIcmY5pAqNRCtF/+Qlu37tqI1eD8UghJttow4Y Oct 13 20:15:30 np0005486557.novalocal systemd-logind[793]: New session 3 of user zuul-worker. Oct 13 20:15:30 np0005486557.novalocal systemd[1]: Started Session 3 of User zuul-worker. Oct 13 20:15:30 np0005486557.novalocal sshd-session[1989]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Oct 13 20:15:33 np0005486557.novalocal sshd-session[1992]: Received disconnect from 38.102.83.114 port 41804:11: disconnected by user Oct 13 20:15:33 np0005486557.novalocal sshd-session[1992]: Disconnected from user zuul-worker 38.102.83.114 port 41804 Oct 13 20:15:33 np0005486557.novalocal sshd-session[1989]: pam_unix(sshd:session): session closed for user zuul-worker Oct 13 20:15:33 np0005486557.novalocal systemd[1]: session-3.scope: Deactivated successfully. Oct 13 20:15:33 np0005486557.novalocal systemd[1]: session-3.scope: Consumed 1.663s CPU time. Oct 13 20:15:33 np0005486557.novalocal systemd-logind[793]: Session 3 logged out. Waiting for processes to exit. Oct 13 20:15:33 np0005486557.novalocal systemd-logind[793]: Removed session 3. Oct 13 20:15:33 np0005486557.novalocal python3[2040]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:33 np0005486557.novalocal python3[2064]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:34 np0005486557.novalocal python3[2088]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:34 np0005486557.novalocal python3[2112]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:34 np0005486557.novalocal python3[2136]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:34 np0005486557.novalocal python3[2160]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:35 np0005486557.novalocal python3[2185]: ansible-ansible.legacy.command Invoked with _raw_params=sudo -n true zuul_log_id=fa163ec2-ffbe-e1f4-444c-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:15:35 np0005486557.novalocal sudo[2186]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/true Oct 13 20:15:35 np0005486557.novalocal sudo[2186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:15:35 np0005486557.novalocal sudo[2186]: pam_unix(sudo:session): session closed for user root Oct 13 20:15:35 np0005486557.novalocal python3[2214]: ansible-file Invoked with path=/home/zuul-worker/.pydistutils.cfg state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:36 np0005486557.novalocal sudo[2290]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wwoncvtgnixoxilfcyzkvfnwcqgbwkaq ; /usr/bin/python3' Oct 13 20:15:36 np0005486557.novalocal sudo[2290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:15:36 np0005486557.novalocal python3[2292]: ansible-ansible.legacy.stat Invoked with path=/etc/pip.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 13 20:15:36 np0005486557.novalocal sudo[2290]: pam_unix(sudo:session): session closed for user root Oct 13 20:15:36 np0005486557.novalocal sudo[2363]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rlnezzpnzsufxzsxginufxoqpbklejow ; /usr/bin/python3' Oct 13 20:15:36 np0005486557.novalocal sudo[2363]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:15:36 np0005486557.novalocal python3[2365]: ansible-ansible.legacy.copy Invoked with dest=/etc/pip.conf group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760400936.1227033-91-31594579543544/source follow=False _original_basename=pip.conf.j2 checksum=5b65c9094402b8db60a77928be1f816342638afe backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:36 np0005486557.novalocal sudo[2363]: pam_unix(sudo:session): session closed for user root Oct 13 20:15:37 np0005486557.novalocal sudo[2465]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vztwpfmbqnclpwlbpwwkehpdgfyvuyvr ; /usr/bin/python3' Oct 13 20:15:37 np0005486557.novalocal sudo[2465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:15:37 np0005486557.novalocal python3[2467]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 13 20:15:37 np0005486557.novalocal sudo[2465]: pam_unix(sudo:session): session closed for user root Oct 13 20:15:37 np0005486557.novalocal sudo[2540]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ykctbjxmtcwgztgeykbkfwjugaqhwetv ; /usr/bin/python3' Oct 13 20:15:37 np0005486557.novalocal sudo[2540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:15:37 np0005486557.novalocal python3[2542]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760400937.2086394-103-273820296878607/source follow=False _original_basename=centos.repo.j2 checksum=0268eb1686bc9b047a2096dbaf287658b0d20a19 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:38 np0005486557.novalocal sudo[2540]: pam_unix(sudo:session): session closed for user root Oct 13 20:15:38 np0005486557.novalocal sudo[2642]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-alslrraltwmohdkobysvogrrtsfqmrfq ; /usr/bin/python3' Oct 13 20:15:38 np0005486557.novalocal sudo[2642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:15:38 np0005486557.novalocal python3[2644]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos-addons.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 13 20:15:38 np0005486557.novalocal sudo[2642]: pam_unix(sudo:session): session closed for user root Oct 13 20:15:38 np0005486557.novalocal sudo[2717]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-viaeazozevwfsrggeyjzzuymtgyttoys ; /usr/bin/python3' Oct 13 20:15:38 np0005486557.novalocal sudo[2717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:15:38 np0005486557.novalocal python3[2719]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos-addons.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760400938.1841474-103-200570238012231/source follow=False _original_basename=centos-addons.repo.j2 checksum=2917e612982cadeb3009a3bf37bf30cbcd7f2044 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:38 np0005486557.novalocal sudo[2717]: pam_unix(sudo:session): session closed for user root Oct 13 20:15:39 np0005486557.novalocal sudo[2767]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jqgxcigkxidfkyanyybwyhdrpytdldrw ; /usr/bin/python3' Oct 13 20:15:39 np0005486557.novalocal sudo[2767]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:15:39 np0005486557.novalocal python3[2769]: ansible-ini_file Invoked with path=/etc/dnf.conf section=main option=deltarpm value=0 mode=420 backup=False state=present exclusive=True no_extra_spaces=False ignore_spaces=False allow_no_value=False create=True follow=False unsafe_writes=False values=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:39 np0005486557.novalocal python3[2769]: ansible-ini_file [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Oct 13 20:15:39 np0005486557.novalocal sudo[2767]: pam_unix(sudo:session): session closed for user root Oct 13 20:15:39 np0005486557.novalocal sudo[2793]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uceyakjlsiaudvllqrosokszyyufrvti ; /usr/bin/python3' Oct 13 20:15:39 np0005486557.novalocal sudo[2793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:15:39 np0005486557.novalocal python3[2795]: ansible-ansible.legacy.command Invoked with _raw_params=dnf clean all zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:15:40 np0005486557.novalocal sudo[2793]: pam_unix(sudo:session): session closed for user root Oct 13 20:15:40 np0005486557.novalocal sudo[2821]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dxhvtxrftzbldmdfapvxboccrmozoulh ; /usr/bin/python3' Oct 13 20:15:40 np0005486557.novalocal sudo[2821]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:15:40 np0005486557.novalocal python3[2823]: ansible-ansible.legacy.command Invoked with _raw_params=dnf makecache -v zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:15:42 np0005486557.novalocal irqbalance[787]: Cannot change IRQ 26 affinity: Operation not permitted Oct 13 20:15:42 np0005486557.novalocal irqbalance[787]: IRQ 26 affinity is now unmanaged Oct 13 20:15:51 np0005486557.novalocal sudo[2821]: pam_unix(sudo:session): session closed for user root Oct 13 20:15:52 np0005486557.novalocal python3[2864]: ansible-file Invoked with path=/home/zuul-worker/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:15:53 np0005486557.novalocal python3[2889]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=PYTHON2=0 PYTHON3=1 # Not all platforms install a `pip` when installing python # specific pip packages. We first check if pip$VERSION is # available and if not fallback to checking if just `pip` # is present. if [ "$PYTHON2" -eq "1" ] ; then command -v pip2 || command -v pip || exit 1 python2 -m wheel --help || exit 1 fi if [ "$PYTHON3" -eq "1" ] ; then command -v pip3 || command -v pip || exit 1 python3 -m wheel --help || exit 1 fi _uses_shell=True zuul_log_id=fa163ec2-ffbe-c4cb-e605-000000000097-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Oct 13 20:15:54 np0005486557.novalocal sudo[2917]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hxildixrmfemtngalpymbixxdbrgmvdh ; /usr/bin/python3' Oct 13 20:15:54 np0005486557.novalocal sudo[2917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:15:54 np0005486557.novalocal python3[2919]: ansible-ansible.legacy.dnf Invoked with name=['python3-pip', 'python3-setuptools', 'python3-wheel'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 13 20:15:56 np0005486557.novalocal systemd[1]: Starting PackageKit Daemon... Oct 13 20:15:56 np0005486557.novalocal PackageKit[2925]: daemon start Oct 13 20:15:56 np0005486557.novalocal systemd[1]: Starting Authorization Manager... Oct 13 20:15:56 np0005486557.novalocal polkitd[2929]: Started polkitd version 0.117 Oct 13 20:15:56 np0005486557.novalocal polkitd[2929]: Loading rules from directory /etc/polkit-1/rules.d Oct 13 20:15:56 np0005486557.novalocal polkitd[2929]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 13 20:15:56 np0005486557.novalocal polkitd[2929]: Finished loading, compiling and executing 3 rules Oct 13 20:15:56 np0005486557.novalocal polkitd[2929]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 13 20:15:56 np0005486557.novalocal systemd[1]: Started Authorization Manager. Oct 13 20:15:56 np0005486557.novalocal systemd[1]: Started PackageKit Daemon. Oct 13 20:15:56 np0005486557.novalocal sudo[2917]: pam_unix(sudo:session): session closed for user root Oct 13 20:15:57 np0005486557.novalocal python3[2969]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v python3 _uses_shell=True zuul_log_id=fa163ec2-ffbe-c4cb-e605-0000000000a1-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Oct 13 20:15:58 np0005486557.novalocal python3[2997]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v tox /home/zuul-worker/.local/tox/bin/tox || exit 1 _uses_shell=True zuul_log_id=fa163ec2-ffbe-c4cb-e605-00000000002b-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Oct 13 20:15:59 np0005486557.novalocal python3[3025]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/bin/python3 -m venv /home/zuul-worker/.local/tox zuul_log_id=fa163ec2-ffbe-c4cb-e605-00000000002e-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:16:02 np0005486557.novalocal python3[3057]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/pip install tox zuul_log_id=fa163ec2-ffbe-c4cb-e605-00000000002f-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:16:03 np0005486557.novalocal chronyd[795]: Selected source 172.97.210.214 (2.centos.pool.ntp.org) Oct 13 20:16:05 np0005486557.novalocal python3[3087]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/tox --version zuul_log_id=fa163ec2-ffbe-c4cb-e605-000000000032-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:16:05 np0005486557.novalocal sudo[3114]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-eclxsfdyrdxutrtlfknqkduqkbntfqtc ; /usr/bin/python3' Oct 13 20:16:05 np0005486557.novalocal sudo[3114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:16:05 np0005486557.novalocal python3[3116]: ansible-file Invoked with state=link src=/home/zuul-worker/.local/tox/bin/tox dest=/usr/local/bin/tox path=/usr/local/bin/tox recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:16:05 np0005486557.novalocal sudo[3114]: pam_unix(sudo:session): session closed for user root Oct 13 20:16:05 np0005486557.novalocal python3[3141]: ansible-ansible.legacy.command Invoked with _raw_params=export WBASE="/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo"; mkdir -p $WBASE/playbooks/roles ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-common" $WBASE/playbooks/roles/common; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-logs" $WBASE/playbooks/roles/logs; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-kolla" $WBASE/playbooks/roles/kolla; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-packstack" $WBASE/playbooks/roles/packstack; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-puppet-openstack" $WBASE/playbooks/roles/puppet-openstack; # noqa 204 ln -s "/home/zuul-worker/src/github.com/openstack-k8s-operators/ci-framework/roles/build_containers" $WBASE/playbooks/roles/build_containers; # noqa 204 _uses_shell=True zuul_log_id=fa163ec2-ffbe-c4cb-e605-000000000049-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:16:06 np0005486557.novalocal sudo[3174]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gtgimgttrodussrvxfdyemsvrkbuytfs ; /usr/bin/python3' Oct 13 20:16:06 np0005486557.novalocal sudo[3174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:16:06 np0005486557.novalocal python3[3176]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:16:06 np0005486557.novalocal sudo[3174]: pam_unix(sudo:session): session closed for user root Oct 13 20:16:06 np0005486557.novalocal sudo[3252]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kfonhqmysqqdgpdthfrthakeykhcrgcz ; /usr/bin/python3' Oct 13 20:16:06 np0005486557.novalocal sudo[3252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:16:07 np0005486557.novalocal python3[3254]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 13 20:16:07 np0005486557.novalocal sudo[3252]: pam_unix(sudo:session): session closed for user root Oct 13 20:16:07 np0005486557.novalocal sudo[3325]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gnfeqysogwlibucocswhymwpvnvmeysp ; /usr/bin/python3' Oct 13 20:16:07 np0005486557.novalocal sudo[3325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:16:07 np0005486557.novalocal python3[3327]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760400966.6241643-83-115914855178922/source follow=False _original_basename=mirror_info.sh.j2 checksum=ea5d641d750b2605d80a15d4106dfb6027081c92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 13 20:16:07 np0005486557.novalocal sudo[3325]: pam_unix(sudo:session): session closed for user root Oct 13 20:16:07 np0005486557.novalocal sudo[3376]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bphaegnnshhekoqfyzmuzzvermziapnj ; /usr/bin/python3' Oct 13 20:16:07 np0005486557.novalocal sudo[3376]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:16:08 np0005486557.novalocal python3[3378]: ansible-ansible.legacy.command Invoked with _raw_params=dnf install -y python3-pip rpmlint python3-rpm _uses_shell=True zuul_log_id=fa163ec2-ffbe-c4cb-e605-00000000005c-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:16:08 np0005486557.novalocal sudo[3376]: pam_unix(sudo:session): session closed for user root Oct 13 20:16:09 np0005486557.novalocal python3[3405]: ansible-pip Invoked with name=['rdopkg'] virtualenv=/home/zuul-worker/rdopkg-venv virtualenv_command=/usr/bin/python3 -m venv virtualenv_site_packages=True state=present editable=False version=None requirements=None virtualenv_python=None extra_args=None chdir=None executable=None umask=None Oct 13 20:16:16 np0005486557.novalocal python3[3438]: ansible-ansible.legacy.command Invoked with _raw_params=set -x export CENTOS_RELEASE="centos9" logs=https://logserver.rdoproject.org/c17/rdoproject.org/c171187f6c0748d88bf529e971b131f2/buildset source '/home/zuul-worker/rdopkg-venv/bin/activate' # Use the latest repository hash # If DLRN built multiple packages, there will be multiple repositories. # We want the latest repository which contains all of the packages that were just built. repository="${logs}/centos/current" if [ ${CENTOS_RELEASE} = "centos8" ]; then repository="${logs}/centos8/current" elif [ ${CENTOS_RELEASE} = "centos9" ]; then repository="${logs}/centos9/current" fi # The rdoinfo-DLRN-check job may create different repos when it builds packages for more than # one release. In that case, let us try to find the right one curl -o /dev/null -sIf "${repository}" if [ $? -ne 0 ]; then STABLE_RELEASES="$(rdopkg release | grep -e 'name:' | awk '{print $2}' | tail -n +2 | awk 1 ORS='-rdo ')" releases="rpm-master $STABLE_RELEASES" for release in $releases; do repository="${logs}/centos-${release}/current" curl -o /dev/null -sIf "${repository}" || continue break done fi # If we could not find a working repository, give up curl -o /dev/null -sIf "${repository}" || exit 1 _uses_shell=True zuul_log_id=fa163ec2-ffbe-c4cb-e605-000000000008-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:16:21 np0005486557.novalocal python3[3491]: ansible-ansible.legacy.command Invoked with _raw_params=# This builder, when run from a child job of a DLRN based job, # configures the DLRN repository that was uploaded as an artifact # of the parent DLRN-rpmbuild job. # This allows to install the packages in that repository and test # them. set +ex export CENTOS_RELEASE="centos9" logs=https://logserver.rdoproject.org/c17/rdoproject.org/c171187f6c0748d88bf529e971b131f2/buildset source '/home/zuul-worker/rdopkg-venv/bin/activate' # Use the latest repository hash # If DLRN built multiple packages, there will be multiple repositories. # We want the latest repository which contains all of the packages that were just built. repository="${logs}/centos/current" if [ ${CENTOS_RELEASE} = "centos8" ]; then repository="${logs}/centos8/current" elif [ ${CENTOS_RELEASE} = "centos9" ]; then repository="${logs}/centos9/current" fi # The rdoinfo-DLRN-check job may create different repos when it builds packages for more than # one release. In that case, let us try to find the right one curl -o /dev/null -sIf "${repository}" if [ $? -ne 0 ]; then STABLE_RELEASES="$(rdopkg release | grep -e 'name:' | awk '{print $2}' | tail -n +2 | awk 1 ORS='-rdo ')" releases="rpm-master $STABLE_RELEASES" for release in $releases; do repository="${logs}/centos-${release}/current" curl -o /dev/null -sIf "${repository}" || continue break done fi # If we could not find a working repository, give up curl -o /dev/null -sIf "${repository}" || exit 1 # Configure the repository name="delorean-zuul-repo" sudo bash -c "cat << EOF > /etc/yum.repos.d/${name}.repo [${name}] name=${name} baseurl=${repository} enabled=1 gpgcheck=0 priority=1 EOF" _uses_shell=True zuul_log_id=fa163ec2-ffbe-c4cb-e605-000000000009-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:16:23 np0005486557.novalocal sudo[3492]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/bash -c 'cat << EOF > /etc/yum.repos.d/delorean-zuul-repo.repo#012[delorean-zuul-repo]#012name=delorean-zuul-repo#012baseurl=https://logserver.rdoproject.org/c17/rdoproject.org/c171187f6c0748d88bf529e971b131f2/buildset/centos-epoxy-rdo/current#012enabled=1#012gpgcheck=0#012priority=1#012EOF' Oct 13 20:16:23 np0005486557.novalocal sudo[3492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:16:23 np0005486557.novalocal sudo[3492]: pam_unix(sudo:session): session closed for user root Oct 13 20:16:23 np0005486557.novalocal python3[3537]: ansible-ansible.legacy.command Invoked with _raw_params=# WeIRDO uses ARA for ansible-playbook run visualization export WORKSPACE="/home/zuul-worker/workspace" mkdir -p $WORKSPACE export ARA_DATABASE_NAME="$WORKSPACE/ara.sqlite" source /home/zuul-worker/rdopkg-venv/bin/activate # Detecting if projects where removed status_report_url="https://trunk.rdoproject.org/centos9-epoxy/status_report.csv" status_report_dir="/home/zuul-worker/src/review.rdoproject.org/rdoinfo" wget "$status_report_url" -P "$status_report_dir" pushd "/home/zuul-worker/src/review.rdoproject.org/rdoinfo/rdoinfo" removed_projects=$(git diff HEAD~ | grep -e "^-- project:" | sort | uniq | awk '{print $3}') popd if [ -n "$removed_projects" ]; then while IFS= read -r project; do # translate projects into proper package names project_name=$(rdopkg findpkg "$project" | grep name: | awk '{print $2}') dependent_pkgs=$(grep "$project_name," "$status_report_dir/status_report.csv" | sed -e "s/,/ /g" | awk '{print $8}' | sed -e "s/|/\n/g" | grep -v ".src.rpm") exlude_pkgs=$(while IFS= read -r pkg; do basename $pkg | sed 's|-[0-9]*\..*||g'; done <<< "$dependent_pkgs" | uniq) total_pkgs_to_exclude+=$exlude_pkgs echo Project "$project_name" has following packages to exclude: $exlude_pkgs done <<< "$removed_projects" fi cmd=$(echo exclude=$total_pkgs_to_exclude) sudo sh -c "echo $cmd >> /etc/dnf/dnf.conf" sudo cat /etc/dnf/dnf.conf # Backwards compat for project and openstack_release # (dmsimard) TODO: Clean this up ASAP if [[ "weirdo-dlrn-epoxy-puppet-scenario005-centos9" == *"puppet"* ]]; then project="puppet-openstack" elif [[ "weirdo-dlrn-epoxy-puppet-scenario005-centos9" == *"tcib-container-build"* ]]; then project="tcib-container-build" else project="packstack" fi scenario="scenario005" if [[ "epoxy" != "master" ]]; then version="$(rdopkg release -r epoxy | grep upstream_branch | awk '{print $2}')" else version="epoxy" fi delorean_deps_url="https://trunk.rdoproject.org/centos9-epoxy/delorean-deps.repo" if [[ "check" =~ "experimental" ]]; then delorean_url="https://trunk.rdoproject.org/centos9-epoxy/current/delorean.repo" elif [[ "epoxy" == "master" ]]; then delorean_url="https://trunk.rdoproject.org/centos9-epoxy/puppet-passed-ci/delorean.repo" else delorean_url="https://trunk.rdoproject.org/centos9-epoxy/puppet-passed-ci/delorean.repo" fi cd "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo" # Prepare Ansible inventory to use localhost cat <hosts localhost ansible_connection=local ansible_python_interpreter=/usr/bin/python3 [openstack_nodes] localhost log_destination=/var/log/weirdo EOF tox -e ansible-playbook -- -vv -b -i hosts playbooks/$project-$scenario.yml \ -e version=$version \ -e openstack_release="epoxy" \ -e selinux_enforcing="true" \ -e delorean_url=$delorean_url \ -e delorean_deps_url=$delorean_deps_url \ -e enable_puppet_modules_rpm=true _uses_shell=True zuul_log_id=fa163ec2-ffbe-c4cb-e605-00000000000a-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:16:23 np0005486557.novalocal sudo[3549]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo exclude= >> /etc/dnf/dnf.conf' Oct 13 20:16:23 np0005486557.novalocal sudo[3549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:16:23 np0005486557.novalocal sudo[3549]: pam_unix(sudo:session): session closed for user root Oct 13 20:16:23 np0005486557.novalocal sudo[3552]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/cat /etc/dnf/dnf.conf Oct 13 20:16:23 np0005486557.novalocal sudo[3552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:16:23 np0005486557.novalocal sudo[3552]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:10 np0005486557.novalocal systemd[1056]: Starting Mark boot as successful... Oct 13 20:17:10 np0005486557.novalocal systemd[1056]: Finished Mark boot as successful. Oct 13 20:17:28 np0005486557.novalocal sudo[3827]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bimrlyssqfltsyrjnsfabojfvqgefqwl ; /usr/bin/python3' Oct 13 20:17:28 np0005486557.novalocal sudo[3827]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:28 np0005486557.novalocal python3[3829]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=* fact_path=/etc/ansible/facts.d Oct 13 20:17:29 np0005486557.novalocal sudo[3827]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:29 np0005486557.novalocal sudo[3867]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lrvetvchqwgsyjudtqszhitgvclleexe ; /usr/bin/python3' Oct 13 20:17:29 np0005486557.novalocal sudo[3867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:29 np0005486557.novalocal python3[3869]: ansible-command Invoked with _raw_params=sudo dnf config-manager --enable crb _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:17:29 np0005486557.novalocal python3[3869]: ansible-command [WARNING] Consider using 'become', 'become_method', and 'become_user' rather than running sudo Oct 13 20:17:29 np0005486557.novalocal sudo[3870]: root : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/dnf config-manager --enable crb Oct 13 20:17:29 np0005486557.novalocal sudo[3870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:17:29 np0005486557.novalocal sudo[3870]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:29 np0005486557.novalocal sudo[3867]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:30 np0005486557.novalocal sudo[3880]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wcnfyavemdniokmhdvnjutsuqwvrrvkg ; /usr/bin/python3' Oct 13 20:17:30 np0005486557.novalocal sudo[3880]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:30 np0005486557.novalocal python3[3882]: ansible-systemd Invoked with name=firewalld state=stopped daemon_reload=False daemon_reexec=False no_block=False enabled=None force=None masked=None user=None scope=None Oct 13 20:17:30 np0005486557.novalocal sudo[3880]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:30 np0005486557.novalocal sudo[3891]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qxvxygvgyicqadatjmrkfzpqrdhrjlme ; /usr/bin/python3' Oct 13 20:17:30 np0005486557.novalocal sudo[3891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:30 np0005486557.novalocal python3[3893]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 13 20:17:31 np0005486557.novalocal sudo[3891]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:32 np0005486557.novalocal sudo[3915]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nmfbxqlnyvolzeggfqactsegfwobmmjt ; /usr/bin/python3' Oct 13 20:17:32 np0005486557.novalocal sudo[3915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:32 np0005486557.novalocal python3[3917]: ansible-dnf Invoked with name=['tuned', 'subscription-manager'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 13 20:17:34 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:17:34 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:17:35 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:17:35 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:17:35 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:17:35 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:17:35 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:17:35 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:17:35 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:17:35 np0005486557.novalocal systemd-rc-local-generator[3989]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:17:35 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:17:38 np0005486557.novalocal sudo[3915]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:38 np0005486557.novalocal sudo[6066]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-akozsvjnnpklubsnhsbtmqbxnowggukk ; /usr/bin/python3' Oct 13 20:17:38 np0005486557.novalocal sudo[6066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:38 np0005486557.novalocal python3[6091]: ansible-systemd Invoked with name=tuned enabled=True state=started daemon_reload=False daemon_reexec=False no_block=False force=None masked=None user=None scope=None Oct 13 20:17:38 np0005486557.novalocal systemd[1]: Starting Dynamic System Tuning Daemon... Oct 13 20:17:39 np0005486557.novalocal systemd[1]: Started Dynamic System Tuning Daemon. Oct 13 20:17:39 np0005486557.novalocal sudo[6066]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:39 np0005486557.novalocal sudo[7144]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-isbprohkpqqkyijtayjjfucxguhdrbrs ; /usr/bin/python3' Oct 13 20:17:39 np0005486557.novalocal sudo[7144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:39 np0005486557.novalocal python3[7170]: ansible-command Invoked with _raw_params=tuned-adm active warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:17:39 np0005486557.novalocal sudo[7144]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:39 np0005486557.novalocal sudo[7591]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jacznrndckezinrgmssvrtskmfsoyfrz ; /usr/bin/python3' Oct 13 20:17:39 np0005486557.novalocal sudo[7591]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:39 np0005486557.novalocal python3[7609]: ansible-command Invoked with _raw_params=tuned-adm profile throughput-performance warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:17:41 np0005486557.novalocal sudo[7591]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:41 np0005486557.novalocal sudo[8540]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gsvgxhwltciioprxpnvczbwqgeyosfpe ; /usr/bin/python3' Oct 13 20:17:41 np0005486557.novalocal sudo[8540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:41 np0005486557.novalocal python3[8560]: ansible-file Invoked with path=/var/log/weirdo state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Oct 13 20:17:41 np0005486557.novalocal sudo[8540]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:41 np0005486557.novalocal sudo[8739]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bnlxrvdvrkwvulyffiyugtnzkxayhiiu ; /usr/bin/python3' Oct 13 20:17:41 np0005486557.novalocal sudo[8739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:41 np0005486557.novalocal python3[8758]: ansible-file Invoked with path=/var/log/weirdo-project state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Oct 13 20:17:41 np0005486557.novalocal sudo[8739]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:42 np0005486557.novalocal sudo[9277]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qmrifgkythtclinmrgdfhpoajnftacvj ; /usr/bin/python3' Oct 13 20:17:42 np0005486557.novalocal sudo[9277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:42 np0005486557.novalocal python3[9291]: ansible-get_url Invoked with url=https://trunk.rdoproject.org/centos9-epoxy/puppet-passed-ci/delorean.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Oct 13 20:17:42 np0005486557.novalocal sudo[9277]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:42 np0005486557.novalocal sudo[9529]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cagfjdnowtgwybydfbzpqdplzqkhvabo ; /usr/bin/python3' Oct 13 20:17:42 np0005486557.novalocal sudo[9529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:42 np0005486557.novalocal python3[9554]: ansible-get_url Invoked with url=https://trunk.rdoproject.org/centos9-epoxy/delorean-deps.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Oct 13 20:17:42 np0005486557.novalocal sudo[9529]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:42 np0005486557.novalocal sudo[9736]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nlbeweuqqontqdmdmadjzubtsmcuuecv ; /usr/bin/python3' Oct 13 20:17:42 np0005486557.novalocal sudo[9736]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:42 np0005486557.novalocal python3[9754]: ansible-command Invoked with _raw_params=if [ -f /etc/ci/mirror_info.sh ]; then source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|${NODEPOOL_RDO_PROXY}|g" /etc/yum.repos.d/*.repo # For CentOS8 sed -i -e "s|http://mirror.centos.org/centos|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo # For CentOS9 sed -i -e "s|http://mirror.stream.centos.org|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo fi _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:17:43 np0005486557.novalocal sudo[9736]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:43 np0005486557.novalocal sudo[9847]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-beccybmiaozucihjopzsxytycmndvghe ; /usr/bin/python3' Oct 13 20:17:43 np0005486557.novalocal sudo[9847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:43 np0005486557.novalocal python3[9866]: ansible-command Invoked with _raw_params=repoquery --disablerepo='*' --enablerepo='delorean*' -a --qf '%{sourcerpm}'|sort -u|sed 's/.src.rpm//g' >/var/log/weirdo/rdo-trunk-deps-start.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:17:46 np0005486557.novalocal sudo[9847]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:46 np0005486557.novalocal sudo[11048]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-oaepxmurbpxnjpyreegaelqwlratyrhb ; /usr/bin/python3' Oct 13 20:17:46 np0005486557.novalocal sudo[11048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:46 np0005486557.novalocal python3[11064]: ansible-command Invoked with _raw_params=dnf clean all _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:17:46 np0005486557.novalocal python3[11064]: ansible-command [WARNING] Consider using the dnf module rather than running 'dnf'. If you need to use command because dnf is insufficient you can add 'warn: false' to this command task or set 'command_warnings=False' in ansible.cfg to get rid of this message. Oct 13 20:17:47 np0005486557.novalocal sudo[11048]: pam_unix(sudo:session): session closed for user root Oct 13 20:17:47 np0005486557.novalocal sudo[11299]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-tlqhpfgbmeemwlydertzdfctgloxwjhh ; /usr/bin/python3' Oct 13 20:17:47 np0005486557.novalocal sudo[11299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:17:47 np0005486557.novalocal python3[11308]: ansible-dnf Invoked with name=['*'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 13 20:17:52 np0005486557.novalocal irqbalance[787]: Cannot change IRQ 27 affinity: Operation not permitted Oct 13 20:17:52 np0005486557.novalocal irqbalance[787]: IRQ 27 affinity is now unmanaged Oct 13 20:18:15 np0005486557.novalocal sudo[11299]: pam_unix(sudo:session): session closed for user root Oct 13 20:18:15 np0005486557.novalocal sudo[21350]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-geemebrlbteqahiztsvmzykduwlctqkz ; /usr/bin/python3' Oct 13 20:18:15 np0005486557.novalocal sudo[21350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:18:16 np0005486557.novalocal python3[21361]: ansible-dnf Invoked with name=['gettext', 'diffstat', 'doxygen', 'patch', 'patchutils', 'subversion', 'systemtap', 'git', 'wget', 'python3-libselinux', 'python3-setuptools', 'rubygem-rexml'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 13 20:18:16 np0005486557.novalocal sshd-session[21422]: Invalid user support from 78.128.112.74 port 48406 Oct 13 20:18:16 np0005486557.novalocal sshd-session[21422]: Connection closed by invalid user support 78.128.112.74 port 48406 [preauth] Oct 13 20:18:25 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:18:25 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:18:25 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Consumed 57.541s CPU time. Oct 13 20:18:25 np0005486557.novalocal systemd[1]: run-r51f8076e8ebe456b800f435b9ce861b9.service: Deactivated successfully. Oct 13 20:18:31 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:18:31 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:19:18 np0005486557.novalocal groupadd[41591]: group added to /etc/group: name=rtkit, GID=172 Oct 13 20:19:18 np0005486557.novalocal groupadd[41591]: group added to /etc/gshadow: name=rtkit Oct 13 20:19:18 np0005486557.novalocal groupadd[41591]: new group: name=rtkit, GID=172 Oct 13 20:19:19 np0005486557.novalocal useradd[41599]: new user: name=rtkit, UID=172, GID=172, home=/, shell=/sbin/nologin, from=none Oct 13 20:19:19 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:19:19 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:19:19 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:19:20 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:19:20 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:19:32 np0005486557.novalocal kernel: SELinux: Converting 433 SID table entries... Oct 13 20:19:32 np0005486557.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 13 20:19:32 np0005486557.novalocal kernel: SELinux: policy capability open_perms=1 Oct 13 20:19:32 np0005486557.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 13 20:19:32 np0005486557.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 13 20:19:32 np0005486557.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 13 20:19:32 np0005486557.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 13 20:19:32 np0005486557.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 13 20:19:39 np0005486557.novalocal groupadd[41664]: group added to /etc/group: name=pipewire, GID=993 Oct 13 20:19:39 np0005486557.novalocal groupadd[41664]: group added to /etc/gshadow: name=pipewire Oct 13 20:19:39 np0005486557.novalocal groupadd[41664]: new group: name=pipewire, GID=993 Oct 13 20:19:40 np0005486557.novalocal useradd[41671]: new user: name=pipewire, UID=993, GID=993, home=/run/pipewire, shell=/usr/sbin/nologin, from=none Oct 13 20:19:40 np0005486557.novalocal groupadd[41686]: group added to /etc/group: name=geoclue, GID=992 Oct 13 20:19:40 np0005486557.novalocal groupadd[41686]: group added to /etc/gshadow: name=geoclue Oct 13 20:19:40 np0005486557.novalocal groupadd[41686]: new group: name=geoclue, GID=992 Oct 13 20:19:40 np0005486557.novalocal useradd[41693]: new user: name=geoclue, UID=992, GID=992, home=/var/lib/geoclue, shell=/sbin/nologin, from=none Oct 13 20:19:40 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:19:40 np0005486557.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=2 res=1 Oct 13 20:19:40 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:19:40 np0005486557.novalocal polkitd[2929]: Reloading rules Oct 13 20:19:40 np0005486557.novalocal polkitd[2929]: Collecting garbage unconditionally... Oct 13 20:19:40 np0005486557.novalocal polkitd[2929]: Loading rules from directory /etc/polkit-1/rules.d Oct 13 20:19:40 np0005486557.novalocal polkitd[2929]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 13 20:19:40 np0005486557.novalocal polkitd[2929]: Finished loading, compiling and executing 4 rules Oct 13 20:19:40 np0005486557.novalocal polkitd[2929]: Reloading rules Oct 13 20:19:40 np0005486557.novalocal polkitd[2929]: Collecting garbage unconditionally... Oct 13 20:19:40 np0005486557.novalocal polkitd[2929]: Loading rules from directory /etc/polkit-1/rules.d Oct 13 20:19:40 np0005486557.novalocal polkitd[2929]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 13 20:19:40 np0005486557.novalocal polkitd[2929]: Finished loading, compiling and executing 4 rules Oct 13 20:19:40 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:19:40 np0005486557.novalocal groupadd[41705]: group added to /etc/group: name=flatpak, GID=991 Oct 13 20:19:40 np0005486557.novalocal groupadd[41705]: group added to /etc/gshadow: name=flatpak Oct 13 20:19:40 np0005486557.novalocal groupadd[41705]: new group: name=flatpak, GID=991 Oct 13 20:19:40 np0005486557.novalocal useradd[41712]: new user: name=flatpak, UID=991, GID=991, home=/, shell=/usr/sbin/nologin, from=none Oct 13 20:19:40 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:19:41 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:19:41 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:19:41 np0005486557.novalocal polkitd[2929]: Reloading rules Oct 13 20:19:41 np0005486557.novalocal polkitd[2929]: Collecting garbage unconditionally... Oct 13 20:19:41 np0005486557.novalocal polkitd[2929]: Loading rules from directory /etc/polkit-1/rules.d Oct 13 20:19:41 np0005486557.novalocal polkitd[2929]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 13 20:19:41 np0005486557.novalocal polkitd[2929]: Finished loading, compiling and executing 5 rules Oct 13 20:19:41 np0005486557.novalocal polkitd[2929]: Reloading rules Oct 13 20:19:41 np0005486557.novalocal polkitd[2929]: Collecting garbage unconditionally... Oct 13 20:19:41 np0005486557.novalocal polkitd[2929]: Loading rules from directory /etc/polkit-1/rules.d Oct 13 20:19:41 np0005486557.novalocal polkitd[2929]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 13 20:19:41 np0005486557.novalocal polkitd[2929]: Finished loading, compiling and executing 5 rules Oct 13 20:19:42 np0005486557.novalocal systemd[1]: Stopping OpenSSH server daemon... Oct 13 20:19:42 np0005486557.novalocal sshd[1002]: Received signal 15; terminating. Oct 13 20:19:42 np0005486557.novalocal systemd[1]: sshd.service: Deactivated successfully. Oct 13 20:19:42 np0005486557.novalocal systemd[1]: Stopped OpenSSH server daemon. Oct 13 20:19:42 np0005486557.novalocal systemd[1]: Stopped target sshd-keygen.target. Oct 13 20:19:42 np0005486557.novalocal systemd[1]: Stopping sshd-keygen.target... Oct 13 20:19:42 np0005486557.novalocal systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 13 20:19:42 np0005486557.novalocal systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 13 20:19:42 np0005486557.novalocal systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 13 20:19:42 np0005486557.novalocal systemd[1]: Reached target sshd-keygen.target. Oct 13 20:19:42 np0005486557.novalocal systemd[1]: Starting OpenSSH server daemon... Oct 13 20:19:42 np0005486557.novalocal sshd[41753]: Server listening on 0.0.0.0 port 22. Oct 13 20:19:42 np0005486557.novalocal sshd[41753]: Server listening on :: port 22. Oct 13 20:19:42 np0005486557.novalocal systemd[1]: Started OpenSSH server daemon. Oct 13 20:19:43 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:19:43 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:19:43 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:19:44 np0005486557.novalocal systemd-rc-local-generator[41843]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:19:44 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:19:46 np0005486557.novalocal sudo[21350]: pam_unix(sudo:session): session closed for user root Oct 13 20:19:46 np0005486557.novalocal sudo[44531]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yuqbskdtzxpihtnvjxrzzvadebuykoct ; /usr/bin/python3' Oct 13 20:19:46 np0005486557.novalocal sudo[44531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:19:46 np0005486557.novalocal python3[44558]: ansible-dnf Invoked with name=['net-tools', 'lsof', 'sysstat', 'psmisc', 'dnf-utils'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 13 20:19:52 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:19:52 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:19:52 np0005486557.novalocal systemd-rc-local-generator[49791]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:19:52 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:19:52 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:19:52 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:19:52 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Consumed 11.397s CPU time. Oct 13 20:19:52 np0005486557.novalocal systemd[1]: run-r2a8128d72d444911bded3c3cf0bc569c.service: Deactivated successfully. Oct 13 20:19:52 np0005486557.novalocal systemd[1]: run-rd422acaae57b4c0a8ee5c7e863af478e.service: Deactivated successfully. Oct 13 20:19:53 np0005486557.novalocal sudo[44531]: pam_unix(sudo:session): session closed for user root Oct 13 20:19:53 np0005486557.novalocal sudo[50125]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ovkzmuksrsbayxzfjfbxlvtfdernwkxa ; /usr/bin/python3' Oct 13 20:19:53 np0005486557.novalocal sudo[50125]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:19:53 np0005486557.novalocal python3[50127]: ansible-replace Invoked with dest=/usr/lib/systemd/system/sysstat-collect.timer regexp=10 replace=1 path=/usr/lib/systemd/system/sysstat-collect.timer backup=False encoding=utf-8 follow=False unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Oct 13 20:19:53 np0005486557.novalocal sudo[50125]: pam_unix(sudo:session): session closed for user root Oct 13 20:19:53 np0005486557.novalocal sudo[50134]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ydwjwzrvtegiqkkyifanmoooewbqthca ; /usr/bin/python3' Oct 13 20:19:53 np0005486557.novalocal sudo[50134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:19:53 np0005486557.novalocal python3[50136]: ansible-systemd Invoked with name=sysstat enabled=True daemon_reload=True state=started daemon_reexec=False no_block=False force=None masked=None user=None scope=None Oct 13 20:19:53 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:19:54 np0005486557.novalocal systemd-rc-local-generator[50158]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:19:54 np0005486557.novalocal systemd[1]: Started Run system activity accounting tool every 1 minutes. Oct 13 20:19:54 np0005486557.novalocal systemd[1]: Started Generate summary of yesterday's process accounting. Oct 13 20:19:54 np0005486557.novalocal systemd[1]: Starting Resets System Activity Logs... Oct 13 20:19:54 np0005486557.novalocal systemd[1]: Finished Resets System Activity Logs. Oct 13 20:19:54 np0005486557.novalocal sudo[50134]: pam_unix(sudo:session): session closed for user root Oct 13 20:19:54 np0005486557.novalocal sudo[50183]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xpdtedqiivthehlkdaqubdsyuykedcte ; /usr/bin/python3' Oct 13 20:19:54 np0005486557.novalocal sudo[50183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:19:54 np0005486557.novalocal python3[50185]: ansible-lineinfile Invoked with dest=/etc/hosts line=127.0.0.1 np0005486557 np0005486557.novalocal state=present path=/etc/hosts backrefs=False create=False backup=False firstmatch=False follow=False unsafe_writes=False regexp=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Oct 13 20:19:54 np0005486557.novalocal sudo[50183]: pam_unix(sudo:session): session closed for user root Oct 13 20:19:54 np0005486557.novalocal sudo[50192]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ipulmvzqdirniipiistcclipmrdvyzpk ; /usr/bin/python3' Oct 13 20:19:54 np0005486557.novalocal sudo[50192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:19:55 np0005486557.novalocal python3[50194]: ansible-dnf Invoked with name=['libxml2-devel', 'libxslt-devel', 'ruby-devel', 'rubygems', 'qemu-img'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 13 20:19:56 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:19:56 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:19:57 np0005486557.novalocal sudo[50192]: pam_unix(sudo:session): session closed for user root Oct 13 20:19:57 np0005486557.novalocal sudo[50554]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dipcblevtwavpbtwlqekjtviflcduzgp ; /usr/bin/python3' Oct 13 20:19:57 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:19:57 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:19:57 np0005486557.novalocal systemd[1]: run-rfa414830671e4749be1cc67ea5ca15ba.service: Deactivated successfully. Oct 13 20:19:57 np0005486557.novalocal sudo[50554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:19:57 np0005486557.novalocal python3[50558]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Oct 13 20:19:57 np0005486557.novalocal python3[50558]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Oct 13 20:19:57 np0005486557.novalocal sudo[50554]: pam_unix(sudo:session): session closed for user root Oct 13 20:19:57 np0005486557.novalocal sudo[50568]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-neggvcfukwtgpuutmvnrbsobxcolraou ; /usr/bin/python3' Oct 13 20:19:57 np0005486557.novalocal sudo[50568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:19:57 np0005486557.novalocal python3[50570]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Oct 13 20:19:57 np0005486557.novalocal python3[50570]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Oct 13 20:19:57 np0005486557.novalocal sudo[50568]: pam_unix(sudo:session): session closed for user root Oct 13 20:19:58 np0005486557.novalocal sudo[50579]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pmpxadvwhlgwgbynhxetvwnlvvxaedao ; /usr/bin/python3' Oct 13 20:19:58 np0005486557.novalocal sudo[50579]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:19:58 np0005486557.novalocal python3[50581]: ansible-git Invoked with repo=https://review.opendev.org/openstack/puppet-openstack-integration dest=/tmp/puppet-openstack version=stable/2025.1 force=True remote=origin clone=True update=True verify_commit=False gpg_whitelist=[] accept_hostkey=False bare=False recursive=True track_submodules=False refspec=None reference=None depth=None key_file=None ssh_opts=None executable=None umask=None archive=None separate_git_dir=None Oct 13 20:19:59 np0005486557.novalocal sudo[50579]: pam_unix(sudo:session): session closed for user root Oct 13 20:19:59 np0005486557.novalocal sudo[50612]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-potubtsononlhnzbnyfwpfmscvvzaxnf ; /usr/bin/python3' Oct 13 20:19:59 np0005486557.novalocal sudo[50612]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:19:59 np0005486557.novalocal python3[50614]: ansible-file Invoked with path=/tmp/puppet-openstack/.bundled_gems state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Oct 13 20:19:59 np0005486557.novalocal sudo[50612]: pam_unix(sudo:session): session closed for user root Oct 13 20:19:59 np0005486557.novalocal sudo[50621]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-opolltjnxfhadgnbdoavysimfdbojsaa ; /usr/bin/python3' Oct 13 20:19:59 np0005486557.novalocal sudo[50621]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:19:59 np0005486557.novalocal python3[50623]: ansible-command Invoked with _raw_params=grep ^mod /tmp/puppet-openstack/Puppetfile |egrep -v 'cloudkitty|monasca|apt|python|postgresql|ssh_keygen|git_resource' |awk '{print $2}'|sed "s/[,']//g"|while read p; do printf puppet-$p,; done|sed 's/,$//' _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 13 20:19:59 np0005486557.novalocal sudo[50621]: pam_unix(sudo:session): session closed for user root Oct 13 20:20:00 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:20:00 np0005486557.novalocal sudo[50638]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bwpdmuzpwurjuxelvjrcfynmwfvbwcmc ; /usr/bin/python3' Oct 13 20:20:00 np0005486557.novalocal sudo[50638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:20:00 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:20:00 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:20:00 np0005486557.novalocal python3[50641]: ansible-dnf Invoked with name=['puppet-aodh', 'puppet-barbican', 'puppet-ceilometer', 'puppet-ceph', 'puppet-cinder', 'puppet-designate', 'puppet-glance', 'puppet-gnocchi', 'puppet-heat', 'puppet-horizon', 'puppet-ironic', 'puppet-keystone', 'puppet-magnum', 'puppet-manila', 'puppet-mistral', 'puppet-neutron', 'puppet-nova', 'puppet-octavia', 'puppet-openstack_extras', 'puppet-openstacklib', 'puppet-oslo', 'puppet-ovn', 'puppet-placement', 'puppet-swift', 'puppet-tempest', 'puppet-trove', 'puppet-vswitch', 'puppet-vitrage', 'puppet-watcher', 'puppet-zaqar', 'puppet-kmod', 'puppet-apache', 'puppet-concat', 'puppet-firewall', 'puppet-inifile', 'puppet-mysql', 'puppet-rabbitmq', 'puppet-rsync', 'puppet-stdlib', 'puppet-vcsrepo', 'puppet-xinetd', 'puppet-memcached', 'puppet-dns', 'puppet-archive', 'puppet-redis', 'puppet-systemd'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 13 20:20:03 np0005486557.novalocal groupadd[50650]: group added to /etc/group: name=puppet, GID=52 Oct 13 20:20:03 np0005486557.novalocal groupadd[50650]: group added to /etc/gshadow: name=puppet Oct 13 20:20:03 np0005486557.novalocal groupadd[50650]: new group: name=puppet, GID=52 Oct 13 20:20:03 np0005486557.novalocal useradd[50657]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Oct 13 20:20:10 np0005486557.novalocal systemd[1056]: Created slice User Background Tasks Slice. Oct 13 20:20:10 np0005486557.novalocal systemd[1056]: Starting Cleanup of User's Temporary Files and Directories... Oct 13 20:20:10 np0005486557.novalocal systemd[1056]: Finished Cleanup of User's Temporary Files and Directories. Oct 13 20:20:10 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:20:10 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:20:10 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:20:10 np0005486557.novalocal systemd-rc-local-generator[50697]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:20:10 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:20:11 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:20:11 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:20:11 np0005486557.novalocal systemd[1]: run-re02033bb06154bfe88cc0af0c60d74e2.service: Deactivated successfully. Oct 13 20:20:12 np0005486557.novalocal sudo[50638]: pam_unix(sudo:session): session closed for user root Oct 13 20:20:12 np0005486557.novalocal sudo[51146]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-shjuhriwlyunoamxfimswtnqlxzqlftq ; /usr/bin/python3' Oct 13 20:20:12 np0005486557.novalocal sudo[51146]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:20:12 np0005486557.novalocal python3[51148]: ansible-file Invoked with path=/etc/puppet/environments state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Oct 13 20:20:12 np0005486557.novalocal sudo[51146]: pam_unix(sudo:session): session closed for user root Oct 13 20:20:12 np0005486557.novalocal sudo[51155]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fbcqdurqnkygqnwkwxblhfsradclejxo ; /usr/bin/python3' Oct 13 20:20:12 np0005486557.novalocal sudo[51155]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:20:12 np0005486557.novalocal python3[51157]: ansible-file Invoked with path=/usr/zuul-env/bin/zuul-cloner state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Oct 13 20:20:12 np0005486557.novalocal sudo[51155]: pam_unix(sudo:session): session closed for user root Oct 13 20:20:12 np0005486557.novalocal sudo[51164]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jvhpgfvcaehlrbtdbtnjfxwbfpfutvay ; MANAGE_REPOS=false SCENARIO=scenario005 GEM_HOME=/tmp/puppet-openstack/.bundled_gems TEMPEST_VERSION=\'\' WORKSPACE=/var/log/weirdo-project TEMPEST_FROM_SOURCE=false PUPPETFILE_DIR=/etc/puppet/modules PUPPET_PKG=puppet PUPPET_ARGS=--modulepath=/usr/share/openstack-puppet/modules:/etc/puppet/modules SWAP_SIZE_GB=8 /usr/bin/python3' Oct 13 20:20:12 np0005486557.novalocal sudo[51164]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:20:12 np0005486557.novalocal python3[51166]: ansible-command Invoked with chdir=/tmp/puppet-openstack _raw_params=./run_tests.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None creates=None removes=None stdin=None Oct 13 20:21:10 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:21:10 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:21:10 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:21:32 np0005486557.novalocal sshd-session[51202]: Connection closed by 66.240.236.116 port 45450 [preauth] Oct 13 20:21:37 np0005486557.novalocal kernel: Adding 8388604k swap on /swapfile. Priority:-2 extents:16 across:13790644k Oct 13 20:22:02 np0005486557.novalocal kernel: SELinux: Converting 464 SID table entries... Oct 13 20:22:02 np0005486557.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 13 20:22:02 np0005486557.novalocal kernel: SELinux: policy capability open_perms=1 Oct 13 20:22:02 np0005486557.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 13 20:22:02 np0005486557.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 13 20:22:02 np0005486557.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 13 20:22:02 np0005486557.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 13 20:22:02 np0005486557.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 13 20:22:04 np0005486557.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=3 res=1 Oct 13 20:22:04 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:22:04 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:22:04 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:22:04 np0005486557.novalocal systemd[1]: Starting PCP Reboot Initialization Helper Service... Oct 13 20:22:04 np0005486557.novalocal systemd[1]: Finished PCP Reboot Initialization Helper Service. Oct 13 20:22:04 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:22:04 np0005486557.novalocal systemd-rc-local-generator[51851]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:22:12 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:22:12 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:22:15 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:22:15 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:22:15 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:22:15 np0005486557.novalocal systemd-rc-local-generator[52097]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:22:15 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:22:21 np0005486557.novalocal dbus-broker-launch[778]: avc: op=setenforce lsm=selinux enforcing=0 res=1 Oct 13 20:22:21 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:22:21 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:22:21 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.490s CPU time. Oct 13 20:22:21 np0005486557.novalocal systemd[1]: run-r0d1d44fbd11b4397904e903e85ee619e.service: Deactivated successfully. Oct 13 20:22:27 np0005486557.novalocal sshd-session[56108]: Invalid user from 66.240.192.82 port 60749 Oct 13 20:22:27 np0005486557.novalocal sshd-session[56108]: Connection closed by invalid user 66.240.192.82 port 60749 [preauth] Oct 13 20:23:05 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:23:05 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:23:05 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:23:25 np0005486557.novalocal setsebool[57833]: The virt_use_nfs policy boolean was changed to 1 by root Oct 13 20:23:25 np0005486557.novalocal setsebool[57833]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Oct 13 20:23:36 np0005486557.novalocal kernel: SELinux: Converting 501 SID table entries... Oct 13 20:23:36 np0005486557.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 13 20:23:36 np0005486557.novalocal kernel: SELinux: policy capability open_perms=1 Oct 13 20:23:36 np0005486557.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 13 20:23:36 np0005486557.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 13 20:23:36 np0005486557.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 13 20:23:36 np0005486557.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 13 20:23:36 np0005486557.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 13 20:24:10 np0005486557.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=5 res=1 Oct 13 20:24:10 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:24:10 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:24:10 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:24:41 np0005486557.novalocal kernel: SELinux: Converting 2731 SID table entries... Oct 13 20:24:41 np0005486557.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 13 20:24:41 np0005486557.novalocal kernel: SELinux: policy capability open_perms=1 Oct 13 20:24:41 np0005486557.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 13 20:24:41 np0005486557.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 13 20:24:41 np0005486557.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 13 20:24:41 np0005486557.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 13 20:24:41 np0005486557.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 13 20:25:23 np0005486557.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=7 res=1 Oct 13 20:25:23 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:25:23 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:25:23 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:25:23 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:25:23 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:25:23 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:25:23 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:25:23 np0005486557.novalocal systemd[1]: run-rede50ce6e24d4c119e88e486c68a745a.service: Deactivated successfully. Oct 13 20:25:35 np0005486557.novalocal kernel: SELinux: Converting 2731 SID table entries... Oct 13 20:25:35 np0005486557.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 13 20:25:35 np0005486557.novalocal kernel: SELinux: policy capability open_perms=1 Oct 13 20:25:35 np0005486557.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 13 20:25:35 np0005486557.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 13 20:25:35 np0005486557.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 13 20:25:35 np0005486557.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 13 20:25:35 np0005486557.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 13 20:25:35 np0005486557.novalocal groupadd[58894]: group added to /etc/group: name=memcached, GID=989 Oct 13 20:25:35 np0005486557.novalocal groupadd[58894]: group added to /etc/gshadow: name=memcached Oct 13 20:25:35 np0005486557.novalocal groupadd[58894]: new group: name=memcached, GID=989 Oct 13 20:25:35 np0005486557.novalocal useradd[58901]: new user: name=memcached, UID=989, GID=989, home=/, shell=/sbin/nologin, from=none Oct 13 20:25:37 np0005486557.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=8 res=1 Oct 13 20:25:37 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:25:37 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:25:37 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:25:37 np0005486557.novalocal systemd-rc-local-generator[59333]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:25:37 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:25:37 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:25:37 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:25:37 np0005486557.novalocal systemd[1]: run-rac1abf41c86b409fa894e95cf144e19a.service: Deactivated successfully. Oct 13 20:25:38 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:25:38 np0005486557.novalocal systemd-rc-local-generator[59505]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:25:38 np0005486557.novalocal systemd[1]: Started memcached daemon. Oct 13 20:25:38 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:25:38 np0005486557.novalocal systemd-rc-local-generator[59550]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:25:38 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:25:38 np0005486557.novalocal systemd-rc-local-generator[59581]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:25:46 np0005486557.novalocal groupadd[59678]: group added to /etc/group: name=epmd, GID=988 Oct 13 20:25:46 np0005486557.novalocal groupadd[59678]: group added to /etc/gshadow: name=epmd Oct 13 20:25:46 np0005486557.novalocal groupadd[59678]: new group: name=epmd, GID=988 Oct 13 20:25:47 np0005486557.novalocal useradd[59685]: new user: name=epmd, UID=988, GID=988, home=/dev/null, shell=/sbin/nologin, from=none Oct 13 20:25:47 np0005486557.novalocal groupadd[59694]: group added to /etc/group: name=rabbitmq, GID=987 Oct 13 20:25:47 np0005486557.novalocal groupadd[59694]: group added to /etc/gshadow: name=rabbitmq Oct 13 20:25:47 np0005486557.novalocal groupadd[59694]: new group: name=rabbitmq, GID=987 Oct 13 20:25:47 np0005486557.novalocal useradd[59701]: new user: name=rabbitmq, UID=987, GID=987, home=/var/lib/rabbitmq, shell=/sbin/nologin, from=none Oct 13 20:25:49 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:25:49 np0005486557.novalocal systemd-rc-local-generator[59733]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:25:49 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:25:49 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:25:49 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:25:50 np0005486557.novalocal systemd-rc-local-generator[59769]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:25:50 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:25:51 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:25:51 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:25:51 np0005486557.novalocal systemd[1]: run-r33a7e46867324a4abc0606181a2e2ac3.service: Deactivated successfully. Oct 13 20:25:53 np0005486557.novalocal runuser[60954]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:25:54 np0005486557.novalocal runuser[60954]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:26:09 np0005486557.novalocal kernel: SELinux: Converting 2737 SID table entries... Oct 13 20:26:09 np0005486557.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 13 20:26:09 np0005486557.novalocal kernel: SELinux: policy capability open_perms=1 Oct 13 20:26:09 np0005486557.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 13 20:26:09 np0005486557.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 13 20:26:09 np0005486557.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 13 20:26:09 np0005486557.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 13 20:26:09 np0005486557.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 13 20:26:10 np0005486557.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=9 res=1 Oct 13 20:26:10 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:26:10 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:26:10 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:26:10 np0005486557.novalocal groupadd[61465]: group added to /etc/group: name=mysql, GID=27 Oct 13 20:26:10 np0005486557.novalocal groupadd[61465]: group added to /etc/gshadow: name=mysql Oct 13 20:26:10 np0005486557.novalocal groupadd[61465]: new group: name=mysql, GID=27 Oct 13 20:26:10 np0005486557.novalocal useradd[61473]: new user: name=mysql, UID=27, GID=27, home=/var/lib/mysql, shell=/sbin/nologin, from=none Oct 13 20:26:12 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:26:12 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:26:12 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:26:12 np0005486557.novalocal systemd-rc-local-generator[61950]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:26:12 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:26:15 np0005486557.novalocal groupadd[64424]: group added to /etc/group: name=redis, GID=986 Oct 13 20:26:15 np0005486557.novalocal groupadd[64424]: group added to /etc/gshadow: name=redis Oct 13 20:26:15 np0005486557.novalocal groupadd[64424]: new group: name=redis, GID=986 Oct 13 20:26:16 np0005486557.novalocal useradd[64478]: new user: name=redis, UID=986, GID=986, home=/var/lib/redis, shell=/sbin/nologin, from=none Oct 13 20:26:16 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:26:16 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:26:16 np0005486557.novalocal systemd-rc-local-generator[64895]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:26:16 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:26:17 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:26:17 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:26:17 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Consumed 5.925s CPU time. Oct 13 20:26:17 np0005486557.novalocal systemd[1]: run-rbcab27ac9dc941e68083d3f72f3083ee.service: Deactivated successfully. Oct 13 20:26:17 np0005486557.novalocal systemd[1]: run-rf77c05ea07c642ecbe33da32522636e2.service: Deactivated successfully. Oct 13 20:26:28 np0005486557.novalocal kernel: SELinux: Converting 2740 SID table entries... Oct 13 20:26:28 np0005486557.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 13 20:26:28 np0005486557.novalocal kernel: SELinux: policy capability open_perms=1 Oct 13 20:26:28 np0005486557.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 13 20:26:28 np0005486557.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 13 20:26:28 np0005486557.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 13 20:26:28 np0005486557.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 13 20:26:28 np0005486557.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 13 20:26:28 np0005486557.novalocal groupadd[65307]: group added to /etc/group: name=unbound, GID=985 Oct 13 20:26:28 np0005486557.novalocal groupadd[65307]: group added to /etc/gshadow: name=unbound Oct 13 20:26:28 np0005486557.novalocal groupadd[65307]: new group: name=unbound, GID=985 Oct 13 20:26:28 np0005486557.novalocal useradd[65314]: new user: name=unbound, UID=985, GID=985, home=/var/lib/unbound, shell=/sbin/nologin, from=none Oct 13 20:26:28 np0005486557.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=10 res=1 Oct 13 20:26:28 np0005486557.novalocal systemd[1]: Started daily update of the root trust anchor for DNSSEC. Oct 13 20:26:28 np0005486557.novalocal groupadd[65327]: group added to /etc/group: name=openvswitch, GID=984 Oct 13 20:26:28 np0005486557.novalocal groupadd[65327]: group added to /etc/gshadow: name=openvswitch Oct 13 20:26:28 np0005486557.novalocal groupadd[65327]: new group: name=openvswitch, GID=984 Oct 13 20:26:29 np0005486557.novalocal useradd[65334]: new user: name=openvswitch, UID=984, GID=984, home=/, shell=/sbin/nologin, from=none Oct 13 20:26:29 np0005486557.novalocal groupadd[65342]: group added to /etc/group: name=hugetlbfs, GID=983 Oct 13 20:26:29 np0005486557.novalocal groupadd[65342]: group added to /etc/gshadow: name=hugetlbfs Oct 13 20:26:29 np0005486557.novalocal groupadd[65342]: new group: name=hugetlbfs, GID=983 Oct 13 20:26:29 np0005486557.novalocal usermod[65350]: add 'openvswitch' to group 'hugetlbfs' Oct 13 20:26:29 np0005486557.novalocal usermod[65350]: add 'openvswitch' to shadow group 'hugetlbfs' Oct 13 20:26:30 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:26:30 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:26:30 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:26:30 np0005486557.novalocal systemd-rc-local-generator[65828]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:26:30 np0005486557.novalocal systemd-sysv-generator[65835]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:26:31 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:26:31 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:26:31 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:26:31 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.275s CPU time. Oct 13 20:26:31 np0005486557.novalocal systemd[1]: run-r9a8ee868b2a94ade88b27fe7d5237330.service: Deactivated successfully. Oct 13 20:26:32 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:26:32 np0005486557.novalocal systemd-sysv-generator[66408]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:26:32 np0005486557.novalocal systemd-rc-local-generator[66404]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:26:32 np0005486557.novalocal systemd[1]: Starting Open vSwitch Database Unit... Oct 13 20:26:32 np0005486557.novalocal chown[66416]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Oct 13 20:26:32 np0005486557.novalocal ovs-ctl[66421]: /etc/openvswitch/conf.db does not exist ... (warning). Oct 13 20:26:32 np0005486557.novalocal ovs-ctl[66421]: Creating empty database /etc/openvswitch/conf.db [ OK ] Oct 13 20:26:32 np0005486557.novalocal ovs-ctl[66421]: Starting ovsdb-server [ OK ] Oct 13 20:26:32 np0005486557.novalocal ovs-vsctl[66470]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.8.0 Oct 13 20:26:32 np0005486557.novalocal ovs-vsctl[66490]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.4.4-77.el9s "external-ids:system-id=\"09e0f088-ec97-4279-93f2-0ab54c341a30\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"centos\"" "system-version=\"9\"" Oct 13 20:26:32 np0005486557.novalocal ovs-ctl[66421]: Configuring Open vSwitch system IDs [ OK ] Oct 13 20:26:32 np0005486557.novalocal ovs-vsctl[66495]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005486557 Oct 13 20:26:32 np0005486557.novalocal ovs-ctl[66421]: Enabling remote OVSDB managers [ OK ] Oct 13 20:26:32 np0005486557.novalocal systemd[1]: Started Open vSwitch Database Unit. Oct 13 20:26:32 np0005486557.novalocal systemd[1]: Starting Open vSwitch Delete Transient Ports... Oct 13 20:26:32 np0005486557.novalocal systemd[1]: Finished Open vSwitch Delete Transient Ports. Oct 13 20:26:32 np0005486557.novalocal systemd[1]: Starting Open vSwitch Forwarding Unit... Oct 13 20:26:33 np0005486557.novalocal kernel: openvswitch: Open vSwitch switching datapath Oct 13 20:26:33 np0005486557.novalocal ovs-ctl[66540]: Inserting openvswitch module [ OK ] Oct 13 20:26:33 np0005486557.novalocal ovs-ctl[66509]: Starting ovs-vswitchd [ OK ] Oct 13 20:26:33 np0005486557.novalocal ovs-vsctl[66557]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005486557 Oct 13 20:26:33 np0005486557.novalocal ovs-ctl[66509]: Enabling remote OVSDB managers [ OK ] Oct 13 20:26:33 np0005486557.novalocal systemd[1]: Started Open vSwitch Forwarding Unit. Oct 13 20:26:33 np0005486557.novalocal systemd[1]: Starting Open vSwitch... Oct 13 20:26:33 np0005486557.novalocal systemd[1]: Finished Open vSwitch. Oct 13 20:26:33 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:26:33 np0005486557.novalocal systemd-rc-local-generator[66579]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:26:33 np0005486557.novalocal systemd-sysv-generator[66582]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:26:33 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:26:33 np0005486557.novalocal systemd-rc-local-generator[66610]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:26:33 np0005486557.novalocal systemd-sysv-generator[66614]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:26:33 np0005486557.novalocal ovs-vsctl[66624]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl add-br br-ex Oct 13 20:26:33 np0005486557.novalocal kernel: ovs-system: entered promiscuous mode Oct 13 20:26:33 np0005486557.novalocal NetworkManager[856]: [1760401593.9661] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Oct 13 20:26:33 np0005486557.novalocal NetworkManager[856]: [1760401593.9678] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/3) Oct 13 20:26:33 np0005486557.novalocal kernel: Timeout policy base is empty Oct 13 20:26:33 np0005486557.novalocal NetworkManager[856]: [1760401593.9956] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Oct 13 20:26:33 np0005486557.novalocal kernel: br-ex: entered promiscuous mode Oct 13 20:26:33 np0005486557.novalocal NetworkManager[856]: [1760401593.9967] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Oct 13 20:26:34 np0005486557.novalocal systemd-udevd[66639]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:26:34 np0005486557.novalocal systemd-udevd[66641]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:26:34 np0005486557.novalocal NetworkManager[856]: [1760401594.0251] device (br-ex): carrier: link connected Oct 13 20:26:34 np0005486557.novalocal NetworkManager[856]: [1760401594.0580] manager: (loop1): new Dummy device (/org/freedesktop/NetworkManager/Devices/5) Oct 13 20:26:34 np0005486557.novalocal systemd-udevd[66640]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:26:34 np0005486557.novalocal NetworkManager[856]: [1760401594.3154] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=66660 uid=0 result="success" Oct 13 20:26:34 np0005486557.novalocal ifdown[66661]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Oct 13 20:26:34 np0005486557.novalocal ifdown[66662]: 'network-scripts' will be removed from distribution in near future. Oct 13 20:26:34 np0005486557.novalocal ifdown[66663]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 13 20:26:34 np0005486557.novalocal NetworkManager[856]: [1760401594.3583] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=66669 uid=0 result="success" Oct 13 20:26:34 np0005486557.novalocal NetworkManager[856]: [1760401594.3958] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=66677 uid=0 result="success" Oct 13 20:26:34 np0005486557.novalocal NetworkManager[856]: [1760401594.4344] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=66686 uid=0 result="success" Oct 13 20:26:34 np0005486557.novalocal NetworkManager[856]: [1760401594.5323] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=66709 uid=0 result="success" Oct 13 20:26:34 np0005486557.novalocal ovs-vsctl[66714]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-br br-ex Oct 13 20:26:34 np0005486557.novalocal kernel: br-ex: left promiscuous mode Oct 13 20:26:34 np0005486557.novalocal kernel: ovs-system: left promiscuous mode Oct 13 20:26:34 np0005486557.novalocal NetworkManager[856]: [1760401594.6499] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=66732 uid=0 result="success" Oct 13 20:26:34 np0005486557.novalocal ifdown[66736]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Oct 13 20:26:34 np0005486557.novalocal ifdown[66737]: 'network-scripts' will be removed from distribution in near future. Oct 13 20:26:34 np0005486557.novalocal ifdown[66738]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 13 20:26:34 np0005486557.novalocal NetworkManager[856]: [1760401594.6969] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=66744 uid=0 result="success" Oct 13 20:26:34 np0005486557.novalocal NetworkManager[856]: [1760401594.7392] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=66755 uid=0 result="success" Oct 13 20:26:34 np0005486557.novalocal NetworkManager[856]: [1760401594.7764] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=66767 uid=0 result="success" Oct 13 20:26:34 np0005486557.novalocal NetworkManager[856]: [1760401594.8787] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=66793 uid=0 result="success" Oct 13 20:26:34 np0005486557.novalocal ovs-vsctl[66801]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.0131] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=66808 uid=0 result="success" Oct 13 20:26:35 np0005486557.novalocal ifup[66812]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 13 20:26:35 np0005486557.novalocal ifup[66813]: 'network-scripts' will be removed from distribution in near future. Oct 13 20:26:35 np0005486557.novalocal ifup[66814]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.0586] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=66820 uid=0 result="success" Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.1189] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=66832 uid=0 result="success" Oct 13 20:26:35 np0005486557.novalocal ifup[66833]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 13 20:26:35 np0005486557.novalocal ifup[66834]: 'network-scripts' will be removed from distribution in near future. Oct 13 20:26:35 np0005486557.novalocal ifup[66835]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.1657] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=66841 uid=0 result="success" Oct 13 20:26:35 np0005486557.novalocal ovs-vsctl[66843]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Oct 13 20:26:35 np0005486557.novalocal kernel: ovs-system: entered promiscuous mode Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.2011] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.2026] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Oct 13 20:26:35 np0005486557.novalocal kernel: No such timeout policy "ovs_test_tp" Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.2107] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Oct 13 20:26:35 np0005486557.novalocal kernel: br-ex: entered promiscuous mode Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.2116] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.2444] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=66864 uid=0 result="success" Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.2870] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=66875 uid=0 result="success" Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.3467] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=66893 uid=0 result="success" Oct 13 20:26:35 np0005486557.novalocal ovs-vsctl[66913]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 -- add-port br-ex loop1 Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.4063] device (loop1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 13 20:26:35 np0005486557.novalocal kernel: loop1: entered promiscuous mode Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.4072] device (loop1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.4386] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=66920 uid=0 result="success" Oct 13 20:26:35 np0005486557.novalocal ifup[66921]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 13 20:26:35 np0005486557.novalocal ifup[66922]: 'network-scripts' will be removed from distribution in near future. Oct 13 20:26:35 np0005486557.novalocal ifup[66923]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.4750] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=66929 uid=0 result="success" Oct 13 20:26:35 np0005486557.novalocal ovs-vsctl[66933]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.5574] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=66940 uid=0 result="success" Oct 13 20:26:35 np0005486557.novalocal ifup[66941]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 13 20:26:35 np0005486557.novalocal ifup[66942]: 'network-scripts' will be removed from distribution in near future. Oct 13 20:26:35 np0005486557.novalocal ifup[66943]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.5994] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=66949 uid=0 result="success" Oct 13 20:26:35 np0005486557.novalocal ovs-vsctl[66953]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Oct 13 20:26:35 np0005486557.novalocal NetworkManager[856]: [1760401595.6668] device (br-ex): carrier: link connected Oct 13 20:26:38 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:26:38 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:26:38 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:26:38 np0005486557.novalocal systemd-rc-local-generator[67021]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:26:38 np0005486557.novalocal systemd-sysv-generator[67025]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:26:38 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:26:39 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:26:39 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:26:39 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.041s CPU time. Oct 13 20:26:39 np0005486557.novalocal systemd[1]: run-r99f6f270a44a42b0b6deed729bab564b.service: Deactivated successfully. Oct 13 20:26:41 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:26:41 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:26:41 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:26:41 np0005486557.novalocal systemd-sysv-generator[67458]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:26:41 np0005486557.novalocal systemd-rc-local-generator[67454]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:26:41 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:26:41 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:26:41 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:26:41 np0005486557.novalocal systemd[1]: run-ra3b3580a48084c71a8794c624bfd5ccc.service: Deactivated successfully. Oct 13 20:26:43 np0005486557.novalocal ovs-vsctl[67532]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:[::1]:6642 Oct 13 20:26:43 np0005486557.novalocal ovs-vsctl[67534]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Oct 13 20:26:43 np0005486557.novalocal ovs-vsctl[67536]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=::1 Oct 13 20:26:43 np0005486557.novalocal ovs-vsctl[67540]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005486557.novalocal Oct 13 20:26:43 np0005486557.novalocal ovs-vsctl[67542]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Oct 13 20:26:43 np0005486557.novalocal ovs-vsctl[67544]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Oct 13 20:26:43 np0005486557.novalocal ovs-vsctl[67546]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=false Oct 13 20:26:43 np0005486557.novalocal ovs-vsctl[67548]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Oct 13 20:26:43 np0005486557.novalocal ovs-vsctl[67552]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-cms-options=enable-chassis-as-gw Oct 13 20:26:43 np0005486557.novalocal ovs-vsctl[67556]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=external:br-ex Oct 13 20:26:43 np0005486557.novalocal ovs-vsctl[67560]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Oct 13 20:26:53 np0005486557.novalocal groupadd[67581]: group added to /etc/group: name=keystone, GID=163 Oct 13 20:26:53 np0005486557.novalocal groupadd[67581]: group added to /etc/gshadow: name=keystone Oct 13 20:26:53 np0005486557.novalocal groupadd[67581]: new group: name=keystone, GID=163 Oct 13 20:26:53 np0005486557.novalocal useradd[67588]: new user: name=keystone, UID=163, GID=163, home=/var/lib/keystone, shell=/sbin/nologin, from=none Oct 13 20:26:53 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:26:53 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:26:54 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:26:54 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:26:54 np0005486557.novalocal systemd[1]: run-r77810a1c2aae4ed6b614ad469a86aa1f.service: Deactivated successfully. Oct 13 20:27:01 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:27:01 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:27:01 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:27:01 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:27:01 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:27:01 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:27:01 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:27:01 np0005486557.novalocal systemd[1]: run-r265242c15f614dbf82ad874ed1bea28e.service: Deactivated successfully. Oct 13 20:27:08 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:08 np0005486557.novalocal systemd-rc-local-generator[68279]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:08 np0005486557.novalocal systemd-sysv-generator[68282]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:08 np0005486557.novalocal systemd[1]: Listening on Device-mapper event daemon FIFOs. Oct 13 20:27:09 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:09 np0005486557.novalocal systemd-rc-local-generator[68309]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:09 np0005486557.novalocal systemd-sysv-generator[68314]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:09 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:09 np0005486557.novalocal systemd-rc-local-generator[68339]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:09 np0005486557.novalocal systemd-sysv-generator[68343]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:09 np0005486557.novalocal systemd-logind[793]: Watching system buttons on /dev/input/event0 (Power Button) Oct 13 20:27:10 np0005486557.novalocal systemd-logind[793]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Oct 13 20:27:12 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:12 np0005486557.novalocal systemd-rc-local-generator[68437]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:12 np0005486557.novalocal systemd-sysv-generator[68440]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:12 np0005486557.novalocal systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Oct 13 20:27:12 np0005486557.novalocal systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Oct 13 20:27:12 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:12 np0005486557.novalocal systemd-rc-local-generator[68467]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:12 np0005486557.novalocal systemd-sysv-generator[68472]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:12 np0005486557.novalocal systemd[1]: Listening on LVM2 poll daemon socket. Oct 13 20:27:14 np0005486557.novalocal groupadd[68484]: group added to /etc/group: name=cinder, GID=165 Oct 13 20:27:14 np0005486557.novalocal groupadd[68484]: group added to /etc/gshadow: name=cinder Oct 13 20:27:14 np0005486557.novalocal groupadd[68484]: new group: name=cinder, GID=165 Oct 13 20:27:15 np0005486557.novalocal useradd[68491]: new user: name=cinder, UID=165, GID=165, home=/var/lib/cinder, shell=/sbin/nologin, from=none Oct 13 20:27:15 np0005486557.novalocal useradd[68491]: add 'cinder' to group 'nobody' Oct 13 20:27:15 np0005486557.novalocal useradd[68491]: add 'cinder' to group 'cinder' Oct 13 20:27:15 np0005486557.novalocal useradd[68491]: add 'cinder' to shadow group 'nobody' Oct 13 20:27:15 np0005486557.novalocal useradd[68491]: add 'cinder' to shadow group 'cinder' Oct 13 20:27:16 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:27:16 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:27:16 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:16 np0005486557.novalocal systemd-rc-local-generator[68535]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:16 np0005486557.novalocal systemd-sysv-generator[68538]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:16 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:27:18 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:27:18 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:27:18 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Consumed 3.086s CPU time. Oct 13 20:27:19 np0005486557.novalocal systemd[1]: run-r8f04d98e75974ef49653dba9e8f0ee77.service: Deactivated successfully. Oct 13 20:27:19 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:19 np0005486557.novalocal systemd-rc-local-generator[70735]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:19 np0005486557.novalocal systemd-sysv-generator[70739]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:19 np0005486557.novalocal systemd[1]: One time configuration for iscsi.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/iscsi/initiatorname.iscsi). Oct 13 20:27:19 np0005486557.novalocal systemd[1]: Starting Open-iSCSI... Oct 13 20:27:19 np0005486557.novalocal kernel: Loading iSCSI transport class v2.0-870. Oct 13 20:27:19 np0005486557.novalocal systemd[1]: Started Open-iSCSI. Oct 13 20:27:19 np0005486557.novalocal systemd[1]: Starting Logout off all iSCSI sessions on shutdown... Oct 13 20:27:19 np0005486557.novalocal systemd[1]: Finished Logout off all iSCSI sessions on shutdown. Oct 13 20:27:19 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:19 np0005486557.novalocal systemd-rc-local-generator[70774]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:19 np0005486557.novalocal systemd-sysv-generator[70780]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:19 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:19 np0005486557.novalocal systemd-sysv-generator[70805]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:19 np0005486557.novalocal systemd-rc-local-generator[70801]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:20 np0005486557.novalocal systemd[1]: Starting dnf makecache... Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: Updating Subscription Management repositories. Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: Unable to read consumer identity Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: This system is not registered with an entitlement server. You can use subscription-manager to register. Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: Failed determining last makecache time. Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-openstack-barbican-3416cdce80f63f3e499 151 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-python-sushy-tools-946da041c16ec4d0a3c 181 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-openstack-cinder-677cc07bb5ec96f917e6a 287 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-python-openstackclient-bc1930c20ede201 254 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-openstack-ceilometer-f1d638faa195647f1 246 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-os-net-config-cffedba144566723de2b7bbf 308 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-openstack-nova-f42ab681bb43d178091da1f 227 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-openstack-designate-a891d81974a4c3aa56 219 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-openstack-glance-d70e40e4cc993dacb8833 236 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-openstack-keystone-0bfe3957e979d226bdf 230 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-openstack-manila-36b202934e53c3f8d7219 217 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-openstack-neutron-d9269bcf1bae33ecc9b1 262 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-openstack-octavia-46251e4d6ccad5a750cb 210 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-openstack-watcher-024815af711553739b46 200 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-edpm-image-builder-c093c533dacc587eed6 205 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-puppet-ceph-86cd31762d0b927abd628ca554 243 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-openstack-swift-2ea8b7ab1a203e53e6976c 248 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-python-tempestconf-8515371b7cceebd4282 254 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-openstack-trove-ui-89d0b782a402fb594a5 262 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: delorean-zuul-repo 127 kB/s | 3.0 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: CentOS-9 - RabbitMQ 38 76 kB/s | 8.4 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: CentOS Stream 9 - BaseOS 1.1 MB/s | 3.9 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: CentOS Stream 9 - AppStream 1.4 MB/s | 4.4 kB 00:00 Oct 13 20:27:20 np0005486557.novalocal dnf[70814]: CentOS Stream 9 - CRB 1.2 MB/s | 4.3 kB 00:00 Oct 13 20:27:21 np0005486557.novalocal dnf[70814]: CentOS Stream 9 - Extras packages 1.0 MB/s | 3.0 kB 00:00 Oct 13 20:27:21 np0005486557.novalocal dnf[70814]: dlrn-epoxy-testing 310 kB/s | 3.0 kB 00:00 Oct 13 20:27:21 np0005486557.novalocal dnf[70814]: dlrn-epoxy-build-deps 332 kB/s | 3.0 kB 00:00 Oct 13 20:27:21 np0005486557.novalocal dnf[70814]: centos9-rabbitmq 1.1 MB/s | 3.0 kB 00:00 Oct 13 20:27:21 np0005486557.novalocal dnf[70814]: centos9-storage 1.1 MB/s | 3.0 kB 00:00 Oct 13 20:27:21 np0005486557.novalocal dnf[70814]: centos9-opstools 1.0 MB/s | 3.0 kB 00:00 Oct 13 20:27:21 np0005486557.novalocal dnf[70814]: NFV SIG OpenvSwitch 1.1 MB/s | 3.0 kB 00:00 Oct 13 20:27:21 np0005486557.novalocal dnf[70814]: Extra Packages for Enterprise Linux 9 - x86_64 88 kB/s | 33 kB 00:00 Oct 13 20:27:21 np0005486557.novalocal dnf[70814]: Metadata cache created. Oct 13 20:27:22 np0005486557.novalocal systemd[1]: dnf-makecache.service: Deactivated successfully. Oct 13 20:27:22 np0005486557.novalocal systemd[1]: Finished dnf makecache. Oct 13 20:27:22 np0005486557.novalocal systemd[1]: dnf-makecache.service: Consumed 1.218s CPU time. Oct 13 20:27:24 np0005486557.novalocal groupadd[70858]: group added to /etc/group: name=glance, GID=161 Oct 13 20:27:24 np0005486557.novalocal groupadd[70858]: group added to /etc/gshadow: name=glance Oct 13 20:27:24 np0005486557.novalocal groupadd[70858]: new group: name=glance, GID=161 Oct 13 20:27:24 np0005486557.novalocal useradd[70865]: new user: name=glance, UID=161, GID=161, home=/var/lib/glance, shell=/sbin/nologin, from=none Oct 13 20:27:25 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:25 np0005486557.novalocal systemd-rc-local-generator[70901]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:25 np0005486557.novalocal systemd-sysv-generator[70906]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:25 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:27:32 np0005486557.novalocal groupadd[70936]: group added to /etc/group: name=radvd, GID=75 Oct 13 20:27:32 np0005486557.novalocal groupadd[70936]: group added to /etc/gshadow: name=radvd Oct 13 20:27:32 np0005486557.novalocal groupadd[70936]: new group: name=radvd, GID=75 Oct 13 20:27:32 np0005486557.novalocal useradd[70945]: new user: name=radvd, UID=75, GID=75, home=/, shell=/sbin/nologin, from=none Oct 13 20:27:32 np0005486557.novalocal groupadd[70960]: group added to /etc/group: name=haproxy, GID=982 Oct 13 20:27:32 np0005486557.novalocal groupadd[70960]: group added to /etc/gshadow: name=haproxy Oct 13 20:27:32 np0005486557.novalocal groupadd[70960]: new group: name=haproxy, GID=982 Oct 13 20:27:32 np0005486557.novalocal useradd[70967]: new user: name=haproxy, UID=983, GID=982, home=/var/lib/haproxy, shell=/usr/sbin/nologin, from=none Oct 13 20:27:32 np0005486557.novalocal groupadd[70979]: group added to /etc/group: name=dnsmasq, GID=981 Oct 13 20:27:32 np0005486557.novalocal groupadd[70979]: group added to /etc/gshadow: name=dnsmasq Oct 13 20:27:32 np0005486557.novalocal groupadd[70979]: new group: name=dnsmasq, GID=981 Oct 13 20:27:32 np0005486557.novalocal useradd[70986]: new user: name=dnsmasq, UID=982, GID=981, home=/var/lib/dnsmasq, shell=/usr/sbin/nologin, from=none Oct 13 20:27:33 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:27:33 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:27:35 np0005486557.novalocal groupadd[70998]: group added to /etc/group: name=neutron, GID=980 Oct 13 20:27:35 np0005486557.novalocal groupadd[70998]: group added to /etc/gshadow: name=neutron Oct 13 20:27:35 np0005486557.novalocal groupadd[70998]: new group: name=neutron, GID=980 Oct 13 20:27:35 np0005486557.novalocal useradd[71005]: new user: name=neutron, UID=981, GID=980, home=/var/lib/neutron, shell=/sbin/nologin, from=none Oct 13 20:27:36 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:27:36 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:27:36 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:37 np0005486557.novalocal systemd-rc-local-generator[71054]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:37 np0005486557.novalocal systemd-sysv-generator[71057]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:37 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:27:37 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:27:37 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:27:37 np0005486557.novalocal systemd[1]: run-r434f4e1c183844c78867f2d5c1732613.service: Deactivated successfully. Oct 13 20:27:39 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:40 np0005486557.novalocal systemd-rc-local-generator[71628]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:40 np0005486557.novalocal systemd-sysv-generator[71633]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:40 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:27:42 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:42 np0005486557.novalocal systemd-rc-local-generator[71668]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:42 np0005486557.novalocal systemd-sysv-generator[71674]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:42 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:27:47 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:47 np0005486557.novalocal systemd-rc-local-generator[71717]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:47 np0005486557.novalocal systemd-sysv-generator[71721]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:47 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:27:48 np0005486557.novalocal ovs-vsctl[71729]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set-manager ptcp:6640:127.0.0.1 Oct 13 20:27:50 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:27:50 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:27:50 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:51 np0005486557.novalocal systemd-rc-local-generator[71768]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:51 np0005486557.novalocal systemd-sysv-generator[71774]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:51 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:27:51 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:27:51 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:27:51 np0005486557.novalocal systemd[1]: run-r08bbaab4fa1a4386a940b03aaaeedba5.service: Deactivated successfully. Oct 13 20:27:53 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:53 np0005486557.novalocal systemd-rc-local-generator[72202]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:53 np0005486557.novalocal systemd-sysv-generator[72205]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:54 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:27:57 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:27:57 np0005486557.novalocal systemd-sysv-generator[72244]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:27:57 np0005486557.novalocal systemd-rc-local-generator[72239]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:27:57 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:28:04 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:28:04 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:28:04 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:28:04 np0005486557.novalocal groupadd[72269]: group added to /etc/group: name=placement, GID=979 Oct 13 20:28:04 np0005486557.novalocal groupadd[72269]: group added to /etc/gshadow: name=placement Oct 13 20:28:04 np0005486557.novalocal groupadd[72269]: new group: name=placement, GID=979 Oct 13 20:28:05 np0005486557.novalocal useradd[72276]: new user: name=placement, UID=980, GID=979, home=/, shell=/bin/bash, from=none Oct 13 20:28:11 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:28:11 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:28:11 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:28:11 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:28:11 np0005486557.novalocal systemd[1]: run-r70a59f1c53e94a8aa60b56b962a265cd.service: Deactivated successfully. Oct 13 20:28:13 np0005486557.novalocal groupadd[72447]: group added to /etc/group: name=nova, GID=162 Oct 13 20:28:13 np0005486557.novalocal groupadd[72447]: group added to /etc/gshadow: name=nova Oct 13 20:28:13 np0005486557.novalocal groupadd[72447]: new group: name=nova, GID=162 Oct 13 20:28:13 np0005486557.novalocal useradd[72454]: new user: name=nova, UID=162, GID=162, home=/var/lib/nova, shell=/sbin/nologin, from=none Oct 13 20:28:13 np0005486557.novalocal useradd[72454]: add 'nova' to group 'nobody' Oct 13 20:28:13 np0005486557.novalocal useradd[72454]: add 'nova' to group 'nova' Oct 13 20:28:13 np0005486557.novalocal useradd[72454]: add 'nova' to shadow group 'nobody' Oct 13 20:28:13 np0005486557.novalocal useradd[72454]: add 'nova' to shadow group 'nova' Oct 13 20:28:33 np0005486557.novalocal kernel: SELinux: Converting 2769 SID table entries... Oct 13 20:28:33 np0005486557.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 13 20:28:33 np0005486557.novalocal kernel: SELinux: policy capability open_perms=1 Oct 13 20:28:33 np0005486557.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 13 20:28:33 np0005486557.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 13 20:28:33 np0005486557.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 13 20:28:33 np0005486557.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 13 20:28:33 np0005486557.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 13 20:28:42 np0005486557.novalocal kernel: SELinux: Converting 2769 SID table entries... Oct 13 20:28:42 np0005486557.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 13 20:28:42 np0005486557.novalocal kernel: SELinux: policy capability open_perms=1 Oct 13 20:28:42 np0005486557.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 13 20:28:42 np0005486557.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 13 20:28:42 np0005486557.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 13 20:28:42 np0005486557.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 13 20:28:42 np0005486557.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 13 20:28:51 np0005486557.novalocal kernel: SELinux: Converting 2769 SID table entries... Oct 13 20:28:51 np0005486557.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 13 20:28:51 np0005486557.novalocal kernel: SELinux: policy capability open_perms=1 Oct 13 20:28:51 np0005486557.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 13 20:28:51 np0005486557.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 13 20:28:51 np0005486557.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 13 20:28:51 np0005486557.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 13 20:28:51 np0005486557.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 13 20:29:00 np0005486557.novalocal kernel: SELinux: Converting 2769 SID table entries... Oct 13 20:29:00 np0005486557.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 13 20:29:00 np0005486557.novalocal kernel: SELinux: policy capability open_perms=1 Oct 13 20:29:00 np0005486557.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 13 20:29:00 np0005486557.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 13 20:29:00 np0005486557.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 13 20:29:00 np0005486557.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 13 20:29:00 np0005486557.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 13 20:29:09 np0005486557.novalocal kernel: SELinux: Converting 2769 SID table entries... Oct 13 20:29:09 np0005486557.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 13 20:29:09 np0005486557.novalocal kernel: SELinux: policy capability open_perms=1 Oct 13 20:29:09 np0005486557.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 13 20:29:09 np0005486557.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 13 20:29:09 np0005486557.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 13 20:29:09 np0005486557.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 13 20:29:09 np0005486557.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 13 20:29:10 np0005486557.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=15 res=1 Oct 13 20:29:10 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:29:10 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:29:10 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:29:20 np0005486557.novalocal kernel: SELinux: Converting 2770 SID table entries... Oct 13 20:29:20 np0005486557.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 13 20:29:20 np0005486557.novalocal kernel: SELinux: policy capability open_perms=1 Oct 13 20:29:20 np0005486557.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 13 20:29:20 np0005486557.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 13 20:29:20 np0005486557.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 13 20:29:20 np0005486557.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 13 20:29:20 np0005486557.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 13 20:29:20 np0005486557.novalocal groupadd[72617]: group added to /etc/group: name=qemu, GID=107 Oct 13 20:29:20 np0005486557.novalocal groupadd[72617]: group added to /etc/gshadow: name=qemu Oct 13 20:29:20 np0005486557.novalocal groupadd[72617]: new group: name=qemu, GID=107 Oct 13 20:29:20 np0005486557.novalocal useradd[72624]: new user: name=qemu, UID=107, GID=107, home=/, shell=/sbin/nologin, from=none Oct 13 20:29:20 np0005486557.novalocal useradd[72624]: add 'qemu' to group 'kvm' Oct 13 20:29:20 np0005486557.novalocal useradd[72624]: add 'qemu' to shadow group 'kvm' Oct 13 20:29:21 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:29:21 np0005486557.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=16 res=1 Oct 13 20:29:21 np0005486557.novalocal dbus-broker-launch[772]: Noticed file-system modification, trigger reload. Oct 13 20:29:22 np0005486557.novalocal groupadd[72662]: group added to /etc/group: name=libvirt, GID=978 Oct 13 20:29:22 np0005486557.novalocal groupadd[72662]: group added to /etc/gshadow: name=libvirt Oct 13 20:29:22 np0005486557.novalocal groupadd[72662]: new group: name=libvirt, GID=978 Oct 13 20:29:22 np0005486557.novalocal polkitd[2929]: Reloading rules Oct 13 20:29:22 np0005486557.novalocal polkitd[2929]: Collecting garbage unconditionally... Oct 13 20:29:22 np0005486557.novalocal polkitd[2929]: Loading rules from directory /etc/polkit-1/rules.d Oct 13 20:29:22 np0005486557.novalocal polkitd[2929]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 13 20:29:22 np0005486557.novalocal polkitd[2929]: Finished loading, compiling and executing 6 rules Oct 13 20:29:22 np0005486557.novalocal polkitd[2929]: Reloading rules Oct 13 20:29:22 np0005486557.novalocal polkitd[2929]: Collecting garbage unconditionally... Oct 13 20:29:22 np0005486557.novalocal polkitd[2929]: Loading rules from directory /etc/polkit-1/rules.d Oct 13 20:29:22 np0005486557.novalocal polkitd[2929]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 13 20:29:22 np0005486557.novalocal polkitd[2929]: Finished loading, compiling and executing 6 rules Oct 13 20:29:26 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:29:26 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:29:26 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:29:26 np0005486557.novalocal systemd-rc-local-generator[73371]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:29:26 np0005486557.novalocal systemd-sysv-generator[73375]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:29:26 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:29:30 np0005486557.novalocal groupadd[76090]: group added to /etc/group: name=octavia, GID=977 Oct 13 20:29:30 np0005486557.novalocal groupadd[76090]: group added to /etc/gshadow: name=octavia Oct 13 20:29:30 np0005486557.novalocal groupadd[76090]: new group: name=octavia, GID=977 Oct 13 20:29:30 np0005486557.novalocal useradd[76145]: new user: name=octavia, UID=979, GID=977, home=/var/lib/octavia, shell=/sbin/nologin, from=none Oct 13 20:29:31 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:29:31 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:29:31 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.063s CPU time. Oct 13 20:29:31 np0005486557.novalocal systemd[1]: run-r826147c2cd65480fb69eb4109574ba5c.service: Deactivated successfully. Oct 13 20:29:36 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:29:36 np0005486557.novalocal systemd-rc-local-generator[76833]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:29:36 np0005486557.novalocal systemd-sysv-generator[76836]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:29:36 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:29:41 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:29:41 np0005486557.novalocal systemd-sysv-generator[76886]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:29:41 np0005486557.novalocal systemd-rc-local-generator[76881]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:29:41 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:29:43 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:29:43 np0005486557.novalocal systemd-rc-local-generator[76921]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:29:43 np0005486557.novalocal systemd-sysv-generator[76926]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:29:43 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:29:46 np0005486557.novalocal systemd[1]: Starting Cleanup of Temporary Directories... Oct 13 20:29:46 np0005486557.novalocal systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Oct 13 20:29:46 np0005486557.novalocal systemd[1]: Finished Cleanup of Temporary Directories. Oct 13 20:29:46 np0005486557.novalocal systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Oct 13 20:29:46 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:29:46 np0005486557.novalocal systemd-rc-local-generator[76967]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:29:46 np0005486557.novalocal systemd-sysv-generator[76972]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:29:46 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:29:48 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:29:49 np0005486557.novalocal systemd-rc-local-generator[77007]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:29:49 np0005486557.novalocal systemd-sysv-generator[77011]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:29:49 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:30:00 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:30:00 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:30:00 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:30:00 np0005486557.novalocal groupadd[77038]: group added to /etc/group: name=apache, GID=48 Oct 13 20:30:00 np0005486557.novalocal groupadd[77038]: group added to /etc/gshadow: name=apache Oct 13 20:30:00 np0005486557.novalocal groupadd[77038]: new group: name=apache, GID=48 Oct 13 20:30:00 np0005486557.novalocal useradd[77047]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Oct 13 20:30:04 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:04 np0005486557.novalocal systemd-rc-local-generator[77077]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:04 np0005486557.novalocal systemd-sysv-generator[77081]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:05 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:30:05 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:30:05 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:05 np0005486557.novalocal systemd-sysv-generator[77178]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:05 np0005486557.novalocal systemd-rc-local-generator[77171]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:06 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:30:07 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:30:07 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:30:07 np0005486557.novalocal systemd[1]: run-r1fee79179abb47a183faf4bb7af7997e.service: Deactivated successfully. Oct 13 20:30:13 np0005486557.novalocal groupadd[77655]: group added to /etc/group: name=manila, GID=976 Oct 13 20:30:13 np0005486557.novalocal groupadd[77655]: group added to /etc/gshadow: name=manila Oct 13 20:30:13 np0005486557.novalocal groupadd[77655]: new group: name=manila, GID=976 Oct 13 20:30:13 np0005486557.novalocal useradd[77662]: new user: name=manila, UID=978, GID=976, home=/var/lib/manila, shell=/sbin/nologin, from=none Oct 13 20:30:13 np0005486557.novalocal useradd[77662]: add 'manila' to group 'nobody' Oct 13 20:30:13 np0005486557.novalocal useradd[77662]: add 'manila' to group 'manila' Oct 13 20:30:13 np0005486557.novalocal useradd[77662]: add 'manila' to shadow group 'nobody' Oct 13 20:30:13 np0005486557.novalocal useradd[77662]: add 'manila' to shadow group 'manila' Oct 13 20:30:15 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:30:15 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:30:15 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:15 np0005486557.novalocal systemd-sysv-generator[77708]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:15 np0005486557.novalocal systemd-rc-local-generator[77705]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:15 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:30:16 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:30:16 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:30:16 np0005486557.novalocal systemd[1]: run-r80c79e31a92a415893424f735f9cd171.service: Deactivated successfully. Oct 13 20:30:19 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:30:19 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:30:19 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:19 np0005486557.novalocal systemd-sysv-generator[77915]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:19 np0005486557.novalocal systemd-rc-local-generator[77911]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:19 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:30:20 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:30:20 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:30:20 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.018s CPU time. Oct 13 20:30:20 np0005486557.novalocal systemd[1]: run-r7a45c5d11ee4456d911647590447ae3f.service: Deactivated successfully. Oct 13 20:30:21 np0005486557.novalocal kernel: loop: module loaded Oct 13 20:30:21 np0005486557.novalocal kernel: loop3: detected capacity change from 0 to 31457280 Oct 13 20:30:21 np0005486557.novalocal lvm[78356]: PV /dev/loop3 not used. Oct 13 20:30:21 np0005486557.novalocal lvm[78359]: PV /dev/loop3 online, VG lvm-shares is complete. Oct 13 20:30:21 np0005486557.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event lvm-shares. Oct 13 20:30:21 np0005486557.novalocal lvm[78361]: 0 logical volume(s) in volume group "lvm-shares" now active Oct 13 20:30:21 np0005486557.novalocal systemd[1]: lvm-activate-lvm-shares.service: Deactivated successfully. Oct 13 20:30:38 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:30:38 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:30:38 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:30:38 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:30:38 np0005486557.novalocal systemd[1]: run-re6602334c53643fa8e8f90a4c9e6e80f.service: Deactivated successfully. Oct 13 20:30:47 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:47 np0005486557.novalocal systemd-rc-local-generator[78659]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:47 np0005486557.novalocal systemd-sysv-generator[78664]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:47 np0005486557.novalocal systemd[1]: Starting MariaDB 10.5 database server... Oct 13 20:30:48 np0005486557.novalocal mariadb-prepare-db-dir[78693]: Database MariaDB is probably initialized in /var/lib/mysql already, nothing is done. Oct 13 20:30:48 np0005486557.novalocal mariadb-prepare-db-dir[78693]: If this is not the case, make sure the /var/lib/mysql is empty before running mariadb-prepare-db-dir. Oct 13 20:30:48 np0005486557.novalocal systemd[1]: Started MariaDB 10.5 database server. Oct 13 20:30:48 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:48 np0005486557.novalocal systemd-rc-local-generator[78803]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:48 np0005486557.novalocal systemd-sysv-generator[78806]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:48 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:48 np0005486557.novalocal systemd-rc-local-generator[78835]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:48 np0005486557.novalocal systemd-sysv-generator[78839]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:49 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:49 np0005486557.novalocal systemd-rc-local-generator[78867]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:49 np0005486557.novalocal systemd-sysv-generator[78873]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:49 np0005486557.novalocal systemd[1]: Starting Redis persistent key-value database... Oct 13 20:30:49 np0005486557.novalocal systemd[1]: Started Redis persistent key-value database. Oct 13 20:30:49 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:49 np0005486557.novalocal systemd-rc-local-generator[78907]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:49 np0005486557.novalocal systemd-sysv-generator[78911]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:49 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:50 np0005486557.novalocal systemd-rc-local-generator[78932]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:50 np0005486557.novalocal systemd-sysv-generator[78939]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:50 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:50 np0005486557.novalocal systemd-rc-local-generator[78966]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:50 np0005486557.novalocal systemd-sysv-generator[78970]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:50 np0005486557.novalocal systemd[1]: Starting Redis Sentinel... Oct 13 20:30:50 np0005486557.novalocal systemd[1]: Started Redis Sentinel. Oct 13 20:30:50 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:50 np0005486557.novalocal systemd-rc-local-generator[79001]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:50 np0005486557.novalocal systemd-sysv-generator[79006]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:51 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:51 np0005486557.novalocal systemd-rc-local-generator[79030]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:51 np0005486557.novalocal systemd-sysv-generator[79035]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:51 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:51 np0005486557.novalocal systemd-rc-local-generator[79112]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:51 np0005486557.novalocal systemd-sysv-generator[79116]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:51 np0005486557.novalocal systemd[1]: Starting OVN northd management daemon... Oct 13 20:30:51 np0005486557.novalocal chown[79121]: /usr/bin/chown: cannot access '/var/lib/ovn': No such file or directory Oct 13 20:30:52 np0005486557.novalocal ovn-ctl[79122]: /var/lib/ovn/ovnnb_db.db does not exist ... (warning). Oct 13 20:30:52 np0005486557.novalocal ovn-ctl[79122]: Creating empty database /var/lib/ovn/ovnnb_db.db [ OK ] Oct 13 20:30:52 np0005486557.novalocal ovsdb-server[79224]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Oct 13 20:30:52 np0005486557.novalocal ovsdb-server[79226]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.4.4-77.el9s Oct 13 20:30:52 np0005486557.novalocal ovsdb-server[79225]: ovs|00002|vlog(monitor)|INFO|closing log file Oct 13 20:30:52 np0005486557.novalocal ovsdb-server[79225]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Oct 13 20:30:52 np0005486557.novalocal ovn-ctl[79122]: Starting ovsdb-nb [ OK ] Oct 13 20:30:52 np0005486557.novalocal ovn-nbctl[79230]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl --no-leader-only --db=unix:/run/ovn/ovnnb_db.sock init Oct 13 20:30:52 np0005486557.novalocal ovn-ctl[79122]: /var/lib/ovn/ovnsb_db.db does not exist ... (warning). Oct 13 20:30:52 np0005486557.novalocal ovn-ctl[79122]: Creating empty database /var/lib/ovn/ovnsb_db.db [ OK ] Oct 13 20:30:52 np0005486557.novalocal ovsdb-server[79250]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Oct 13 20:30:52 np0005486557.novalocal ovsdb-server[79252]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.4.4-77.el9s Oct 13 20:30:52 np0005486557.novalocal ovsdb-server[79251]: ovs|00002|vlog(monitor)|INFO|closing log file Oct 13 20:30:52 np0005486557.novalocal ovsdb-server[79251]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Oct 13 20:30:52 np0005486557.novalocal ovn-ctl[79122]: Starting ovsdb-sb [ OK ] Oct 13 20:30:52 np0005486557.novalocal ovn-sbctl[79256]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl --no-leader-only --db=unix:/run/ovn/ovnsb_db.sock init Oct 13 20:30:52 np0005486557.novalocal ovn-ctl[79122]: Starting ovn-northd [ OK ] Oct 13 20:30:52 np0005486557.novalocal systemd[1]: Finished OVN northd management daemon. Oct 13 20:30:52 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:52 np0005486557.novalocal systemd-rc-local-generator[79295]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:52 np0005486557.novalocal systemd-sysv-generator[79299]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:53 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:53 np0005486557.novalocal systemd-rc-local-generator[79321]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:53 np0005486557.novalocal systemd-sysv-generator[79324]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:53 np0005486557.novalocal ovn-nbctl[79334]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set-connection pssl:6641:[::1] Oct 13 20:30:53 np0005486557.novalocal ovn-sbctl[79338]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set-connection pssl:6642:[::1] Oct 13 20:30:53 np0005486557.novalocal sudo[79340]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get connection . inactivity_probe Oct 13 20:30:53 np0005486557.novalocal sudo[79340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:30:53 np0005486557.novalocal sudo[79340]: pam_unix(sudo:session): session closed for user root Oct 13 20:30:53 np0005486557.novalocal ovn-nbctl[79343]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set connection . inactivity_probe=0 Oct 13 20:30:53 np0005486557.novalocal sudo[79345]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get connection . inactivity_probe Oct 13 20:30:53 np0005486557.novalocal sudo[79345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:30:53 np0005486557.novalocal sudo[79345]: pam_unix(sudo:session): session closed for user root Oct 13 20:30:53 np0005486557.novalocal ovn-sbctl[79348]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set connection . inactivity_probe=0 Oct 13 20:30:54 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:30:54 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:30:54 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:30:54 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:54 np0005486557.novalocal systemd-rc-local-generator[79393]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:54 np0005486557.novalocal systemd-sysv-generator[79399]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:54 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:30:54 np0005486557.novalocal systemd[1]: Starting OVN controller daemon... Oct 13 20:30:54 np0005486557.novalocal ovn-ctl[79406]: Starting ovn-controller [ OK ] Oct 13 20:30:54 np0005486557.novalocal systemd[1]: Started OVN controller daemon. Oct 13 20:30:54 np0005486557.novalocal kernel: br-int: entered promiscuous mode Oct 13 20:30:54 np0005486557.novalocal NetworkManager[856]: [1760401854.6974] manager: (br-int): 'openvswitch' plugin not available; creating generic device Oct 13 20:30:54 np0005486557.novalocal NetworkManager[856]: [1760401854.6989] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Oct 13 20:30:54 np0005486557.novalocal systemd-udevd[79462]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:30:54 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:54 np0005486557.novalocal systemd-sysv-generator[79488]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:54 np0005486557.novalocal systemd-rc-local-generator[79483]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:54 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:30:55 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:30:55 np0005486557.novalocal systemd-rc-local-generator[79513]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:30:55 np0005486557.novalocal systemd-sysv-generator[79519]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:30:55 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:30:58 np0005486557.novalocal kernel: SELinux: Converting 2795 SID table entries... Oct 13 20:30:58 np0005486557.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 13 20:30:58 np0005486557.novalocal kernel: SELinux: policy capability open_perms=1 Oct 13 20:30:58 np0005486557.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 13 20:30:58 np0005486557.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 13 20:30:58 np0005486557.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 13 20:30:58 np0005486557.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 13 20:30:58 np0005486557.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 13 20:30:58 np0005486557.novalocal setsebool[79525]: The os_neutron_dac_override policy boolean was changed to on by root Oct 13 20:31:01 np0005486557.novalocal kernel: loop2: detected capacity change from 0 to 31457280 Oct 13 20:31:01 np0005486557.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=18 res=1 Oct 13 20:31:01 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:31:01 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:31:01 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:31:01 np0005486557.novalocal lvm[79546]: PV /dev/loop2 not used. Oct 13 20:31:01 np0005486557.novalocal lvm[79549]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:31:01 np0005486557.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Oct 13 20:31:01 np0005486557.novalocal lvm[79551]: 0 logical volume(s) in volume group "cinder-volumes" now active Oct 13 20:31:01 np0005486557.novalocal systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Oct 13 20:31:02 np0005486557.novalocal ovsdb-server[79226]: ovs|00003|memory|INFO|10404 kB peak resident set size after 10.0 seconds Oct 13 20:31:02 np0005486557.novalocal ovsdb-server[79226]: ovs|00004|memory|INFO|atoms:44 cells:43 json-caches:1 monitors:2 n-weak-refs:0 sessions:1 Oct 13 20:31:02 np0005486557.novalocal ovsdb-server[79252]: ovs|00003|memory|INFO|11120 kB peak resident set size after 10.1 seconds Oct 13 20:31:02 np0005486557.novalocal ovsdb-server[79252]: ovs|00004|memory|INFO|atoms:451 cells:355 json-caches:1 monitors:3 n-weak-refs:11 sessions:2 Oct 13 20:31:16 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:31:16 np0005486557.novalocal systemd-sysv-generator[79590]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:31:16 np0005486557.novalocal systemd-rc-local-generator[79586]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:31:16 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:31:16 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:31:19 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:31:19 np0005486557.novalocal systemd-rc-local-generator[79629]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:31:19 np0005486557.novalocal systemd-sysv-generator[79634]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:31:19 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:31:19 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:31:23 np0005486557.novalocal groupadd[79699]: group added to /etc/group: name=clevis, GID=975 Oct 13 20:31:23 np0005486557.novalocal groupadd[79699]: group added to /etc/gshadow: name=clevis Oct 13 20:31:23 np0005486557.novalocal groupadd[79699]: new group: name=clevis, GID=975 Oct 13 20:31:23 np0005486557.novalocal useradd[79706]: new user: name=clevis, UID=977, GID=975, home=/var/cache/clevis, shell=/usr/sbin/nologin, from=none Oct 13 20:31:23 np0005486557.novalocal usermod[79716]: add 'clevis' to group 'tss' Oct 13 20:31:23 np0005486557.novalocal usermod[79716]: add 'clevis' to shadow group 'tss' Oct 13 20:31:24 np0005486557.novalocal usermod[79729]: add 'nova' to group 'qemu' Oct 13 20:31:24 np0005486557.novalocal usermod[79729]: add 'nova' to shadow group 'qemu' Oct 13 20:31:24 np0005486557.novalocal usermod[79736]: add 'nova' to group 'libvirt' Oct 13 20:31:24 np0005486557.novalocal usermod[79736]: add 'nova' to shadow group 'libvirt' Oct 13 20:31:25 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:31:25 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:31:25 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:31:25 np0005486557.novalocal systemd-rc-local-generator[79816]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:31:26 np0005486557.novalocal systemd-sysv-generator[79819]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:31:26 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:31:26 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:31:29 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:31:29 np0005486557.novalocal systemd-rc-local-generator[81876]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:31:29 np0005486557.novalocal systemd-sysv-generator[81881]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:31:29 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:31:29 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:31:32 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:31:32 np0005486557.novalocal systemd-sysv-generator[83723]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:31:32 np0005486557.novalocal systemd-rc-local-generator[83719]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:31:32 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:31:32 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:31:32 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:31:32 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:31:32 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Consumed 7.329s CPU time. Oct 13 20:31:32 np0005486557.novalocal systemd[1]: run-r2346d5d3a2bd482ba135effb89b6429b.service: Deactivated successfully. Oct 13 20:31:35 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:31:35 np0005486557.novalocal systemd-sysv-generator[83754]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:31:35 np0005486557.novalocal systemd-rc-local-generator[83749]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:31:35 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:31:59 np0005486557.novalocal crontab[83819]: (root) LIST (root) Oct 13 20:31:59 np0005486557.novalocal crontab[83820]: (root) LIST (keystone) Oct 13 20:32:00 np0005486557.novalocal crontab[83821]: (root) LIST (cinder) Oct 13 20:32:00 np0005486557.novalocal crontab[83822]: (root) LIST (glance) Oct 13 20:32:00 np0005486557.novalocal crontab[83823]: (root) LIST (nova) Oct 13 20:32:00 np0005486557.novalocal crontab[83824]: (root) LIST (manila) Oct 13 20:32:00 np0005486557.novalocal crontab[83825]: (root) REPLACE (cinder) Oct 13 20:32:00 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:32:00 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:32:00 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:32:00 np0005486557.novalocal crontab[83827]: (root) REPLACE (glance) Oct 13 20:32:00 np0005486557.novalocal crontab[83828]: (root) REPLACE (glance) Oct 13 20:32:07 np0005486557.novalocal crontab[83843]: (root) REPLACE (glance) Oct 13 20:32:07 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:32:07 np0005486557.novalocal systemd-rc-local-generator[83865]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:32:07 np0005486557.novalocal systemd-sysv-generator[83869]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:32:07 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:32:46 np0005486557.novalocal crontab[83934]: (root) REPLACE (nova) Oct 13 20:32:54 np0005486557.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 13 20:32:54 np0005486557.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 13 20:32:54 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:32:55 np0005486557.novalocal systemd-rc-local-generator[83982]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:32:55 np0005486557.novalocal systemd-sysv-generator[83985]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:32:55 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:32:55 np0005486557.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 13 20:32:55 np0005486557.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 13 20:32:55 np0005486557.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 13 20:32:55 np0005486557.novalocal systemd[1]: run-r2499f038bbe44f7e84971c4ef470429e.service: Deactivated successfully. Oct 13 20:33:01 np0005486557.novalocal crond[1005]: (glance) RELOAD (/var/spool/cron/glance) Oct 13 20:33:08 np0005486557.novalocal crontab[84083]: (root) REPLACE (manila) Oct 13 20:33:08 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:33:08 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:08 np0005486557.novalocal systemd-sysv-generator[84110]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:08 np0005486557.novalocal systemd-rc-local-generator[84107]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:08 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:08 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:33:08 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:33:08 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:09 np0005486557.novalocal systemd-sysv-generator[84144]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:09 np0005486557.novalocal systemd-rc-local-generator[84140]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:09 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:09 np0005486557.novalocal systemd[84147]: epmd.socket: Failed to create listening socket ([::]:4369): Address already in use Oct 13 20:33:09 np0005486557.novalocal systemd[1]: epmd.socket: Failed to receive listening socket ([::]:4369): Input/output error Oct 13 20:33:09 np0005486557.novalocal systemd[1]: epmd.socket: Failed to listen on sockets: Input/output error Oct 13 20:33:09 np0005486557.novalocal systemd[1]: epmd.socket: Failed with result 'resources'. Oct 13 20:33:09 np0005486557.novalocal systemd[1]: Failed to listen on Erlang Port Mapper Daemon Activation Socket. Oct 13 20:33:09 np0005486557.novalocal systemd[1]: Starting RabbitMQ broker... Oct 13 20:33:09 np0005486557.novalocal rabbitmq-server[84148]: 2025-10-13 20:33:09.931790-04:00 [warning] <0.129.0> Both old (.config) and new (.conf) format config files exist. Oct 13 20:33:09 np0005486557.novalocal rabbitmq-server[84148]: 2025-10-13 20:33:09.945143-04:00 [warning] <0.129.0> Using the old format config file: /etc/rabbitmq/rabbitmq.config Oct 13 20:33:09 np0005486557.novalocal rabbitmq-server[84148]: 2025-10-13 20:33:09.945199-04:00 [warning] <0.129.0> Please update your config files to the new format and remove the old file. Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: 2025-10-13 20:33:11.485580-04:00 [info] <0.229.0> Feature flags: list of feature flags found: Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: 2025-10-13 20:33:11.485649-04:00 [info] <0.229.0> Feature flags: [ ] implicit_default_bindings Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: 2025-10-13 20:33:11.485671-04:00 [info] <0.229.0> Feature flags: [ ] maintenance_mode_status Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: 2025-10-13 20:33:11.485701-04:00 [info] <0.229.0> Feature flags: [ ] quorum_queue Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: 2025-10-13 20:33:11.485756-04:00 [info] <0.229.0> Feature flags: [ ] stream_queue Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: 2025-10-13 20:33:11.485774-04:00 [info] <0.229.0> Feature flags: [ ] user_limits Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: 2025-10-13 20:33:11.485792-04:00 [info] <0.229.0> Feature flags: [ ] virtual_host_metadata Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: 2025-10-13 20:33:11.485836-04:00 [info] <0.229.0> Feature flags: feature flag states written to disk: yes Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: 2025-10-13 20:33:11.719908-04:00 [notice] <0.44.0> Application syslog exited with reason: stopped Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: 2025-10-13 20:33:11.720041-04:00 [notice] <0.229.0> Logging: switching to configured handler(s); following messages may not be visible in this log output Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: ## ## RabbitMQ 3.9.21 Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: ## ## Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: ########## Copyright (c) 2007-2022 VMware, Inc. or its affiliates. Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: ###### ## Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: ########## Licensed under the MPL 2.0. Website: https://rabbitmq.com Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: Erlang: 24.3.4.2 [jit] Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: TLS Library: OpenSSL - OpenSSL 3.5.1 1 Jul 2025 Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: Doc guides: https://rabbitmq.com/documentation.html Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: Support: https://rabbitmq.com/contact.html Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: Tutorials: https://rabbitmq.com/getstarted.html Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: Monitoring: https://rabbitmq.com/monitoring.html Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: Logs: /var/log/rabbitmq/rabbit@localhost6.log Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: /var/log/rabbitmq/rabbit@localhost6_upgrade.log Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: Oct 13 20:33:11 np0005486557.novalocal rabbitmq-server[84148]: Config file(s): /etc/rabbitmq/rabbitmq.config Oct 13 20:33:14 np0005486557.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 13 20:33:14 np0005486557.novalocal rabbitmq-server[84148]: Starting broker... completed with 3 plugins. Oct 13 20:33:14 np0005486557.novalocal systemd[1]: Started RabbitMQ broker. Oct 13 20:33:15 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:15 np0005486557.novalocal systemd-sysv-generator[84254]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:15 np0005486557.novalocal systemd-rc-local-generator[84251]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:15 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:15 np0005486557.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 13 20:33:15 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:15 np0005486557.novalocal systemd-sysv-generator[84283]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:15 np0005486557.novalocal systemd-rc-local-generator[84280]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:15 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:15 np0005486557.novalocal runuser[84293]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:15 np0005486557.novalocal setroubleshoot[84231]: failed to retrieve rpm info for path '/proc/net/if_inet6': Oct 13 20:33:15 np0005486557.novalocal systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Oct 13 20:33:15 np0005486557.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Oct 13 20:33:16 np0005486557.novalocal runuser[84293]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:16 np0005486557.novalocal runuser[84358]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:17 np0005486557.novalocal setroubleshoot[84231]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. For complete SELinux messages run: sealert -l 7004d097-0432-48d7-8b4e-c04f95869a89 Oct 13 20:33:17 np0005486557.novalocal setroubleshoot[84231]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that inet_gethost should be allowed read access on the if_inet6 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'inet_gethost' --raw | audit2allow -M my-inetgethost # semodule -X 300 -i my-inetgethost.pp Oct 13 20:33:17 np0005486557.novalocal runuser[84358]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:17 np0005486557.novalocal runuser[84411]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:17 np0005486557.novalocal runuser[84411]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:18 np0005486557.novalocal runuser[84465]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:18 np0005486557.novalocal runuser[84465]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:18 np0005486557.novalocal runuser[84519]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:19 np0005486557.novalocal runuser[84519]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:19 np0005486557.novalocal runuser[84571]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:20 np0005486557.novalocal runuser[84571]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:20 np0005486557.novalocal runuser[84623]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:20 np0005486557.novalocal runuser[84623]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:20 np0005486557.novalocal runuser[84675]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:21 np0005486557.novalocal runuser[84675]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:21 np0005486557.novalocal runuser[84727]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:22 np0005486557.novalocal runuser[84727]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:22 np0005486557.novalocal runuser[84781]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:23 np0005486557.novalocal runuser[84781]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:23 np0005486557.novalocal runuser[84833]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:23 np0005486557.novalocal runuser[84833]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:23 np0005486557.novalocal runuser[84885]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:24 np0005486557.novalocal runuser[84885]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:24 np0005486557.novalocal runuser[84939]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:25 np0005486557.novalocal runuser[84939]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:25 np0005486557.novalocal runuser[84991]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:25 np0005486557.novalocal runuser[84991]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:25 np0005486557.novalocal runuser[85043]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:26 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Oct 13 20:33:26 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.177s CPU time. Oct 13 20:33:26 np0005486557.novalocal runuser[85043]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:27 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:27 np0005486557.novalocal systemd-sysv-generator[85124]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:27 np0005486557.novalocal systemd-rc-local-generator[85120]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:27 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:27 np0005486557.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 13 20:33:27 np0005486557.novalocal systemd[1]: setroubleshootd.service: Consumed 1.007s CPU time. Oct 13 20:33:27 np0005486557.novalocal systemd[1]: Started OpenStack Cinder Scheduler Server. Oct 13 20:33:27 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:27 np0005486557.novalocal systemd-rc-local-generator[85155]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:27 np0005486557.novalocal systemd-sysv-generator[85158]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:27 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:27 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:28 np0005486557.novalocal systemd-sysv-generator[85191]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:28 np0005486557.novalocal systemd-rc-local-generator[85187]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:28 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:28 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:28 np0005486557.novalocal systemd-rc-local-generator[85218]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:28 np0005486557.novalocal systemd-sysv-generator[85221]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:28 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:28 np0005486557.novalocal systemd[1]: Started OpenStack Cinder Volume Server. Oct 13 20:33:29 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:29 np0005486557.novalocal systemd-sysv-generator[85251]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:29 np0005486557.novalocal systemd-rc-local-generator[85248]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:29 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:29 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:29 np0005486557.novalocal systemd-rc-local-generator[85282]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:29 np0005486557.novalocal systemd-sysv-generator[85285]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:29 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:30 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:30 np0005486557.novalocal systemd-rc-local-generator[85316]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:30 np0005486557.novalocal systemd-sysv-generator[85319]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:30 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:30 np0005486557.novalocal systemd[1]: Started OpenStack Cinder Backup Server. Oct 13 20:33:30 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:30 np0005486557.novalocal systemd-rc-local-generator[85347]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:30 np0005486557.novalocal systemd-sysv-generator[85350]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:30 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:31 np0005486557.novalocal sudo[85361]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings -o name cinder-volumes Oct 13 20:33:31 np0005486557.novalocal systemd[1]: Created slice User Slice of UID 0. Oct 13 20:33:31 np0005486557.novalocal systemd[1]: Starting User Runtime Directory /run/user/0... Oct 13 20:33:31 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:31 np0005486557.novalocal systemd-sysv-generator[85388]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:31 np0005486557.novalocal systemd-rc-local-generator[85385]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:31 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:31 np0005486557.novalocal systemd[1]: Finished User Runtime Directory /run/user/0. Oct 13 20:33:31 np0005486557.novalocal systemd[1]: Starting User Manager for UID 0... Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: pam_unix(systemd-user:session): session opened for user root(uid=0) by root(uid=0) Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: Queued start job for default target Main User Target. Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: Created slice User Application Slice. Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: Started Daily Cleanup of User's Temporary Directories. Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: Reached target Paths. Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: Reached target Timers. Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: Starting D-Bus User Message Bus Socket... Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: PipeWire PulseAudio was skipped because of an unmet condition check (ConditionUser=!root). Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: Listening on PipeWire Multimedia System Sockets. Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: Starting Create User's Volatile Files and Directories... Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: Listening on D-Bus User Message Bus Socket. Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: Reached target Sockets. Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: Finished Create User's Volatile Files and Directories. Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: Reached target Basic System. Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: Reached target Main User Target. Oct 13 20:33:31 np0005486557.novalocal systemd[85396]: Startup finished in 177ms. Oct 13 20:33:31 np0005486557.novalocal systemd[1]: Started User Manager for UID 0. Oct 13 20:33:31 np0005486557.novalocal systemd[1]: Started Session c1 of User root. Oct 13 20:33:31 np0005486557.novalocal sudo[85361]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:31 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:31 np0005486557.novalocal systemd-rc-local-generator[85432]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:31 np0005486557.novalocal systemd-sysv-generator[85435]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:31 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:31 np0005486557.novalocal sudo[85361]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:31 np0005486557.novalocal systemd[1]: session-c1.scope: Deactivated successfully. Oct 13 20:33:31 np0005486557.novalocal sudo[85441]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Oct 13 20:33:31 np0005486557.novalocal systemd[1]: Started Session c2 of User root. Oct 13 20:33:31 np0005486557.novalocal sudo[85441]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:32 np0005486557.novalocal systemd[1]: Starting Restore LIO kernel target configuration... Oct 13 20:33:32 np0005486557.novalocal kernel: Rounding down aligned max_sectors from 4294967295 to 4294967288 Oct 13 20:33:32 np0005486557.novalocal target[85445]: No saved config file at /etc/target/saveconfig.json, ok, exiting Oct 13 20:33:32 np0005486557.novalocal systemd[1]: Finished Restore LIO kernel target configuration. Oct 13 20:33:32 np0005486557.novalocal sudo[85441]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:32 np0005486557.novalocal systemd[1]: session-c2.scope: Deactivated successfully. Oct 13 20:33:32 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:32 np0005486557.novalocal systemd-sysv-generator[85480]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:32 np0005486557.novalocal systemd-rc-local-generator[85475]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:32 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:32 np0005486557.novalocal sudo[85455]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:33:32 np0005486557.novalocal systemd[1]: Started Session c3 of User root. Oct 13 20:33:32 np0005486557.novalocal sudo[85455]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:32 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:32 np0005486557.novalocal systemd-sysv-generator[85511]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:32 np0005486557.novalocal systemd-rc-local-generator[85508]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:32 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:32 np0005486557.novalocal sudo[85455]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:32 np0005486557.novalocal systemd[1]: session-c3.scope: Deactivated successfully. Oct 13 20:33:32 np0005486557.novalocal sudo[85518]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -L 14.25g cinder-volumes/cinder-volumes-pool Oct 13 20:33:32 np0005486557.novalocal systemd[1]: Started Session c4 of User root. Oct 13 20:33:32 np0005486557.novalocal sudo[85518]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:32 np0005486557.novalocal runuser[85517]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:33 np0005486557.novalocal systemd[1]: Started Device-mapper event daemon. Oct 13 20:33:33 np0005486557.novalocal dmeventd[85598]: dmeventd ready for processing. Oct 13 20:33:33 np0005486557.novalocal dmeventd[85598]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Oct 13 20:33:33 np0005486557.novalocal lvm[85607]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:33:33 np0005486557.novalocal lvm[85607]: VG cinder-volumes finished Oct 13 20:33:33 np0005486557.novalocal runuser[85517]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:33 np0005486557.novalocal sudo[85518]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:33 np0005486557.novalocal systemd[1]: session-c4.scope: Deactivated successfully. Oct 13 20:33:33 np0005486557.novalocal sudo[85613]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/cinder-volumes-pool Oct 13 20:33:33 np0005486557.novalocal systemd[1]: Started Session c5 of User root. Oct 13 20:33:33 np0005486557.novalocal sudo[85613]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:33 np0005486557.novalocal runuser[85612]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:34 np0005486557.novalocal sudo[85613]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:34 np0005486557.novalocal systemd[1]: session-c5.scope: Deactivated successfully. Oct 13 20:33:34 np0005486557.novalocal sudo[85662]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C pvs --noheadings --unit=g -o vg_name,name,size,free --separator | --nosuffix --ignoreskippedcluster Oct 13 20:33:34 np0005486557.novalocal systemd[1]: Started Session c6 of User root. Oct 13 20:33:34 np0005486557.novalocal sudo[85662]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:34 np0005486557.novalocal runuser[85612]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:34 np0005486557.novalocal runuser[85675]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:34 np0005486557.novalocal sudo[85662]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:34 np0005486557.novalocal systemd[1]: session-c6.scope: Deactivated successfully. Oct 13 20:33:34 np0005486557.novalocal sudo[85721]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:33:34 np0005486557.novalocal systemd[1]: Started Session c7 of User root. Oct 13 20:33:34 np0005486557.novalocal sudo[85721]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:34 np0005486557.novalocal sudo[85721]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:34 np0005486557.novalocal systemd[1]: session-c7.scope: Deactivated successfully. Oct 13 20:33:34 np0005486557.novalocal sudo[85726]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:33:34 np0005486557.novalocal systemd[1]: Started Session c8 of User root. Oct 13 20:33:34 np0005486557.novalocal sudo[85726]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:34 np0005486557.novalocal runuser[85675]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:35 np0005486557.novalocal runuser[85735]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:35 np0005486557.novalocal sudo[85726]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:35 np0005486557.novalocal systemd[1]: session-c8.scope: Deactivated successfully. Oct 13 20:33:35 np0005486557.novalocal sudo[85781]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:33:35 np0005486557.novalocal systemd[1]: Started Session c9 of User root. Oct 13 20:33:35 np0005486557.novalocal sudo[85781]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:35 np0005486557.novalocal sudo[85781]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:35 np0005486557.novalocal systemd[1]: session-c9.scope: Deactivated successfully. Oct 13 20:33:35 np0005486557.novalocal sudo[85790]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:33:35 np0005486557.novalocal systemd[1]: Started Session c10 of User root. Oct 13 20:33:35 np0005486557.novalocal sudo[85790]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:35 np0005486557.novalocal runuser[85735]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:36 np0005486557.novalocal runuser[85799]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:36 np0005486557.novalocal sudo[85790]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:36 np0005486557.novalocal systemd[1]: session-c10.scope: Deactivated successfully. Oct 13 20:33:36 np0005486557.novalocal sudo[85817]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Oct 13 20:33:36 np0005486557.novalocal systemd[1]: Started Session c11 of User root. Oct 13 20:33:36 np0005486557.novalocal sudo[85817]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:36 np0005486557.novalocal sudo[85817]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:36 np0005486557.novalocal systemd[1]: session-c11.scope: Deactivated successfully. Oct 13 20:33:36 np0005486557.novalocal sudo[85850]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Oct 13 20:33:36 np0005486557.novalocal systemd[1]: Started Session c12 of User root. Oct 13 20:33:36 np0005486557.novalocal sudo[85850]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:36 np0005486557.novalocal runuser[85799]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:36 np0005486557.novalocal runuser[85860]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:36 np0005486557.novalocal sudo[85850]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:36 np0005486557.novalocal systemd[1]: session-c12.scope: Deactivated successfully. Oct 13 20:33:36 np0005486557.novalocal sudo[85906]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:33:36 np0005486557.novalocal systemd[1]: Started Session c13 of User root. Oct 13 20:33:36 np0005486557.novalocal sudo[85906]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:37 np0005486557.novalocal sudo[85906]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:37 np0005486557.novalocal systemd[1]: session-c13.scope: Deactivated successfully. Oct 13 20:33:37 np0005486557.novalocal sudo[85911]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:33:37 np0005486557.novalocal systemd[1]: Started Session c14 of User root. Oct 13 20:33:37 np0005486557.novalocal sudo[85911]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:37 np0005486557.novalocal runuser[85860]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:37 np0005486557.novalocal runuser[85920]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:37 np0005486557.novalocal sudo[85911]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:37 np0005486557.novalocal systemd[1]: session-c14.scope: Deactivated successfully. Oct 13 20:33:37 np0005486557.novalocal sudo[85966]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:33:37 np0005486557.novalocal systemd[1]: Started Session c15 of User root. Oct 13 20:33:37 np0005486557.novalocal sudo[85966]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:37 np0005486557.novalocal sudo[85966]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:37 np0005486557.novalocal systemd[1]: session-c15.scope: Deactivated successfully. Oct 13 20:33:37 np0005486557.novalocal sudo[85974]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:33:38 np0005486557.novalocal systemd[1]: Started Session c16 of User root. Oct 13 20:33:38 np0005486557.novalocal sudo[85974]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:38 np0005486557.novalocal runuser[85920]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:38 np0005486557.novalocal runuser[85980]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:38 np0005486557.novalocal sudo[85974]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:38 np0005486557.novalocal systemd[1]: session-c16.scope: Deactivated successfully. Oct 13 20:33:38 np0005486557.novalocal sudo[86026]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:33:38 np0005486557.novalocal systemd[1]: Started Session c17 of User root. Oct 13 20:33:38 np0005486557.novalocal sudo[86026]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:38 np0005486557.novalocal runuser[85980]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:38 np0005486557.novalocal sudo[86026]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:38 np0005486557.novalocal systemd[1]: session-c17.scope: Deactivated successfully. Oct 13 20:33:38 np0005486557.novalocal sudo[86038]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:33:38 np0005486557.novalocal systemd[1]: Started Session c18 of User root. Oct 13 20:33:38 np0005486557.novalocal sudo[86038]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:39 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:39 np0005486557.novalocal sudo[86038]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:39 np0005486557.novalocal systemd-sysv-generator[86073]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:39 np0005486557.novalocal systemd-rc-local-generator[86070]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:39 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:39 np0005486557.novalocal systemd[1]: session-c18.scope: Deactivated successfully. Oct 13 20:33:39 np0005486557.novalocal sudo[86048]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:33:39 np0005486557.novalocal systemd[1]: Started Session c19 of User root. Oct 13 20:33:39 np0005486557.novalocal systemd[1]: Starting OpenStack Neutron (RPC only) Server... Oct 13 20:33:39 np0005486557.novalocal sudo[86048]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:40 np0005486557.novalocal sudo[86048]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:40 np0005486557.novalocal systemd[1]: session-c19.scope: Deactivated successfully. Oct 13 20:33:40 np0005486557.novalocal sudo[86083]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:33:40 np0005486557.novalocal systemd[1]: Started Session c20 of User root. Oct 13 20:33:40 np0005486557.novalocal sudo[86083]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:40 np0005486557.novalocal neutron-rpc-server[86080]: This program is using eventlet and has been monkey_patched Oct 13 20:33:40 np0005486557.novalocal sudo[86083]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:40 np0005486557.novalocal systemd[1]: session-c20.scope: Deactivated successfully. Oct 13 20:33:40 np0005486557.novalocal sudo[86092]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:33:40 np0005486557.novalocal systemd[1]: Started Session c21 of User root. Oct 13 20:33:40 np0005486557.novalocal sudo[86092]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:41 np0005486557.novalocal sudo[86092]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:41 np0005486557.novalocal systemd[1]: session-c21.scope: Deactivated successfully. Oct 13 20:33:41 np0005486557.novalocal sudo[86096]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:33:41 np0005486557.novalocal systemd[1]: Started Session c22 of User root. Oct 13 20:33:41 np0005486557.novalocal sudo[86096]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:41 np0005486557.novalocal sudo[86096]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:41 np0005486557.novalocal systemd[1]: session-c22.scope: Deactivated successfully. Oct 13 20:33:41 np0005486557.novalocal sudo[86100]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:33:41 np0005486557.novalocal systemd[1]: Started Session c23 of User root. Oct 13 20:33:41 np0005486557.novalocal sudo[86100]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:41 np0005486557.novalocal sudo[86100]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:41 np0005486557.novalocal systemd[1]: session-c23.scope: Deactivated successfully. Oct 13 20:33:41 np0005486557.novalocal sudo[86105]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:33:41 np0005486557.novalocal systemd[1]: Started Session c24 of User root. Oct 13 20:33:41 np0005486557.novalocal sudo[86105]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:33:42 np0005486557.novalocal sudo[86105]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:42 np0005486557.novalocal systemd[1]: session-c24.scope: Deactivated successfully. Oct 13 20:33:42 np0005486557.novalocal systemd[1]: Started OpenStack Neutron (RPC only) Server. Oct 13 20:33:42 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:42 np0005486557.novalocal systemd-sysv-generator[86135]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:42 np0005486557.novalocal systemd-rc-local-generator[86131]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:42 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:42 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:42 np0005486557.novalocal systemd-rc-local-generator[86164]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:42 np0005486557.novalocal systemd-sysv-generator[86168]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:42 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:43 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:43 np0005486557.novalocal systemd-rc-local-generator[86195]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:43 np0005486557.novalocal systemd-sysv-generator[86198]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:43 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:43 np0005486557.novalocal systemd[1]: Starting OpenStack Neutron Periodic Workers... Oct 13 20:33:44 np0005486557.novalocal neutron-periodic-workers[86204]: This program is using eventlet and has been monkey_patched Oct 13 20:33:46 np0005486557.novalocal systemd[1]: Started OpenStack Neutron Periodic Workers. Oct 13 20:33:46 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:46 np0005486557.novalocal systemd-rc-local-generator[86234]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:46 np0005486557.novalocal systemd-sysv-generator[86239]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:46 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:47 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:47 np0005486557.novalocal systemd-rc-local-generator[86263]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:47 np0005486557.novalocal systemd-sysv-generator[86267]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:47 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:47 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:47 np0005486557.novalocal systemd-rc-local-generator[86292]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:47 np0005486557.novalocal systemd-sysv-generator[86297]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:47 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:48 np0005486557.novalocal systemd[1]: Started OpenStack Neutron OVN Agent. Oct 13 20:33:48 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:48 np0005486557.novalocal systemd-sysv-generator[86329]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:48 np0005486557.novalocal systemd-rc-local-generator[86326]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:48 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:48 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:48 np0005486557.novalocal systemd-sysv-generator[86362]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:48 np0005486557.novalocal systemd-rc-local-generator[86358]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:48 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:49 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:49 np0005486557.novalocal systemd-rc-local-generator[86392]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:49 np0005486557.novalocal systemd-sysv-generator[86395]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:49 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:49 np0005486557.novalocal systemd[1]: Started OpenStack Neutron VPNaaS support for OVN. Oct 13 20:33:49 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:49 np0005486557.novalocal systemd-sysv-generator[86435]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:49 np0005486557.novalocal systemd-rc-local-generator[86432]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:49 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:50 np0005486557.novalocal neutron-ovn-vpn-agent[86402]: This program is using eventlet and has been monkey_patched Oct 13 20:33:50 np0005486557.novalocal sudo[86438]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmphzwbp0sv/privsep.sock Oct 13 20:33:50 np0005486557.novalocal systemd[1]: Started Session c25 of User root. Oct 13 20:33:50 np0005486557.novalocal sudo[86438]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:33:50 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:50 np0005486557.novalocal systemd-rc-local-generator[86467]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:50 np0005486557.novalocal systemd-sysv-generator[86471]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:50 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:50 np0005486557.novalocal kernel: capability: warning: `privsep-helper' uses deprecated v2 capabilities in a way that may be insecure Oct 13 20:33:50 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:50 np0005486557.novalocal systemd-sysv-generator[86507]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:50 np0005486557.novalocal systemd-rc-local-generator[86503]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:50 np0005486557.novalocal sudo[86438]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:50 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:51 np0005486557.novalocal systemd[1]: Starting OpenStack Neutron OVN Maintenance Worker... Oct 13 20:33:51 np0005486557.novalocal neutron-ovn-maintenance-worker[86516]: This program is using eventlet and has been monkey_patched Oct 13 20:33:52 np0005486557.novalocal sudo[86529]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpm74ax26k/privsep.sock Oct 13 20:33:52 np0005486557.novalocal systemd[1]: Started Session c26 of User root. Oct 13 20:33:52 np0005486557.novalocal sudo[86529]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:33:53 np0005486557.novalocal sudo[86529]: pam_unix(sudo:session): session closed for user root Oct 13 20:33:53 np0005486557.novalocal systemd[1]: Started OpenStack Neutron OVN Maintenance Worker. Oct 13 20:33:54 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:54 np0005486557.novalocal systemd-rc-local-generator[86567]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:54 np0005486557.novalocal systemd-sysv-generator[86571]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:54 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:54 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:54 np0005486557.novalocal systemd-sysv-generator[86601]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:54 np0005486557.novalocal systemd-rc-local-generator[86597]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:54 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:54 np0005486557.novalocal runuser[86607]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:55 np0005486557.novalocal runuser[86607]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:55 np0005486557.novalocal runuser[86659]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:55 np0005486557.novalocal runuser[86659]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:56 np0005486557.novalocal runuser[86712]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:56 np0005486557.novalocal runuser[86712]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:56 np0005486557.novalocal runuser[86764]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:33:57 np0005486557.novalocal runuser[86764]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:33:57 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:57 np0005486557.novalocal systemd-rc-local-generator[86842]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:57 np0005486557.novalocal systemd-sysv-generator[86846]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:57 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:58 np0005486557.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Oct 13 20:33:58 np0005486557.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Oct 13 20:33:58 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:58 np0005486557.novalocal systemd-rc-local-generator[86874]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:58 np0005486557.novalocal systemd-sysv-generator[86879]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:58 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:58 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:58 np0005486557.novalocal systemd-rc-local-generator[86906]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:58 np0005486557.novalocal systemd-sysv-generator[86909]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:58 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:59 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:33:59 np0005486557.novalocal systemd-rc-local-generator[86936]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:33:59 np0005486557.novalocal systemd-sysv-generator[86941]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:33:59 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:33:59 np0005486557.novalocal systemd[1]: Listening on libvirt locking daemon socket. Oct 13 20:33:59 np0005486557.novalocal systemd[1]: Listening on libvirt locking daemon admin socket. Oct 13 20:33:59 np0005486557.novalocal systemd[1]: Starting libvirt locking daemon... Oct 13 20:33:59 np0005486557.novalocal systemd[1]: Started libvirt locking daemon. Oct 13 20:34:00 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:34:00 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:34:00 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:34:00 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:00 np0005486557.novalocal systemd-rc-local-generator[86972]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:00 np0005486557.novalocal systemd-sysv-generator[86977]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:00 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:00 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:00 np0005486557.novalocal systemd-sysv-generator[87004]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:00 np0005486557.novalocal systemd-rc-local-generator[87000]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:00 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:01 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:01 np0005486557.novalocal systemd-rc-local-generator[87033]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:01 np0005486557.novalocal systemd-sysv-generator[87036]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:01 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:01 np0005486557.novalocal systemd[1]: Listening on libvirt logging daemon socket. Oct 13 20:34:01 np0005486557.novalocal systemd[1]: Listening on libvirt logging daemon admin socket. Oct 13 20:34:01 np0005486557.novalocal systemd[1]: Starting libvirt logging daemon... Oct 13 20:34:01 np0005486557.novalocal systemd[1]: Started libvirt logging daemon. Oct 13 20:34:01 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:01 np0005486557.novalocal systemd-sysv-generator[87066]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:01 np0005486557.novalocal systemd-rc-local-generator[87062]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:01 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:02 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:02 np0005486557.novalocal systemd-sysv-generator[87096]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:02 np0005486557.novalocal systemd-rc-local-generator[87092]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:02 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:02 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:02 np0005486557.novalocal systemd-rc-local-generator[87127]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:02 np0005486557.novalocal systemd-sysv-generator[87132]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:02 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:03 np0005486557.novalocal systemd[1]: Listening on libvirt secret daemon socket. Oct 13 20:34:03 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:03 np0005486557.novalocal systemd-rc-local-generator[87164]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:03 np0005486557.novalocal systemd-sysv-generator[87168]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:03 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:03 np0005486557.novalocal systemd[1]: Listening on libvirt nodedev daemon socket. Oct 13 20:34:04 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:04 np0005486557.novalocal systemd-rc-local-generator[87199]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:04 np0005486557.novalocal systemd-sysv-generator[87205]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:04 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:04 np0005486557.novalocal systemd[1]: Listening on libvirt QEMU daemon socket. Oct 13 20:34:05 np0005486557.novalocal systemd[1]: virtproxyd-tcp.socket: Deactivated successfully. Oct 13 20:34:05 np0005486557.novalocal systemd[1]: Closed libvirt proxy daemon non-TLS IP socket. Oct 13 20:34:05 np0005486557.novalocal systemd[1]: Stopping libvirt proxy daemon non-TLS IP socket... Oct 13 20:34:05 np0005486557.novalocal systemd[1]: virtproxyd.socket: Deactivated successfully. Oct 13 20:34:05 np0005486557.novalocal systemd[1]: Closed libvirt proxy daemon socket. Oct 13 20:34:05 np0005486557.novalocal systemd[1]: Stopping libvirt proxy daemon socket... Oct 13 20:34:05 np0005486557.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Oct 13 20:34:05 np0005486557.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Oct 13 20:34:05 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:05 np0005486557.novalocal systemd-rc-local-generator[87243]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:05 np0005486557.novalocal systemd-sysv-generator[87246]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:05 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:06 np0005486557.novalocal systemd[1]: Listening on libvirt storage daemon socket. Oct 13 20:34:06 np0005486557.novalocal systemd[1]: Created slice Virtual Machine and Container Slice. Oct 13 20:34:06 np0005486557.novalocal systemd[1]: Listening on libvirt QEMU daemon admin socket. Oct 13 20:34:06 np0005486557.novalocal systemd[1]: Listening on libvirt QEMU daemon read-only socket. Oct 13 20:34:06 np0005486557.novalocal systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 13 20:34:06 np0005486557.novalocal systemd[1]: Starting Virtual Machine and Container Registration Service... Oct 13 20:34:06 np0005486557.novalocal systemd[1]: Started Virtual Machine and Container Registration Service. Oct 13 20:34:06 np0005486557.novalocal systemd[1]: Starting libvirt QEMU daemon... Oct 13 20:34:06 np0005486557.novalocal systemd[1]: Started libvirt QEMU daemon. Oct 13 20:34:06 np0005486557.novalocal virtqemud[87256]: libvirt version: 10.10.0, package: 15.el9 (builder@centos.org, 2025-08-18-13:22:20, ) Oct 13 20:34:06 np0005486557.novalocal virtqemud[87256]: hostname: np0005486557.novalocal Oct 13 20:34:06 np0005486557.novalocal virtqemud[87256]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Oct 13 20:34:06 np0005486557.novalocal virtqemud[87256]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Oct 13 20:34:06 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:07 np0005486557.novalocal systemd-rc-local-generator[87298]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:07 np0005486557.novalocal systemd-sysv-generator[87302]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:07 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:07 np0005486557.novalocal systemd[1]: Reached target libvirt guests shutdown target. Oct 13 20:34:07 np0005486557.novalocal systemd[1]: Starting libvirt guests suspend/resume service... Oct 13 20:34:07 np0005486557.novalocal systemd[1]: Finished libvirt guests suspend/resume service. Oct 13 20:34:07 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:07 np0005486557.novalocal systemd-sysv-generator[87344]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:07 np0005486557.novalocal systemd-rc-local-generator[87341]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:07 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:07 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:07 np0005486557.novalocal systemd-rc-local-generator[87369]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:07 np0005486557.novalocal systemd-sysv-generator[87373]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:08 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:08 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:08 np0005486557.novalocal systemd-rc-local-generator[87404]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:08 np0005486557.novalocal systemd-sysv-generator[87408]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:08 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:09 np0005486557.novalocal systemd[1]: Started OpenStack Nova NoVNC Proxy Server. Oct 13 20:34:09 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:09 np0005486557.novalocal systemd-rc-local-generator[87433]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:09 np0005486557.novalocal systemd-sysv-generator[87436]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:09 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:09 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:09 np0005486557.novalocal systemd-sysv-generator[87469]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:09 np0005486557.novalocal systemd-rc-local-generator[87464]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:09 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:09 np0005486557.novalocal runuser[87475]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:34:10 np0005486557.novalocal runuser[87475]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:34:10 np0005486557.novalocal runuser[87527]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:34:11 np0005486557.novalocal runuser[87527]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:34:11 np0005486557.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 13 20:34:11 np0005486557.novalocal runuser[87581]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:34:11 np0005486557.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 13 20:34:12 np0005486557.novalocal runuser[87581]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:34:12 np0005486557.novalocal runuser[87637]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:34:12 np0005486557.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service. Oct 13 20:34:12 np0005486557.novalocal runuser[87637]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:34:13 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:13 np0005486557.novalocal systemd-rc-local-generator[87721]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:13 np0005486557.novalocal systemd-sysv-generator[87726]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:13 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:13 np0005486557.novalocal systemd[1]: Started OpenStack Octavia Health-Manager service. Oct 13 20:34:13 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 7feacf20-b271-4042-b443-178cdfa35618 Oct 13 20:34:13 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 13 20:34:13 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 25fb7c4e-bce6-4d68-b407-ab51df6086b2 Oct 13 20:34:13 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:13 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 13 20:34:13 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 94975656-1740-4d80-bf19-4bbd6528ed33 Oct 13 20:34:13 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 13 20:34:13 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l aa335e60-3dce-4308-81c9-f14523289187 Oct 13 20:34:13 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 13 20:34:13 np0005486557.novalocal systemd-sysv-generator[87761]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:13 np0005486557.novalocal systemd-rc-local-generator[87756]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:13 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 03e909ba-993b-4f63-9f53-831652b8d22d Oct 13 20:34:13 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 13 20:34:13 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:13 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 182b56b6-22f9-4768-8625-6ef4641cd630 Oct 13 20:34:13 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 13 20:34:13 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 4458e603-ac62-4058-bb62-f78a830c47be Oct 13 20:34:13 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 13 20:34:14 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l d3226939-6b64-4375-827d-71434c2ac85d Oct 13 20:34:14 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 13 20:34:14 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 016d7a43-6c19-4528-85a7-73c12d3464f1 Oct 13 20:34:14 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 13 20:34:14 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:14 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l c3c6c697-089a-46ea-8eb5-ea5f7e913f4f Oct 13 20:34:14 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 13 20:34:14 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 8f6fe069-125b-43ac-962e-97312777f413 Oct 13 20:34:14 np0005486557.novalocal setroubleshoot[87580]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 13 20:34:14 np0005486557.novalocal systemd-rc-local-generator[87796]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:14 np0005486557.novalocal systemd-sysv-generator[87800]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:14 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:14 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:14 np0005486557.novalocal systemd-sysv-generator[87870]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:14 np0005486557.novalocal systemd-rc-local-generator[87864]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:14 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:15 np0005486557.novalocal systemd[1]: Started OpenStack Octavia Housekeeping service. Oct 13 20:34:15 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:15 np0005486557.novalocal systemd-sysv-generator[87900]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:15 np0005486557.novalocal systemd-rc-local-generator[87894]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:15 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:15 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:15 np0005486557.novalocal systemd-rc-local-generator[87926]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:15 np0005486557.novalocal systemd-sysv-generator[87929]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:15 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:16 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:16 np0005486557.novalocal systemd-rc-local-generator[87963]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:16 np0005486557.novalocal systemd-sysv-generator[87966]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:16 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:16 np0005486557.novalocal systemd[1]: Started OpenStack Octavia Driver Agent service. Oct 13 20:34:16 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:16 np0005486557.novalocal systemd-sysv-generator[87995]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:16 np0005486557.novalocal systemd-rc-local-generator[87992]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:16 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:17 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:17 np0005486557.novalocal systemd-rc-local-generator[88022]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:17 np0005486557.novalocal systemd-sysv-generator[88025]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:17 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:17 np0005486557.novalocal runuser[88032]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:34:18 np0005486557.novalocal runuser[88032]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:34:18 np0005486557.novalocal runuser[88086]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:34:18 np0005486557.novalocal runuser[88086]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:34:18 np0005486557.novalocal runuser[88139]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:34:19 np0005486557.novalocal runuser[88139]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:34:19 np0005486557.novalocal runuser[88195]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:34:20 np0005486557.novalocal runuser[88195]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:34:20 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:20 np0005486557.novalocal systemd-rc-local-generator[88289]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:20 np0005486557.novalocal systemd-sysv-generator[88293]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:20 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:20 np0005486557.novalocal systemd[1]: Started OpenStack Manila Scheduler. Oct 13 20:34:21 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:21 np0005486557.novalocal systemd-sysv-generator[88327]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:21 np0005486557.novalocal systemd-rc-local-generator[88321]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:21 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:21 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:21 np0005486557.novalocal systemd-rc-local-generator[88355]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:21 np0005486557.novalocal systemd-sysv-generator[88358]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:21 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:22 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:22 np0005486557.novalocal systemd-rc-local-generator[88384]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:22 np0005486557.novalocal systemd-sysv-generator[88391]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:22 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:22 np0005486557.novalocal systemd[1]: Started OpenStack Manila Share Service. Oct 13 20:34:22 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:22 np0005486557.novalocal systemd-sysv-generator[88424]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:22 np0005486557.novalocal systemd-rc-local-generator[88420]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:22 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:23 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:23 np0005486557.novalocal systemd-rc-local-generator[88448]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:23 np0005486557.novalocal systemd-sysv-generator[88454]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:23 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:23 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:23 np0005486557.novalocal systemd-rc-local-generator[88484]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:23 np0005486557.novalocal systemd-sysv-generator[88489]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:23 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:24 np0005486557.novalocal systemd[1]: Started OpenStack Manila Data Server. Oct 13 20:34:24 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Oct 13 20:34:24 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Consumed 1.246s CPU time. Oct 13 20:34:24 np0005486557.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 13 20:34:24 np0005486557.novalocal systemd[1]: setroubleshootd.service: Consumed 1.482s CPU time. Oct 13 20:34:24 np0005486557.novalocal sudo[88499]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/privsep-helper --config-file /usr/share/manila/manila-dist.conf --config-file /etc/manila/manila.conf --privsep_context manila.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpt2czur1v/privsep.sock Oct 13 20:34:24 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:24 np0005486557.novalocal systemd-rc-local-generator[88521]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:24 np0005486557.novalocal systemd-sysv-generator[88525]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:24 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:24 np0005486557.novalocal systemd[1]: Started Session c27 of User root. Oct 13 20:34:24 np0005486557.novalocal sudo[88499]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=978) Oct 13 20:34:24 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:24 np0005486557.novalocal systemd-rc-local-generator[88549]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:24 np0005486557.novalocal systemd-sysv-generator[88556]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:24 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:25 np0005486557.novalocal sudo[88499]: pam_unix(sudo:session): session closed for user root Oct 13 20:34:25 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:25 np0005486557.novalocal systemd-rc-local-generator[88593]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:25 np0005486557.novalocal systemd-sysv-generator[88597]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:26 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:26 np0005486557.novalocal systemd[1]: Starting One-time temporary TLS key generation for httpd.service... Oct 13 20:34:26 np0005486557.novalocal systemd[1]: httpd-init.service: Deactivated successfully. Oct 13 20:34:26 np0005486557.novalocal systemd[1]: Finished One-time temporary TLS key generation for httpd.service. Oct 13 20:34:26 np0005486557.novalocal systemd[1]: Starting The Apache HTTP Server... Oct 13 20:34:27 np0005486557.novalocal python3[88605]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Oct 13 20:34:27 np0005486557.novalocal python3[88605]: version_info = version.StrictVersion(__version__).version Oct 13 20:34:30 np0005486557.novalocal python3[88608]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Oct 13 20:34:30 np0005486557.novalocal python3[88608]: version_info = version.StrictVersion(__version__).version Oct 13 20:34:34 np0005486557.novalocal httpd[88619]: Server configured, listening on: ::1 port 9876, ... Oct 13 20:34:34 np0005486557.novalocal systemd[1]: Started The Apache HTTP Server. Oct 13 20:34:34 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:34 np0005486557.novalocal systemd-rc-local-generator[88713]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:34 np0005486557.novalocal systemd-sysv-generator[88716]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:34 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:34 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:34:35 np0005486557.novalocal systemd-rc-local-generator[88766]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:34:35 np0005486557.novalocal systemd-sysv-generator[88770]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:34:35 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:34:35 np0005486557.novalocal crontab[88775]: (root) REPLACE (keystone) Oct 13 20:34:37 np0005486557.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 13 20:34:37 np0005486557.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 13 20:34:38 np0005486557.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service. Oct 13 20:34:39 np0005486557.novalocal setroubleshoot[88782]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 073821b9-bc68-4a4a-99f1-58889a0fda0c Oct 13 20:34:39 np0005486557.novalocal setroubleshoot[88782]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:34:39 np0005486557.novalocal setroubleshoot[88782]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 24388769-d045-4139-a4dc-ddf2b6761d72 Oct 13 20:34:39 np0005486557.novalocal setroubleshoot[88782]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:34:39 np0005486557.novalocal setroubleshoot[88782]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). For complete SELinux messages run: sealert -l e863c93e-73dd-4b31-8216-c95e9ee73f9d Oct 13 20:34:39 np0005486557.novalocal setroubleshoot[88782]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:34:39 np0005486557.novalocal setroubleshoot[88782]: failed to retrieve rpm info for path '/var/lib/keystone/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66': Oct 13 20:34:39 np0005486557.novalocal setroubleshoot[88782]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l 959435bd-ad66-4e6c-9848-a571ed885a37 Oct 13 20:34:39 np0005486557.novalocal setroubleshoot[88782]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:34:49 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Deactivated successfully. Oct 13 20:34:49 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Consumed 1.175s CPU time. Oct 13 20:34:49 np0005486557.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 13 20:34:49 np0005486557.novalocal systemd[1]: setroubleshootd.service: Consumed 1.089s CPU time. Oct 13 20:35:03 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:35:03 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:35:03 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:35:17 np0005486557.novalocal octavia-health-manager[88078]: /usr/lib/python3.9/site-packages/octavia/db/repositories.py:1661: SAWarning: Coercing Subquery object into a select() for use in IN(); please pass a select() construct explicitly Oct 13 20:35:17 np0005486557.novalocal octavia-health-manager[88078]: self.model_class.amphora_id.in_(expired_ids_query) Oct 13 20:35:29 np0005486557.novalocal sudo[88922]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:35:29 np0005486557.novalocal systemd[1]: Started Session c28 of User root. Oct 13 20:35:29 np0005486557.novalocal sudo[88922]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:35:29 np0005486557.novalocal sudo[88922]: pam_unix(sudo:session): session closed for user root Oct 13 20:35:29 np0005486557.novalocal systemd[1]: session-c28.scope: Deactivated successfully. Oct 13 20:35:29 np0005486557.novalocal sudo[88929]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:35:29 np0005486557.novalocal systemd[1]: Started Session c29 of User root. Oct 13 20:35:29 np0005486557.novalocal sudo[88929]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:35:30 np0005486557.novalocal sudo[88929]: pam_unix(sudo:session): session closed for user root Oct 13 20:35:30 np0005486557.novalocal systemd[1]: session-c29.scope: Deactivated successfully. Oct 13 20:35:30 np0005486557.novalocal sudo[88933]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:35:30 np0005486557.novalocal systemd[1]: Started Session c30 of User root. Oct 13 20:35:30 np0005486557.novalocal sudo[88933]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:35:30 np0005486557.novalocal sudo[88933]: pam_unix(sudo:session): session closed for user root Oct 13 20:35:30 np0005486557.novalocal systemd[1]: session-c30.scope: Deactivated successfully. Oct 13 20:35:30 np0005486557.novalocal sudo[88937]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:35:30 np0005486557.novalocal systemd[1]: Started Session c31 of User root. Oct 13 20:35:30 np0005486557.novalocal sudo[88937]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:35:31 np0005486557.novalocal sudo[88937]: pam_unix(sudo:session): session closed for user root Oct 13 20:35:31 np0005486557.novalocal systemd[1]: session-c31.scope: Deactivated successfully. Oct 13 20:35:58 np0005486557.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 13 20:35:59 np0005486557.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 13 20:35:59 np0005486557.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service. Oct 13 20:36:01 np0005486557.novalocal setroubleshoot[88995]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 79867cb9-bf68-4473-a9df-e21d238d4552 Oct 13 20:36:01 np0005486557.novalocal setroubleshoot[88995]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 13 20:36:01 np0005486557.novalocal setroubleshoot[88995]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l cb2653e6-692f-4427-822a-57995adaf5fa Oct 13 20:36:01 np0005486557.novalocal setroubleshoot[88995]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 13 20:36:01 np0005486557.novalocal setroubleshoot[88995]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e7ec6423-2323-4023-b8ab-3d8691c2309e Oct 13 20:36:01 np0005486557.novalocal setroubleshoot[88995]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 13 20:36:03 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:36:03 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:36:03 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:36:06 np0005486557.novalocal systemd[1]: virtqemud.service: Deactivated successfully. Oct 13 20:36:11 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Deactivated successfully. Oct 13 20:36:11 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Consumed 1.235s CPU time. Oct 13 20:36:11 np0005486557.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 13 20:36:11 np0005486557.novalocal systemd[1]: setroubleshootd.service: Consumed 1.159s CPU time. Oct 13 20:36:28 np0005486557.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 13 20:36:28 np0005486557.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 13 20:36:29 np0005486557.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service. Oct 13 20:36:29 np0005486557.novalocal sudo[89113]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:36:29 np0005486557.novalocal systemd[1]: Started Session c32 of User root. Oct 13 20:36:29 np0005486557.novalocal sudo[89113]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:29 np0005486557.novalocal sudo[89113]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:29 np0005486557.novalocal systemd[1]: session-c32.scope: Deactivated successfully. Oct 13 20:36:29 np0005486557.novalocal sudo[89121]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:36:29 np0005486557.novalocal systemd[1]: Started Session c33 of User root. Oct 13 20:36:29 np0005486557.novalocal sudo[89121]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:30 np0005486557.novalocal sudo[89121]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:30 np0005486557.novalocal systemd[1]: session-c33.scope: Deactivated successfully. Oct 13 20:36:30 np0005486557.novalocal sudo[89127]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:36:30 np0005486557.novalocal systemd[1]: Started Session c34 of User root. Oct 13 20:36:30 np0005486557.novalocal sudo[89127]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:30 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 79867cb9-bf68-4473-a9df-e21d238d4552 Oct 13 20:36:30 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 13 20:36:30 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l cb2653e6-692f-4427-822a-57995adaf5fa Oct 13 20:36:30 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 13 20:36:30 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e7ec6423-2323-4023-b8ab-3d8691c2309e Oct 13 20:36:30 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 13 20:36:30 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 79867cb9-bf68-4473-a9df-e21d238d4552 Oct 13 20:36:30 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 13 20:36:30 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l cb2653e6-692f-4427-822a-57995adaf5fa Oct 13 20:36:30 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 13 20:36:30 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e7ec6423-2323-4023-b8ab-3d8691c2309e Oct 13 20:36:30 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 13 20:36:30 np0005486557.novalocal sudo[89127]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:30 np0005486557.novalocal systemd[1]: session-c34.scope: Deactivated successfully. Oct 13 20:36:30 np0005486557.novalocal sudo[89135]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:36:30 np0005486557.novalocal systemd[1]: Started Session c35 of User root. Oct 13 20:36:30 np0005486557.novalocal sudo[89135]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:31 np0005486557.novalocal sudo[89135]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:31 np0005486557.novalocal systemd[1]: session-c35.scope: Deactivated successfully. Oct 13 20:36:34 np0005486557.novalocal sudo[89150]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 cinder-volumes/cinder-volumes-pool Oct 13 20:36:34 np0005486557.novalocal systemd[1]: Started Session c36 of User root. Oct 13 20:36:34 np0005486557.novalocal sudo[89150]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:34 np0005486557.novalocal dmeventd[85598]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool. Oct 13 20:36:35 np0005486557.novalocal dmeventd[85598]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Oct 13 20:36:35 np0005486557.novalocal lvm[89209]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:36:35 np0005486557.novalocal lvm[89209]: VG cinder-volumes finished Oct 13 20:36:35 np0005486557.novalocal sudo[89150]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:35 np0005486557.novalocal systemd[1]: session-c36.scope: Deactivated successfully. Oct 13 20:36:37 np0005486557.novalocal sudo[89211]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmph_b73eif/privsep.sock Oct 13 20:36:37 np0005486557.novalocal systemd[1]: Started Session c37 of User root. Oct 13 20:36:37 np0005486557.novalocal sudo[89211]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 13 20:36:37 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l f8329953-2681-49d9-a8b4-6df2e3230087 Oct 13 20:36:37 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:36:37 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 43d0de0d-ec86-4f08-adf9-8a71d3eb2c42 Oct 13 20:36:37 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:36:37 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 36536b09-adfd-4125-815e-2c70c2b4d347 Oct 13 20:36:37 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:36:37 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 5fd86a9e-e9a7-4e5c-993f-1956adc88256 Oct 13 20:36:37 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:36:37 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 7e3a70ec-6bdd-4627-ac74-e819fe9166b6 Oct 13 20:36:37 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:36:37 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 1d193a89-62d1-48dc-84de-16a9f5773e2e Oct 13 20:36:37 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:36:38 np0005486557.novalocal sudo[89211]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 7e3a70ec-6bdd-4627-ac74-e819fe9166b6 Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 1d193a89-62d1-48dc-84de-16a9f5773e2e Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l f011583e-bae3-48bd-a998-af0b3921e8ff Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 6116337a-c70d-4906-8cb3-c062debd8f44 Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: failed to retrieve rpm info for path '/dev/vda1': Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 7ec1f69d-0708-44dc-9019-d0d8bb708df6 Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l d629571f-4fb8-4a29-857b-a54b59f536b7 Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal sudo[89242]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 08dfbcc6-b2fb-426f-8013-60d21de9ffa5 Oct 13 20:36:38 np0005486557.novalocal systemd[1]: Started Session c38 of User root. Oct 13 20:36:38 np0005486557.novalocal sudo[89242]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 50860481-ab95-408c-b3ad-974ff6c0a043 Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 1b5bd776-b6a2-4d31-8988-c7e44fd2e653 Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l d098a374-b24f-453e-88c1-f97f47ef47d8 Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 67f59196-7d4d-4f4d-849b-1e2141908fdf Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l c2e532be-cd34-4ea3-b524-7248200bb5b4 Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-o7pS4c. For complete SELinux messages run: sealert -l 945c4c84-9523-454a-be8b-263e3bddc40e Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-o7pS4c. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-o7pS4c file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-o7pS4c. For complete SELinux messages run: sealert -l 3c4f6b18-4c66-4975-9bc6-b6ee336d7bbc Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-o7pS4c. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-o7pS4c file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 47d86a7d-cffa-454e-ad8b-38140b46bcbd Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 99e87562-6617-45f3-b478-e604aa9af9d3 Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 1268aa76-909a-42d0-b26d-842ec1b1feb1 Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l f2ff7f14-de8b-4e64-bd83-123cea0e8cc7 Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 0275682a-e353-4233-af72-5b58511a5db9 Oct 13 20:36:38 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:39 np0005486557.novalocal sudo[89242]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:39 np0005486557.novalocal systemd[1]: session-c38.scope: Deactivated successfully. Oct 13 20:36:39 np0005486557.novalocal sudo[89246]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 2FsxHXR3rd2tm8XU8p8r d9zDHvmw89qcyakD False -p3260 -a::1 Oct 13 20:36:39 np0005486557.novalocal systemd[1]: Started Session c39 of User root. Oct 13 20:36:39 np0005486557.novalocal sudo[89246]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:39 np0005486557.novalocal sudo[89246]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:39 np0005486557.novalocal systemd[1]: session-c39.scope: Deactivated successfully. Oct 13 20:36:39 np0005486557.novalocal sudo[89263]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 13 20:36:39 np0005486557.novalocal systemd[1]: Started Session c40 of User root. Oct 13 20:36:39 np0005486557.novalocal sudo[89263]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:40 np0005486557.novalocal sudo[89263]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:40 np0005486557.novalocal systemd[1]: session-c40.scope: Deactivated successfully. Oct 13 20:36:40 np0005486557.novalocal sudo[89268]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:36:40 np0005486557.novalocal systemd[1]: Started Session c41 of User root. Oct 13 20:36:40 np0005486557.novalocal sudo[89268]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:40 np0005486557.novalocal sudo[89268]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:40 np0005486557.novalocal systemd[1]: session-c41.scope: Deactivated successfully. Oct 13 20:36:40 np0005486557.novalocal sudo[89273]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 2FsxHXR3rd2tm8XU8p8r d9zDHvmw89qcyakD iqn.1994-05.com.redhat:e2594393a727 Oct 13 20:36:40 np0005486557.novalocal systemd[1]: Started Session c42 of User root. Oct 13 20:36:40 np0005486557.novalocal sudo[89273]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:41 np0005486557.novalocal sudo[89273]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:41 np0005486557.novalocal systemd[1]: session-c42.scope: Deactivated successfully. Oct 13 20:36:41 np0005486557.novalocal sudo[89278]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:36:41 np0005486557.novalocal systemd[1]: Started Session c43 of User root. Oct 13 20:36:41 np0005486557.novalocal sudo[89278]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:41 np0005486557.novalocal sudo[89278]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:41 np0005486557.novalocal systemd[1]: session-c43.scope: Deactivated successfully. Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l e6ac9743-6a1f-491e-bf0c-67074d0c8417 Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Oct 13 20:36:42 np0005486557.novalocal kernel: iscsi: registered transport (tcp) Oct 13 20:36:42 np0005486557.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 0f4f0307-c8c9-4af1-be3a-4f46c1368c28 Oct 13 20:36:42 np0005486557.novalocal iscsid[70744]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856, portal: ::1,3260] through [iface: default] is operational now Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c4d8ab8f-ebdc-42bc-b570-9d2d263e1fe7 Oct 13 20:36:42 np0005486557.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 13 20:36:42 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 13 20:36:42 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405d4152801e5d44bc18bddcbc04 port group 0 rel port 1 Oct 13 20:36:42 np0005486557.novalocal kernel: scsi 2:0:0:0: Attached scsi generic sg1 type 0 Oct 13 20:36:42 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: transition timeout set to 60 seconds Oct 13 20:36:42 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:36:42 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 13 20:36:42 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 13 20:36:42 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 13 20:36:42 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 13 20:36:42 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:36:42 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 13 20:36:42 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l cd9d765d-069e-4341-bf08-df66b8ac163e Oct 13 20:36:42 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98604d51-9895-4f07-b3d3-a08fc4a35bd3 Oct 13 20:36:42 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l af37ad94-dc94-44a6-8a32-7c1b5b5be733 Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l e3227df9-501e-4b5b-acc3-681936564f7e Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a1c1f852-8d52-4901-800e-b33172a0e4f8 Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1a82a36c-7758-4914-8e0c-f9018ae5044b Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 3bfc11ad-07ee-424e-920f-dad35cecf47d Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 4cce59b0-77c5-4dad-a6ff-dbd5c09f35c0 Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e0324ff8-3480-4d35-99ea-daf9571c3540 Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 8f0122ac-34c4-4d15-acc5-93484fad0038 Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 69fa7fef-96e4-4d44-8486-2a4af6d3fb4f Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 4cb648fd-5e9a-47f5-9ec6-140b3bbd1feb Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l d56605f8-b070-4106-9bff-a5f5cc1fe752 Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. For complete SELinux messages run: sealert -l c2749b08-9578-4086-93b0-054c3456d33f Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. For complete SELinux messages run: sealert -l 980bdd32-aa12-4eb5-8562-6464cbdc91fd Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 604d6e2e-9fa7-4355-91ee-c7b4495bfdc6 Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l e3227df9-501e-4b5b-acc3-681936564f7e Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a1c1f852-8d52-4901-800e-b33172a0e4f8 Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 4cce59b0-77c5-4dad-a6ff-dbd5c09f35c0 Oct 13 20:36:42 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l fa32b25d-c54a-42c1-b38e-320f7fc6feed Oct 13 20:36:43 np0005486557.novalocal sudo[89337]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Oct 13 20:36:43 np0005486557.novalocal systemd[1]: Started Session c44 of User root. Oct 13 20:36:43 np0005486557.novalocal sudo[89337]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l abeaa7a7-c5c3-4970-8e26-0c8a2e7a6599 Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 6541765a-7f61-4f52-bbef-a7853ca3a7e9 Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: failed to retrieve rpm info for path '/dev/sda': Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 7ec1f69d-0708-44dc-9019-d0d8bb708df6 Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l f8329953-2681-49d9-a8b4-6df2e3230087 Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 43d0de0d-ec86-4f08-adf9-8a71d3eb2c42 Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 36536b09-adfd-4125-815e-2c70c2b4d347 Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 5fd86a9e-e9a7-4e5c-993f-1956adc88256 Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 7e3a70ec-6bdd-4627-ac74-e819fe9166b6 Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 1d193a89-62d1-48dc-84de-16a9f5773e2e Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:36:43 np0005486557.novalocal sudo[89337]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:43 np0005486557.novalocal systemd[1]: session-c44.scope: Deactivated successfully. Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 7ec1f69d-0708-44dc-9019-d0d8bb708df6 Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 1f5d636a-9518-4c9c-ad7d-612ab328ea12 Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 37212ff8-4db6-416e-9993-ad02137f3835 Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 08dfbcc6-b2fb-426f-8013-60d21de9ffa5 Oct 13 20:36:43 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:44 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:36:44 np0005486557.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 13 20:36:44 np0005486557.novalocal kernel: GPT:229375 != 2097151 Oct 13 20:36:44 np0005486557.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 13 20:36:44 np0005486557.novalocal kernel: GPT:229375 != 2097151 Oct 13 20:36:44 np0005486557.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 13 20:36:44 np0005486557.novalocal kernel: sda: sda1 sda15 Oct 13 20:36:44 np0005486557.novalocal sudo[89350]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Oct 13 20:36:44 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 50860481-ab95-408c-b3ad-974ff6c0a043 Oct 13 20:36:44 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:44 np0005486557.novalocal systemd[1]: Started Session c45 of User root. Oct 13 20:36:44 np0005486557.novalocal sudo[89350]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 13 20:36:45 np0005486557.novalocal sudo[89350]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:45 np0005486557.novalocal systemd[1]: session-c45.scope: Deactivated successfully. Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l cd9d765d-069e-4341-bf08-df66b8ac163e Oct 13 20:36:45 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 3bfc11ad-07ee-424e-920f-dad35cecf47d Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. For complete SELinux messages run: sealert -l 980bdd32-aa12-4eb5-8562-6464cbdc91fd Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98604d51-9895-4f07-b3d3-a08fc4a35bd3 Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l af37ad94-dc94-44a6-8a32-7c1b5b5be733 Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1a82a36c-7758-4914-8e0c-f9018ae5044b Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 604d6e2e-9fa7-4355-91ee-c7b4495bfdc6 Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. For complete SELinux messages run: sealert -l 6171c909-8414-431b-a1bc-edd3556db3b0 Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e0324ff8-3480-4d35-99ea-daf9571c3540 Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:45 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 13 20:36:45 np0005486557.novalocal iscsid[70744]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856, portal: ::1,3260] through [iface: default] is shutdown. Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l d629571f-4fb8-4a29-857b-a54b59f536b7 Oct 13 20:36:45 np0005486557.novalocal sudo[89392]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 iqn.1994-05.com.redhat:e2594393a727 Oct 13 20:36:45 np0005486557.novalocal systemd[1]: Started Session c46 of User root. Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:45 np0005486557.novalocal sudo[89392]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 788a640e-4a41-4497-b364-c620a95d6055 Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856. For complete SELinux messages run: sealert -l 8f0122ac-34c4-4d15-acc5-93484fad0038 Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l c80bc617-57ba-456e-8eef-82dfc669a3c4 Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 527df182-574e-4481-8bb2-fe424acccff9 Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856. For complete SELinux messages run: sealert -l 1ad47321-dc36-4819-9943-f3c7b1051872 Oct 13 20:36:45 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:46 np0005486557.novalocal sudo[89392]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:46 np0005486557.novalocal systemd[1]: session-c46.scope: Deactivated successfully. Oct 13 20:36:46 np0005486557.novalocal sudo[89399]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:36:46 np0005486557.novalocal systemd[1]: Started Session c47 of User root. Oct 13 20:36:46 np0005486557.novalocal sudo[89399]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:46 np0005486557.novalocal sudo[89399]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:46 np0005486557.novalocal systemd[1]: session-c47.scope: Deactivated successfully. Oct 13 20:36:46 np0005486557.novalocal sudo[89404]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 13 20:36:46 np0005486557.novalocal systemd[1]: Started Session c48 of User root. Oct 13 20:36:46 np0005486557.novalocal sudo[89404]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:47 np0005486557.novalocal sudo[89404]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:47 np0005486557.novalocal systemd[1]: session-c48.scope: Deactivated successfully. Oct 13 20:36:47 np0005486557.novalocal sudo[89409]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 Oct 13 20:36:47 np0005486557.novalocal systemd[1]: Started Session c49 of User root. Oct 13 20:36:47 np0005486557.novalocal sudo[89409]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:47 np0005486557.novalocal sudo[89409]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:47 np0005486557.novalocal systemd[1]: session-c49.scope: Deactivated successfully. Oct 13 20:36:47 np0005486557.novalocal sudo[89414]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:36:47 np0005486557.novalocal systemd[1]: Started Session c50 of User root. Oct 13 20:36:47 np0005486557.novalocal sudo[89414]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:48 np0005486557.novalocal sudo[89414]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:48 np0005486557.novalocal systemd[1]: session-c50.scope: Deactivated successfully. Oct 13 20:36:53 np0005486557.novalocal sudo[89429]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-35bd05d1-7813-4dd9-b5db-f946862129ab cinder-volumes/cinder-volumes-pool Oct 13 20:36:53 np0005486557.novalocal systemd[1]: Started Session c51 of User root. Oct 13 20:36:53 np0005486557.novalocal sudo[89429]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:53 np0005486557.novalocal lvm[89441]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:36:53 np0005486557.novalocal lvm[89441]: VG cinder-volumes finished Oct 13 20:36:53 np0005486557.novalocal sudo[89429]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:53 np0005486557.novalocal systemd[1]: session-c51.scope: Deactivated successfully. Oct 13 20:36:54 np0005486557.novalocal sudo[89445]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmp9yxf10t8/privsep.sock Oct 13 20:36:54 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l f8329953-2681-49d9-a8b4-6df2e3230087 Oct 13 20:36:54 np0005486557.novalocal systemd[1]: Started Session c52 of User root. Oct 13 20:36:54 np0005486557.novalocal sudo[89445]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 13 20:36:54 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:36:54 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 43d0de0d-ec86-4f08-adf9-8a71d3eb2c42 Oct 13 20:36:54 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:36:54 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 36536b09-adfd-4125-815e-2c70c2b4d347 Oct 13 20:36:54 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:36:54 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 5fd86a9e-e9a7-4e5c-993f-1956adc88256 Oct 13 20:36:54 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:36:54 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 7e3a70ec-6bdd-4627-ac74-e819fe9166b6 Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 1d193a89-62d1-48dc-84de-16a9f5773e2e Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:36:55 np0005486557.novalocal sudo[89445]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l ce6a0df2-0ae0-4b99-b39f-d08810ff7d3e Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l b7b75fe7-a031-4da1-98ef-1e62b4c7a302 Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:55 np0005486557.novalocal sudo[89467]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-35bd05d1-7813-4dd9-b5db-f946862129ab Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 7ec1f69d-0708-44dc-9019-d0d8bb708df6 Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:55 np0005486557.novalocal systemd[1]: Started Session c53 of User root. Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l d629571f-4fb8-4a29-857b-a54b59f536b7 Oct 13 20:36:55 np0005486557.novalocal sudo[89467]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 08dfbcc6-b2fb-426f-8013-60d21de9ffa5 Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 50860481-ab95-408c-b3ad-974ff6c0a043 Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 00bda432-ba25-4fa0-9f8e-43447445ae15 Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l d098a374-b24f-453e-88c1-f97f47ef47d8 Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 67f59196-7d4d-4f4d-849b-1e2141908fdf Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:55 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l c2e532be-cd34-4ea3-b524-7248200bb5b4 Oct 13 20:36:56 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:56 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-o0JaC2. For complete SELinux messages run: sealert -l 3c4f6b18-4c66-4975-9bc6-b6ee336d7bbc Oct 13 20:36:56 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-o0JaC2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-o0JaC2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:56 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 47d86a7d-cffa-454e-ad8b-38140b46bcbd Oct 13 20:36:56 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:56 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 0275682a-e353-4233-af72-5b58511a5db9 Oct 13 20:36:56 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:56 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l b1101383-06c1-472a-8149-6a7ee2d0368d Oct 13 20:36:56 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:56 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l f2ff7f14-de8b-4e64-bd83-123cea0e8cc7 Oct 13 20:36:56 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:56 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 99e87562-6617-45f3-b478-e604aa9af9d3 Oct 13 20:36:56 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:36:56 np0005486557.novalocal sudo[89467]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:56 np0005486557.novalocal systemd[1]: session-c53.scope: Deactivated successfully. Oct 13 20:36:56 np0005486557.novalocal sudo[89471]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-35bd05d1-7813-4dd9-b5db-f946862129ab iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab md6WLAyRFBmNZTUV8244 aM67vZvDUg3exNjh False -p3260 -a::1 Oct 13 20:36:56 np0005486557.novalocal systemd[1]: Started Session c54 of User root. Oct 13 20:36:56 np0005486557.novalocal sudo[89471]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:56 np0005486557.novalocal sudo[89471]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:56 np0005486557.novalocal systemd[1]: session-c54.scope: Deactivated successfully. Oct 13 20:36:56 np0005486557.novalocal sudo[89478]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 13 20:36:56 np0005486557.novalocal systemd[1]: Started Session c55 of User root. Oct 13 20:36:56 np0005486557.novalocal sudo[89478]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:57 np0005486557.novalocal sudo[89478]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:57 np0005486557.novalocal systemd[1]: session-c55.scope: Deactivated successfully. Oct 13 20:36:57 np0005486557.novalocal sudo[89483]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:36:57 np0005486557.novalocal systemd[1]: Started Session c56 of User root. Oct 13 20:36:57 np0005486557.novalocal sudo[89483]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:57 np0005486557.novalocal sudo[89483]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:57 np0005486557.novalocal systemd[1]: session-c56.scope: Deactivated successfully. Oct 13 20:36:57 np0005486557.novalocal sudo[89488]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab md6WLAyRFBmNZTUV8244 aM67vZvDUg3exNjh iqn.1994-05.com.redhat:e2594393a727 Oct 13 20:36:57 np0005486557.novalocal systemd[1]: Started Session c57 of User root. Oct 13 20:36:57 np0005486557.novalocal sudo[89488]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:58 np0005486557.novalocal sudo[89488]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:58 np0005486557.novalocal systemd[1]: session-c57.scope: Deactivated successfully. Oct 13 20:36:58 np0005486557.novalocal sudo[89493]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:36:58 np0005486557.novalocal systemd[1]: Started Session c58 of User root. Oct 13 20:36:58 np0005486557.novalocal sudo[89493]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:36:58 np0005486557.novalocal sudo[89493]: pam_unix(sudo:session): session closed for user root Oct 13 20:36:58 np0005486557.novalocal systemd[1]: session-c58.scope: Deactivated successfully. Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l e6ac9743-6a1f-491e-bf0c-67074d0c8417 Oct 13 20:36:59 np0005486557.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 13 20:36:59 np0005486557.novalocal iscsid[70744]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab, portal: ::1,3260] through [iface: default] is operational now Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:36:59 np0005486557.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 13 20:36:59 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 13 20:36:59 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014057b7ad09412ab48c7a7c0fe4f6 port group 0 rel port 1 Oct 13 20:36:59 np0005486557.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Oct 13 20:36:59 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 13 20:36:59 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 13 20:36:59 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 13 20:36:59 np0005486557.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Oct 13 20:36:59 np0005486557.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 13 20:36:59 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 13 20:36:59 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:36:59 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 13 20:36:59 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 0f4f0307-c8c9-4af1-be3a-4f46c1368c28 Oct 13 20:36:59 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:36:59 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c4d8ab8f-ebdc-42bc-b570-9d2d263e1fe7 Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l cd9d765d-069e-4341-bf08-df66b8ac163e Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98604d51-9895-4f07-b3d3-a08fc4a35bd3 Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l af37ad94-dc94-44a6-8a32-7c1b5b5be733 Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l e3227df9-501e-4b5b-acc3-681936564f7e Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a1c1f852-8d52-4901-800e-b33172a0e4f8 Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1a82a36c-7758-4914-8e0c-f9018ae5044b Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 3bfc11ad-07ee-424e-920f-dad35cecf47d Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 4cce59b0-77c5-4dad-a6ff-dbd5c09f35c0 Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e0324ff8-3480-4d35-99ea-daf9571c3540 Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 8f0122ac-34c4-4d15-acc5-93484fad0038 Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 69fa7fef-96e4-4d44-8486-2a4af6d3fb4f Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 4cb648fd-5e9a-47f5-9ec6-140b3bbd1feb Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l d8d72cbb-7884-4288-a923-a2f4b3f2f9ae Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab/::1,3260. For complete SELinux messages run: sealert -l c2749b08-9578-4086-93b0-054c3456d33f Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab/::1,3260. For complete SELinux messages run: sealert -l 980bdd32-aa12-4eb5-8562-6464cbdc91fd Oct 13 20:36:59 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 604d6e2e-9fa7-4355-91ee-c7b4495bfdc6 Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l cd9d765d-069e-4341-bf08-df66b8ac163e Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l fa32b25d-c54a-42c1-b38e-320f7fc6feed Oct 13 20:37:00 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:37:00 np0005486557.novalocal sudo[89546]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:37:00 np0005486557.novalocal systemd[1]: Started Session c59 of User root. Oct 13 20:37:00 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:37:00 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:37:00 np0005486557.novalocal sudo[89546]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l abeaa7a7-c5c3-4970-8e26-0c8a2e7a6599 Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 6541765a-7f61-4f52-bbef-a7853ca3a7e9 Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 7ec1f69d-0708-44dc-9019-d0d8bb708df6 Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l f8329953-2681-49d9-a8b4-6df2e3230087 Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 43d0de0d-ec86-4f08-adf9-8a71d3eb2c42 Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 36536b09-adfd-4125-815e-2c70c2b4d347 Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 5fd86a9e-e9a7-4e5c-993f-1956adc88256 Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 7e3a70ec-6bdd-4627-ac74-e819fe9166b6 Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 1d193a89-62d1-48dc-84de-16a9f5773e2e Oct 13 20:37:00 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:37:01 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 1f5d636a-9518-4c9c-ad7d-612ab328ea12 Oct 13 20:37:01 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 13 20:37:01 np0005486557.novalocal sudo[89546]: pam_unix(sudo:session): session closed for user root Oct 13 20:37:01 np0005486557.novalocal systemd[1]: session-c59.scope: Deactivated successfully. Oct 13 20:37:01 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 37212ff8-4db6-416e-9993-ad02137f3835 Oct 13 20:37:01 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:37:01 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 08dfbcc6-b2fb-426f-8013-60d21de9ffa5 Oct 13 20:37:01 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:37:01 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 50860481-ab95-408c-b3ad-974ff6c0a043 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:37:02 np0005486557.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 13 20:37:02 np0005486557.novalocal kernel: GPT:229375 != 2097151 Oct 13 20:37:02 np0005486557.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 13 20:37:02 np0005486557.novalocal kernel: GPT:229375 != 2097151 Oct 13 20:37:02 np0005486557.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 13 20:37:02 np0005486557.novalocal kernel: sda: sda1 sda15 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l f8329953-2681-49d9-a8b4-6df2e3230087 Oct 13 20:37:02 np0005486557.novalocal sudo[89557]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Oct 13 20:37:02 np0005486557.novalocal systemd[1]: Started Session c60 of User root. Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:37:02 np0005486557.novalocal sudo[89557]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 43d0de0d-ec86-4f08-adf9-8a71d3eb2c42 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 36536b09-adfd-4125-815e-2c70c2b4d347 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 5fd86a9e-e9a7-4e5c-993f-1956adc88256 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 7e3a70ec-6bdd-4627-ac74-e819fe9166b6 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 1d193a89-62d1-48dc-84de-16a9f5773e2e Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:37:02 np0005486557.novalocal sudo[89557]: pam_unix(sudo:session): session closed for user root Oct 13 20:37:02 np0005486557.novalocal systemd[1]: session-c60.scope: Deactivated successfully. Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 3bfc11ad-07ee-424e-920f-dad35cecf47d Oct 13 20:37:02 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab/::1,3260. For complete SELinux messages run: sealert -l 980bdd32-aa12-4eb5-8562-6464cbdc91fd Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98604d51-9895-4f07-b3d3-a08fc4a35bd3 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l af37ad94-dc94-44a6-8a32-7c1b5b5be733 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l e3227df9-501e-4b5b-acc3-681936564f7e Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a1c1f852-8d52-4901-800e-b33172a0e4f8 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1a82a36c-7758-4914-8e0c-f9018ae5044b Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 604d6e2e-9fa7-4355-91ee-c7b4495bfdc6 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab/::1,3260. For complete SELinux messages run: sealert -l 6171c909-8414-431b-a1bc-edd3556db3b0 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 4cce59b0-77c5-4dad-a6ff-dbd5c09f35c0 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e0324ff8-3480-4d35-99ea-daf9571c3540 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l e6ac9743-6a1f-491e-bf0c-67074d0c8417 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 0f4f0307-c8c9-4af1-be3a-4f46c1368c28 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c4d8ab8f-ebdc-42bc-b570-9d2d263e1fe7 Oct 13 20:37:02 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l d629571f-4fb8-4a29-857b-a54b59f536b7 Oct 13 20:37:02 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:37:03 np0005486557.novalocal iscsid[70744]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab, portal: ::1,3260] through [iface: default] is shutdown. Oct 13 20:37:03 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 6541765a-7f61-4f52-bbef-a7853ca3a7e9 Oct 13 20:37:03 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:37:03 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 788a640e-4a41-4497-b364-c620a95d6055 Oct 13 20:37:03 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:03 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab. For complete SELinux messages run: sealert -l 8f0122ac-34c4-4d15-acc5-93484fad0038 Oct 13 20:37:03 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:03 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l c80bc617-57ba-456e-8eef-82dfc669a3c4 Oct 13 20:37:03 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:03 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 527df182-574e-4481-8bb2-fe424acccff9 Oct 13 20:37:03 np0005486557.novalocal sudo[89601]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab iqn.1994-05.com.redhat:e2594393a727 Oct 13 20:37:03 np0005486557.novalocal systemd[1]: Started Session c61 of User root. Oct 13 20:37:03 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:03 np0005486557.novalocal sudo[89601]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:37:03 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab. For complete SELinux messages run: sealert -l 1ad47321-dc36-4819-9943-f3c7b1051872 Oct 13 20:37:03 np0005486557.novalocal setroubleshoot[89102]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:37:03 np0005486557.novalocal sudo[89601]: pam_unix(sudo:session): session closed for user root Oct 13 20:37:03 np0005486557.novalocal systemd[1]: session-c61.scope: Deactivated successfully. Oct 13 20:37:03 np0005486557.novalocal sudo[89608]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:37:03 np0005486557.novalocal systemd[1]: Started Session c62 of User root. Oct 13 20:37:03 np0005486557.novalocal sudo[89608]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:37:04 np0005486557.novalocal sudo[89608]: pam_unix(sudo:session): session closed for user root Oct 13 20:37:04 np0005486557.novalocal systemd[1]: session-c62.scope: Deactivated successfully. Oct 13 20:37:04 np0005486557.novalocal sudo[89613]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 13 20:37:04 np0005486557.novalocal systemd[1]: Started Session c63 of User root. Oct 13 20:37:04 np0005486557.novalocal sudo[89613]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:37:04 np0005486557.novalocal sudo[89613]: pam_unix(sudo:session): session closed for user root Oct 13 20:37:04 np0005486557.novalocal systemd[1]: session-c63.scope: Deactivated successfully. Oct 13 20:37:04 np0005486557.novalocal sudo[89620]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-35bd05d1-7813-4dd9-b5db-f946862129ab Oct 13 20:37:04 np0005486557.novalocal systemd[1]: Started Session c64 of User root. Oct 13 20:37:04 np0005486557.novalocal sudo[89620]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:37:05 np0005486557.novalocal sudo[89620]: pam_unix(sudo:session): session closed for user root Oct 13 20:37:05 np0005486557.novalocal systemd[1]: session-c64.scope: Deactivated successfully. Oct 13 20:37:05 np0005486557.novalocal sudo[89625]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:37:05 np0005486557.novalocal systemd[1]: Started Session c65 of User root. Oct 13 20:37:05 np0005486557.novalocal sudo[89625]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:37:05 np0005486557.novalocal sudo[89625]: pam_unix(sudo:session): session closed for user root Oct 13 20:37:05 np0005486557.novalocal systemd[1]: session-c65.scope: Deactivated successfully. Oct 13 20:37:13 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully. Oct 13 20:37:13 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Consumed 1.445s CPU time. Oct 13 20:37:13 np0005486557.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 13 20:37:13 np0005486557.novalocal systemd[1]: setroubleshootd.service: Consumed 6.549s CPU time. Oct 13 20:37:29 np0005486557.novalocal sudo[89706]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:37:29 np0005486557.novalocal systemd[1]: Started Session c66 of User root. Oct 13 20:37:29 np0005486557.novalocal sudo[89706]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:37:29 np0005486557.novalocal sudo[89706]: pam_unix(sudo:session): session closed for user root Oct 13 20:37:29 np0005486557.novalocal systemd[1]: session-c66.scope: Deactivated successfully. Oct 13 20:37:29 np0005486557.novalocal sudo[89710]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:37:29 np0005486557.novalocal systemd[1]: Started Session c67 of User root. Oct 13 20:37:29 np0005486557.novalocal sudo[89710]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:37:30 np0005486557.novalocal sudo[89710]: pam_unix(sudo:session): session closed for user root Oct 13 20:37:30 np0005486557.novalocal systemd[1]: session-c67.scope: Deactivated successfully. Oct 13 20:37:30 np0005486557.novalocal sudo[89714]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:37:30 np0005486557.novalocal systemd[1]: Started Session c68 of User root. Oct 13 20:37:30 np0005486557.novalocal sudo[89714]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:37:30 np0005486557.novalocal sudo[89714]: pam_unix(sudo:session): session closed for user root Oct 13 20:37:30 np0005486557.novalocal systemd[1]: session-c68.scope: Deactivated successfully. Oct 13 20:37:30 np0005486557.novalocal sudo[89718]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:37:30 np0005486557.novalocal systemd[1]: Started Session c69 of User root. Oct 13 20:37:30 np0005486557.novalocal sudo[89718]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:37:31 np0005486557.novalocal sudo[89718]: pam_unix(sudo:session): session closed for user root Oct 13 20:37:31 np0005486557.novalocal systemd[1]: session-c69.scope: Deactivated successfully. Oct 13 20:37:31 np0005486557.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 13 20:37:31 np0005486557.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 13 20:37:32 np0005486557.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service. Oct 13 20:37:34 np0005486557.novalocal setroubleshoot[89724]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/neutron/(null). For complete SELinux messages run: sealert -l b534159e-5915-406b-9e37-05b2e1e835df Oct 13 20:37:34 np0005486557.novalocal setroubleshoot[89724]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:37:34 np0005486557.novalocal setroubleshoot[89724]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/neutron/(null). For complete SELinux messages run: sealert -l f23fe74a-5a5e-44c3-ab4e-b32174c8c117 Oct 13 20:37:34 np0005486557.novalocal setroubleshoot[89724]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:37:34 np0005486557.novalocal setroubleshoot[89724]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 503adfd0-3402-49d1-a6d7-a8d950cb9c44 Oct 13 20:37:34 np0005486557.novalocal setroubleshoot[89724]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:37:34 np0005486557.novalocal setroubleshoot[89724]: failed to retrieve rpm info for path '/var/lib/neutron/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66': Oct 13 20:37:34 np0005486557.novalocal setroubleshoot[89724]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/neutron/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l 56cd951d-e8e5-4605-a18e-3a943274cd29 Oct 13 20:37:34 np0005486557.novalocal setroubleshoot[89724]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/neutron/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:37:34 np0005486557.novalocal setroubleshoot[89724]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l f3dd16bf-bc8a-42bd-a191-3dcad774dbcc Oct 13 20:37:34 np0005486557.novalocal setroubleshoot[89724]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:37:34 np0005486557.novalocal setroubleshoot[89724]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l 2aee6ba2-2dcc-41e1-b9bd-72b7b8a0c71e Oct 13 20:37:34 np0005486557.novalocal setroubleshoot[89724]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:37:36 np0005486557.novalocal setroubleshoot[89724]: SELinux is preventing /usr/sbin/httpd from read access on the file efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l 8a88b625-9cef-4b1f-b53c-5990a9fd6dd1 Oct 13 20:37:36 np0005486557.novalocal setroubleshoot[89724]: SELinux is preventing /usr/sbin/httpd from read access on the file efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:37:46 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Deactivated successfully. Oct 13 20:37:46 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Consumed 1.317s CPU time. Oct 13 20:37:46 np0005486557.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 13 20:37:46 np0005486557.novalocal systemd[1]: setroubleshootd.service: Consumed 1.478s CPU time. Oct 13 20:38:02 np0005486557.novalocal PackageKit[2925]: daemon quit Oct 13 20:38:02 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:38:02 np0005486557.novalocal systemd[1]: packagekit.service: Deactivated successfully. Oct 13 20:38:02 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:38:02 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:38:29 np0005486557.novalocal sudo[89906]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:38:29 np0005486557.novalocal systemd[1]: Started Session c70 of User root. Oct 13 20:38:29 np0005486557.novalocal sudo[89906]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:38:29 np0005486557.novalocal sudo[89906]: pam_unix(sudo:session): session closed for user root Oct 13 20:38:29 np0005486557.novalocal systemd[1]: session-c70.scope: Deactivated successfully. Oct 13 20:38:29 np0005486557.novalocal sudo[89910]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:38:29 np0005486557.novalocal systemd[1]: Started Session c71 of User root. Oct 13 20:38:29 np0005486557.novalocal sudo[89910]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:38:30 np0005486557.novalocal sudo[89910]: pam_unix(sudo:session): session closed for user root Oct 13 20:38:30 np0005486557.novalocal systemd[1]: session-c71.scope: Deactivated successfully. Oct 13 20:38:30 np0005486557.novalocal sudo[89914]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:38:30 np0005486557.novalocal systemd[1]: Started Session c72 of User root. Oct 13 20:38:30 np0005486557.novalocal sudo[89914]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:38:30 np0005486557.novalocal sudo[89914]: pam_unix(sudo:session): session closed for user root Oct 13 20:38:30 np0005486557.novalocal systemd[1]: session-c72.scope: Deactivated successfully. Oct 13 20:38:30 np0005486557.novalocal sudo[89918]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:38:30 np0005486557.novalocal systemd[1]: Started Session c73 of User root. Oct 13 20:38:30 np0005486557.novalocal sudo[89918]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:38:31 np0005486557.novalocal sudo[89918]: pam_unix(sudo:session): session closed for user root Oct 13 20:38:31 np0005486557.novalocal systemd[1]: session-c73.scope: Deactivated successfully. Oct 13 20:39:03 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:39:03 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:39:03 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:39:10 np0005486557.novalocal systemd[85396]: Created slice User Background Tasks Slice. Oct 13 20:39:10 np0005486557.novalocal systemd[85396]: Starting Cleanup of User's Temporary Files and Directories... Oct 13 20:39:10 np0005486557.novalocal systemd[85396]: Finished Cleanup of User's Temporary Files and Directories. Oct 13 20:39:26 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:39:26 np0005486557.novalocal systemd-rc-local-generator[90090]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:39:26 np0005486557.novalocal systemd-sysv-generator[90095]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:39:26 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:39:26 np0005486557.novalocal systemd[1]: Starting OpenStack Nova Conductor Server... Oct 13 20:39:28 np0005486557.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 13 20:39:29 np0005486557.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 13 20:39:29 np0005486557.novalocal sudo[90106]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:39:29 np0005486557.novalocal systemd[1]: Started Session c74 of User root. Oct 13 20:39:29 np0005486557.novalocal sudo[90106]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:39:29 np0005486557.novalocal sudo[90106]: pam_unix(sudo:session): session closed for user root Oct 13 20:39:29 np0005486557.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service. Oct 13 20:39:29 np0005486557.novalocal systemd[1]: session-c74.scope: Deactivated successfully. Oct 13 20:39:29 np0005486557.novalocal sudo[90122]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:39:29 np0005486557.novalocal systemd[1]: Started Session c75 of User root. Oct 13 20:39:29 np0005486557.novalocal sudo[90122]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:39:30 np0005486557.novalocal sudo[90122]: pam_unix(sudo:session): session closed for user root Oct 13 20:39:30 np0005486557.novalocal systemd[1]: session-c75.scope: Deactivated successfully. Oct 13 20:39:30 np0005486557.novalocal sudo[90127]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:39:30 np0005486557.novalocal systemd[1]: Started Session c76 of User root. Oct 13 20:39:30 np0005486557.novalocal sudo[90127]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:39:30 np0005486557.novalocal systemd[1]: Started OpenStack Nova Conductor Server. Oct 13 20:39:30 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:39:30 np0005486557.novalocal sudo[90127]: pam_unix(sudo:session): session closed for user root Oct 13 20:39:30 np0005486557.novalocal systemd-sysv-generator[90168]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:39:30 np0005486557.novalocal systemd-rc-local-generator[90165]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:39:30 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:39:30 np0005486557.novalocal systemd[1]: session-c76.scope: Deactivated successfully. Oct 13 20:39:30 np0005486557.novalocal sudo[90142]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:39:30 np0005486557.novalocal systemd[1]: Started Session c77 of User root. Oct 13 20:39:30 np0005486557.novalocal sudo[90142]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:39:30 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:39:31 np0005486557.novalocal systemd-rc-local-generator[90194]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:39:31 np0005486557.novalocal systemd-sysv-generator[90197]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:39:31 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 321c4f53-a86a-4993-af84-489b05cdac17 Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:31 np0005486557.novalocal sudo[90142]: pam_unix(sudo:session): session closed for user root Oct 13 20:39:31 np0005486557.novalocal systemd[1]: session-c77.scope: Deactivated successfully. Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 51b37ce3-8fa7-458d-bc9e-47f7e95a0b19 Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l b50546c9-d40d-4fa5-bd1f-6b66a86565f7 Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l a29dae8d-33a7-4ee5-bbee-c9100e46d28b Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 8b425807-cc63-4c1a-ad3f-a79409e6fd3e Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l fb297912-4d00-47fc-86f0-63bf135f733f Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 3b659b20-e6a4-4d4d-85be-fbfd4ef60d7c Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 7097915a-c570-4095-8cb3-bb17f5e65e55 Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:31 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l bc6f584a-b77e-41a6-afa4-6cbbdcaea4c9 Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l c765f37e-d4a3-4e27-ba6d-680c6ff48e7a Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l d16e6890-88cd-4266-847c-6e208d1204c4 Oct 13 20:39:31 np0005486557.novalocal systemd-rc-local-generator[90240]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:39:31 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:31 np0005486557.novalocal systemd-sysv-generator[90243]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:39:31 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:39:31 np0005486557.novalocal systemd[1]: Starting OpenStack Nova Compute Server... Oct 13 20:39:36 np0005486557.novalocal systemd[1]: Started OpenStack Nova Compute Server. Oct 13 20:39:36 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:39:36 np0005486557.novalocal systemd-rc-local-generator[90283]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:39:36 np0005486557.novalocal systemd-sysv-generator[90286]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:39:37 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:39:37 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:39:37 np0005486557.novalocal systemd-rc-local-generator[90314]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:39:37 np0005486557.novalocal systemd-sysv-generator[90319]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:39:37 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:39:37 np0005486557.novalocal systemd[1]: Starting libvirt QEMU daemon... Oct 13 20:39:37 np0005486557.novalocal systemd[1]: Started libvirt QEMU daemon. Oct 13 20:39:37 np0005486557.novalocal nova-compute[90250]: libvirt: error : internal error: could not initialize domain event timer Oct 13 20:39:37 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:39:38 np0005486557.novalocal systemd-sysv-generator[90405]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:39:38 np0005486557.novalocal systemd-rc-local-generator[90402]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:39:38 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:39:38 np0005486557.novalocal systemd[1]: Starting OpenStack Nova Scheduler Server... Oct 13 20:39:38 np0005486557.novalocal systemd[1]: Listening on libvirt nodedev daemon admin socket. Oct 13 20:39:38 np0005486557.novalocal systemd[1]: Listening on libvirt nodedev daemon read-only socket. Oct 13 20:39:38 np0005486557.novalocal systemd[1]: Starting libvirt nodedev daemon... Oct 13 20:39:39 np0005486557.novalocal systemd[1]: Started libvirt nodedev daemon. Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 321c4f53-a86a-4993-af84-489b05cdac17 Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 51b37ce3-8fa7-458d-bc9e-47f7e95a0b19 Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l b50546c9-d40d-4fa5-bd1f-6b66a86565f7 Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l a29dae8d-33a7-4ee5-bbee-c9100e46d28b Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 8b425807-cc63-4c1a-ad3f-a79409e6fd3e Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l fb297912-4d00-47fc-86f0-63bf135f733f Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 3b659b20-e6a4-4d4d-85be-fbfd4ef60d7c Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 7097915a-c570-4095-8cb3-bb17f5e65e55 Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l bc6f584a-b77e-41a6-afa4-6cbbdcaea4c9 Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l c765f37e-d4a3-4e27-ba6d-680c6ff48e7a Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l d16e6890-88cd-4266-847c-6e208d1204c4 Oct 13 20:39:40 np0005486557.novalocal setroubleshoot[90105]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 13 20:39:40 np0005486557.novalocal systemd[1]: Started OpenStack Nova Scheduler Server. Oct 13 20:39:40 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:39:40 np0005486557.novalocal systemd-rc-local-generator[90477]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:39:40 np0005486557.novalocal systemd-sysv-generator[90482]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:39:40 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:39:41 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:39:41 np0005486557.novalocal systemd-rc-local-generator[90509]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:39:41 np0005486557.novalocal systemd-sysv-generator[90514]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:39:41 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:39:50 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Deactivated successfully. Oct 13 20:39:50 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Consumed 1.277s CPU time. Oct 13 20:39:50 np0005486557.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 13 20:39:50 np0005486557.novalocal systemd[1]: setroubleshootd.service: Consumed 2.094s CPU time. Oct 13 20:40:03 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:40:03 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:40:03 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:40:16 np0005486557.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 13 20:40:16 np0005486557.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 13 20:40:17 np0005486557.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service. Oct 13 20:40:18 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l a1e0244b-f4d5-4bb0-8f2c-7b142d8b368d Oct 13 20:40:18 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:40:18 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l f0e95fac-1d52-4374-87fa-77dcea574628 Oct 13 20:40:18 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:40:18 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). For complete SELinux messages run: sealert -l 729f9200-a942-4e21-b540-c36cfe60e712 Oct 13 20:40:18 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:40:18 np0005486557.novalocal setroubleshoot[90585]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66': Oct 13 20:40:18 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l 7211f7df-2207-4920-83db-940cd978dfc4 Oct 13 20:40:18 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:40:18 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l f4792b54-fb0b-446c-9944-34c7d1e84606 Oct 13 20:40:18 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:40:18 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l 1a000bc4-c540-4ea1-99fa-5a371e8b716a Oct 13 20:40:18 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:40:18 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l c2e87e0d-45a2-4180-b659-f74a8298754a Oct 13 20:40:18 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 13 20:40:19 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 81afd4f9-b669-455e-89d4-1a2c2f3975b0 Oct 13 20:40:19 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 13 20:40:19 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 23a76d90-727a-47e5-898a-626fc7b2234a Oct 13 20:40:19 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 13 20:40:19 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from read access on the file efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l 8519023a-d75f-418a-96e8-55aefb5b15c9 Oct 13 20:40:19 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from read access on the file efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:40:19 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l b9fb7938-b6dc-4d98-82ea-f91ac080f520 Oct 13 20:40:19 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:40:19 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l f4792b54-fb0b-446c-9944-34c7d1e84606 Oct 13 20:40:19 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:40:19 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l 1a000bc4-c540-4ea1-99fa-5a371e8b716a Oct 13 20:40:19 np0005486557.novalocal setroubleshoot[90585]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:40:27 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:40:27 np0005486557.novalocal systemd-sysv-generator[90651]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:40:27 np0005486557.novalocal systemd-rc-local-generator[90646]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:40:27 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:40:27 np0005486557.novalocal systemd[1]: Started OpenStack Octavia Worker service. Oct 13 20:40:27 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:40:27 np0005486557.novalocal systemd-sysv-generator[90685]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:40:27 np0005486557.novalocal systemd-rc-local-generator[90682]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:40:28 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:40:28 np0005486557.novalocal systemd[1]: Reloading. Oct 13 20:40:28 np0005486557.novalocal systemd-rc-local-generator[90709]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 13 20:40:28 np0005486557.novalocal systemd-sysv-generator[90712]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 13 20:40:28 np0005486557.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 13 20:40:29 np0005486557.novalocal sudo[90723]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:40:29 np0005486557.novalocal systemd[1]: Started Session c78 of User root. Oct 13 20:40:29 np0005486557.novalocal sudo[90723]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:40:29 np0005486557.novalocal sudo[90723]: pam_unix(sudo:session): session closed for user root Oct 13 20:40:29 np0005486557.novalocal systemd[1]: session-c78.scope: Deactivated successfully. Oct 13 20:40:29 np0005486557.novalocal sudo[90727]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:40:29 np0005486557.novalocal systemd[1]: Started Session c79 of User root. Oct 13 20:40:29 np0005486557.novalocal sudo[90727]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:40:30 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Deactivated successfully. Oct 13 20:40:30 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Consumed 1.235s CPU time. Oct 13 20:40:30 np0005486557.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 13 20:40:30 np0005486557.novalocal systemd[1]: setroubleshootd.service: Consumed 1.668s CPU time. Oct 13 20:40:30 np0005486557.novalocal sudo[90727]: pam_unix(sudo:session): session closed for user root Oct 13 20:40:30 np0005486557.novalocal systemd[1]: session-c79.scope: Deactivated successfully. Oct 13 20:40:30 np0005486557.novalocal sudo[90731]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:40:30 np0005486557.novalocal systemd[1]: Started Session c80 of User root. Oct 13 20:40:30 np0005486557.novalocal sudo[90731]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:40:30 np0005486557.novalocal sudo[90731]: pam_unix(sudo:session): session closed for user root Oct 13 20:40:30 np0005486557.novalocal systemd[1]: session-c80.scope: Deactivated successfully. Oct 13 20:40:30 np0005486557.novalocal sudo[90738]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:40:30 np0005486557.novalocal systemd[1]: Started Session c81 of User root. Oct 13 20:40:30 np0005486557.novalocal sudo[90738]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:40:30 np0005486557.novalocal sudo[90738]: pam_unix(sudo:session): session closed for user root Oct 13 20:40:30 np0005486557.novalocal systemd[1]: session-c81.scope: Deactivated successfully. Oct 13 20:40:45 np0005486557.novalocal runuser[90908]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:40:46 np0005486557.novalocal runuser[90908]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:40:46 np0005486557.novalocal runuser[90961]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:40:47 np0005486557.novalocal runuser[90961]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:40:47 np0005486557.novalocal runuser[91015]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:40:47 np0005486557.novalocal runuser[91015]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:00 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:41:00 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:41:00 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:41:13 np0005486557.novalocal sudo[91406]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get connection . inactivity_probe Oct 13 20:41:13 np0005486557.novalocal sudo[91406]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:41:13 np0005486557.novalocal sudo[91406]: pam_unix(sudo:session): session closed for user root Oct 13 20:41:13 np0005486557.novalocal sudo[91410]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get connection . inactivity_probe Oct 13 20:41:13 np0005486557.novalocal sudo[91410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:41:13 np0005486557.novalocal sudo[91410]: pam_unix(sudo:session): session closed for user root Oct 13 20:41:29 np0005486557.novalocal sudo[91460]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:41:29 np0005486557.novalocal systemd[1]: Started Session c82 of User root. Oct 13 20:41:29 np0005486557.novalocal sudo[91460]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:41:29 np0005486557.novalocal sudo[91460]: pam_unix(sudo:session): session closed for user root Oct 13 20:41:29 np0005486557.novalocal systemd[1]: session-c82.scope: Deactivated successfully. Oct 13 20:41:29 np0005486557.novalocal sudo[91464]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:41:29 np0005486557.novalocal systemd[1]: Started Session c83 of User root. Oct 13 20:41:30 np0005486557.novalocal sudo[91464]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:41:30 np0005486557.novalocal sudo[91464]: pam_unix(sudo:session): session closed for user root Oct 13 20:41:30 np0005486557.novalocal systemd[1]: session-c83.scope: Deactivated successfully. Oct 13 20:41:30 np0005486557.novalocal sudo[91468]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:41:30 np0005486557.novalocal systemd[1]: Started Session c84 of User root. Oct 13 20:41:30 np0005486557.novalocal sudo[91468]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:41:30 np0005486557.novalocal sudo[91468]: pam_unix(sudo:session): session closed for user root Oct 13 20:41:30 np0005486557.novalocal systemd[1]: session-c84.scope: Deactivated successfully. Oct 13 20:41:30 np0005486557.novalocal sudo[91472]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:41:30 np0005486557.novalocal systemd[1]: Started Session c85 of User root. Oct 13 20:41:30 np0005486557.novalocal sudo[91472]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:41:31 np0005486557.novalocal sudo[91472]: pam_unix(sudo:session): session closed for user root Oct 13 20:41:31 np0005486557.novalocal systemd[1]: session-c85.scope: Deactivated successfully. Oct 13 20:41:36 np0005486557.novalocal crontab[91526]: (root) LIST (root) Oct 13 20:41:36 np0005486557.novalocal crontab[91527]: (root) LIST (keystone) Oct 13 20:41:36 np0005486557.novalocal crontab[91528]: (root) LIST (cinder) Oct 13 20:41:36 np0005486557.novalocal crontab[91529]: (root) LIST (glance) Oct 13 20:41:36 np0005486557.novalocal crontab[91530]: (root) LIST (nova) Oct 13 20:41:36 np0005486557.novalocal crontab[91531]: (root) LIST (manila) Oct 13 20:41:39 np0005486557.novalocal runuser[91541]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:40 np0005486557.novalocal runuser[91541]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:40 np0005486557.novalocal runuser[91595]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:41 np0005486557.novalocal runuser[91595]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:41 np0005486557.novalocal runuser[91649]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:41 np0005486557.novalocal runuser[91649]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:41 np0005486557.novalocal runuser[91703]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:42 np0005486557.novalocal runuser[91703]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:42 np0005486557.novalocal runuser[91755]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:43 np0005486557.novalocal runuser[91755]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:43 np0005486557.novalocal runuser[91807]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:43 np0005486557.novalocal runuser[91807]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:44 np0005486557.novalocal runuser[91859]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:44 np0005486557.novalocal runuser[91859]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:44 np0005486557.novalocal runuser[91915]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:45 np0005486557.novalocal runuser[91915]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:45 np0005486557.novalocal runuser[91967]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:46 np0005486557.novalocal runuser[91967]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:46 np0005486557.novalocal runuser[92019]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:46 np0005486557.novalocal runuser[92019]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:47 np0005486557.novalocal runuser[92081]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:48 np0005486557.novalocal runuser[92081]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:48 np0005486557.novalocal runuser[92135]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:49 np0005486557.novalocal runuser[92135]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:49 np0005486557.novalocal runuser[92189]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:49 np0005486557.novalocal runuser[92189]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:49 np0005486557.novalocal runuser[92241]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:50 np0005486557.novalocal runuser[92241]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:51 np0005486557.novalocal runuser[92307]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:52 np0005486557.novalocal runuser[92307]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:52 np0005486557.novalocal runuser[92359]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:52 np0005486557.novalocal runuser[92359]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:54 np0005486557.novalocal virtqemud[90345]: libvirt version: 10.10.0, package: 15.el9 (builder@centos.org, 2025-08-18-13:22:20, ) Oct 13 20:41:54 np0005486557.novalocal virtqemud[90345]: hostname: np0005486557.novalocal Oct 13 20:41:54 np0005486557.novalocal virtqemud[90345]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Oct 13 20:41:54 np0005486557.novalocal virtqemud[90345]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Oct 13 20:41:55 np0005486557.novalocal runuser[92445]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:55 np0005486557.novalocal runuser[92445]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:55 np0005486557.novalocal runuser[92497]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:56 np0005486557.novalocal runuser[92497]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:57 np0005486557.novalocal runuser[92558]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:57 np0005486557.novalocal runuser[92558]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:41:57 np0005486557.novalocal runuser[92610]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 13 20:41:58 np0005486557.novalocal runuser[92610]: pam_unix(runuser:session): session closed for user rabbitmq Oct 13 20:42:03 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:42:03 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:42:03 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:42:29 np0005486557.novalocal sudo[92770]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:42:29 np0005486557.novalocal systemd[1]: Started Session c86 of User root. Oct 13 20:42:29 np0005486557.novalocal sudo[92770]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:42:29 np0005486557.novalocal sudo[92770]: pam_unix(sudo:session): session closed for user root Oct 13 20:42:29 np0005486557.novalocal systemd[1]: session-c86.scope: Deactivated successfully. Oct 13 20:42:29 np0005486557.novalocal sudo[92776]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:42:29 np0005486557.novalocal systemd[1]: Started Session c87 of User root. Oct 13 20:42:29 np0005486557.novalocal sudo[92776]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:42:30 np0005486557.novalocal sudo[92776]: pam_unix(sudo:session): session closed for user root Oct 13 20:42:30 np0005486557.novalocal systemd[1]: session-c87.scope: Deactivated successfully. Oct 13 20:42:30 np0005486557.novalocal sudo[92780]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:42:30 np0005486557.novalocal systemd[1]: Started Session c88 of User root. Oct 13 20:42:30 np0005486557.novalocal sudo[92780]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:42:30 np0005486557.novalocal sudo[92780]: pam_unix(sudo:session): session closed for user root Oct 13 20:42:30 np0005486557.novalocal systemd[1]: session-c88.scope: Deactivated successfully. Oct 13 20:42:30 np0005486557.novalocal sudo[92784]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:42:30 np0005486557.novalocal systemd[1]: Started Session c89 of User root. Oct 13 20:42:30 np0005486557.novalocal sudo[92784]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:42:31 np0005486557.novalocal sudo[92784]: pam_unix(sudo:session): session closed for user root Oct 13 20:42:31 np0005486557.novalocal systemd[1]: session-c89.scope: Deactivated successfully. Oct 13 20:43:03 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:43:03 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:43:03 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:43:29 np0005486557.novalocal sudo[92950]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:43:29 np0005486557.novalocal systemd[1]: Started Session c90 of User root. Oct 13 20:43:29 np0005486557.novalocal sudo[92950]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:43:29 np0005486557.novalocal sudo[92950]: pam_unix(sudo:session): session closed for user root Oct 13 20:43:29 np0005486557.novalocal systemd[1]: session-c90.scope: Deactivated successfully. Oct 13 20:43:29 np0005486557.novalocal sudo[92954]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:43:29 np0005486557.novalocal systemd[1]: Started Session c91 of User root. Oct 13 20:43:29 np0005486557.novalocal sudo[92954]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:43:30 np0005486557.novalocal sudo[92954]: pam_unix(sudo:session): session closed for user root Oct 13 20:43:30 np0005486557.novalocal systemd[1]: session-c91.scope: Deactivated successfully. Oct 13 20:43:30 np0005486557.novalocal sudo[92958]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:43:30 np0005486557.novalocal systemd[1]: Started Session c92 of User root. Oct 13 20:43:30 np0005486557.novalocal sudo[92958]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:43:30 np0005486557.novalocal sudo[92958]: pam_unix(sudo:session): session closed for user root Oct 13 20:43:30 np0005486557.novalocal systemd[1]: session-c92.scope: Deactivated successfully. Oct 13 20:43:30 np0005486557.novalocal sudo[92962]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:43:30 np0005486557.novalocal systemd[1]: Started Session c93 of User root. Oct 13 20:43:30 np0005486557.novalocal sudo[92962]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:43:31 np0005486557.novalocal sudo[92962]: pam_unix(sudo:session): session closed for user root Oct 13 20:43:31 np0005486557.novalocal systemd[1]: session-c93.scope: Deactivated successfully. Oct 13 20:43:55 np0005486557.novalocal sudo[93038]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmp64k9ixpq/privsep.sock Oct 13 20:43:55 np0005486557.novalocal systemd[1]: Started Session c94 of User root. Oct 13 20:43:55 np0005486557.novalocal sudo[93038]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:43:55 np0005486557.novalocal sudo[93038]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:02 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:44:02 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:44:02 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:44:22 np0005486557.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 13 20:44:22 np0005486557.novalocal sudo[93134]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 Oct 13 20:44:22 np0005486557.novalocal systemd[1]: Started Session c95 of User root. Oct 13 20:44:22 np0005486557.novalocal sudo[93134]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:44:23 np0005486557.novalocal sudo[93134]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:23 np0005486557.novalocal systemd[1]: session-c95.scope: Deactivated successfully. Oct 13 20:44:23 np0005486557.novalocal sudo[93142]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 2FsxHXR3rd2tm8XU8p8r d9zDHvmw89qcyakD False -p3260 -a::1 Oct 13 20:44:23 np0005486557.novalocal systemd[1]: Started Session c96 of User root. Oct 13 20:44:23 np0005486557.novalocal sudo[93142]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:44:23 np0005486557.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 13 20:44:23 np0005486557.novalocal sudo[93142]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:23 np0005486557.novalocal systemd[1]: session-c96.scope: Deactivated successfully. Oct 13 20:44:23 np0005486557.novalocal sudo[93152]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 13 20:44:23 np0005486557.novalocal systemd[1]: Started Session c97 of User root. Oct 13 20:44:23 np0005486557.novalocal sudo[93152]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:44:23 np0005486557.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service. Oct 13 20:44:24 np0005486557.novalocal sudo[93152]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:24 np0005486557.novalocal systemd[1]: session-c97.scope: Deactivated successfully. Oct 13 20:44:24 np0005486557.novalocal sudo[93169]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:44:24 np0005486557.novalocal systemd[1]: Started Session c98 of User root. Oct 13 20:44:24 np0005486557.novalocal sudo[93169]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:44:24 np0005486557.novalocal sudo[93169]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:24 np0005486557.novalocal systemd[1]: session-c98.scope: Deactivated successfully. Oct 13 20:44:24 np0005486557.novalocal sudo[93176]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 2FsxHXR3rd2tm8XU8p8r d9zDHvmw89qcyakD iqn.1994-05.com.redhat:e2594393a727 Oct 13 20:44:24 np0005486557.novalocal systemd[1]: Started Session c99 of User root. Oct 13 20:44:24 np0005486557.novalocal sudo[93176]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 4c3e70c9-11f3-449e-ab37-1cb0822c7c8d Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal sudo[93176]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:25 np0005486557.novalocal systemd[1]: session-c99.scope: Deactivated successfully. Oct 13 20:44:25 np0005486557.novalocal sudo[93185]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:44:25 np0005486557.novalocal systemd[1]: Started Session c100 of User root. Oct 13 20:44:25 np0005486557.novalocal sudo[93185]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l dbcf3231-5d81-4be2-8584-4914ed086677 Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: failed to retrieve rpm info for path '/dev/vda1': Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l ac0ce202-8235-4e41-8f78-01d1c1666383 Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l d629571f-4fb8-4a29-857b-a54b59f536b7 Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8de0bc99-c435-4f60-89c3-4e83afeb53ec Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 673a1ceb-f787-4126-bcbc-40873053bee6 Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l adaf87bb-dc46-4409-9bbb-72c9a2a59e79 Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 69d5cfc0-ba12-4d61-b253-0f70792b8b8c Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l dc8a8709-c3cc-4f8a-b528-cc56fae73525 Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l bc43eed9-46f6-475e-983a-c5fdde4e5077 Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-rtCpeQ. For complete SELinux messages run: sealert -l cf361f30-d107-40d5-a9d3-94e40b72be02 Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-rtCpeQ. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-rtCpeQ file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-rtCpeQ. For complete SELinux messages run: sealert -l 077347e3-e8a6-4ab3-9c72-a5071a7ba3d0 Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-rtCpeQ. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-rtCpeQ file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 52e671fc-2db7-456a-81d6-0a89403f803f Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l f59f5a6a-a099-48e6-8e29-050304c42951 Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l ab4f249f-36ef-4237-82ed-41cb1ba03b8c Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 8bfa59e7-18bb-4420-bfd8-fc79a1bb695d Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 831ed3b9-677c-44df-bfd9-a214f3dfa97b Oct 13 20:44:25 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:25 np0005486557.novalocal sudo[93185]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:25 np0005486557.novalocal systemd[1]: session-c100.scope: Deactivated successfully. Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l e6ac9743-6a1f-491e-bf0c-67074d0c8417 Oct 13 20:44:26 np0005486557.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 13 20:44:26 np0005486557.novalocal iscsid[70744]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856, portal: ::1,3260] through [iface: default] is operational now Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:44:26 np0005486557.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 13 20:44:26 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 13 20:44:26 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014055f6b61cd795c4dc598ca13530 port group 0 rel port 1 Oct 13 20:44:26 np0005486557.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Oct 13 20:44:26 np0005486557.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Oct 13 20:44:26 np0005486557.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Oct 13 20:44:26 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 13 20:44:26 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 13 20:44:26 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 13 20:44:26 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 13 20:44:26 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:44:26 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 13 20:44:26 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 13 20:44:26 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 0f4f0307-c8c9-4af1-be3a-4f46c1368c28 Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:44:26 np0005486557.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 13 20:44:26 np0005486557.novalocal kernel: GPT:229375 != 2097151 Oct 13 20:44:26 np0005486557.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 13 20:44:26 np0005486557.novalocal kernel: GPT:229375 != 2097151 Oct 13 20:44:26 np0005486557.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 13 20:44:26 np0005486557.novalocal kernel: sda: sda1 sda15 Oct 13 20:44:26 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c4d8ab8f-ebdc-42bc-b570-9d2d263e1fe7 Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 8c62f848-5fe9-4e74-94b9-1d238b0ca82c Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98604d51-9895-4f07-b3d3-a08fc4a35bd3 Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l af37ad94-dc94-44a6-8a32-7c1b5b5be733 Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l e3227df9-501e-4b5b-acc3-681936564f7e Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a1c1f852-8d52-4901-800e-b33172a0e4f8 Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1a82a36c-7758-4914-8e0c-f9018ae5044b Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 3bfc11ad-07ee-424e-920f-dad35cecf47d Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 4cce59b0-77c5-4dad-a6ff-dbd5c09f35c0 Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e0324ff8-3480-4d35-99ea-daf9571c3540 Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 8f0122ac-34c4-4d15-acc5-93484fad0038 Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 20b9d5fc-ffa8-459b-87e9-6c738988bfeb Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l e5c53959-fe67-4ad5-bbc4-03e1df109faa Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 49072790-8997-477e-8c10-15511f21cb33 Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. For complete SELinux messages run: sealert -l 305ddb2e-563b-43df-a7a5-9b042e674240 Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. For complete SELinux messages run: sealert -l 980bdd32-aa12-4eb5-8562-6464cbdc91fd Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 604d6e2e-9fa7-4355-91ee-c7b4495bfdc6 Oct 13 20:44:26 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:27 np0005486557.novalocal sudo[93242]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Oct 13 20:44:27 np0005486557.novalocal systemd[1]: Started Session c101 of User root. Oct 13 20:44:27 np0005486557.novalocal sudo[93242]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 9662081d-dd3c-4214-8670-f34d9c02ed59 Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l dbac7ea3-d717-4fbb-af00-c1da53023ea1 Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 6541765a-7f61-4f52-bbef-a7853ca3a7e9 Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: failed to retrieve rpm info for path '/dev/sda': Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l ac0ce202-8235-4e41-8f78-01d1c1666383 Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 9e14bd2c-1c7f-44b7-b379-0ef74a1053b3 Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l f8941418-7909-4bb5-ac70-2036c6f6f8e0 Oct 13 20:44:27 np0005486557.novalocal sudo[93242]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:27 np0005486557.novalocal systemd[1]: session-c101.scope: Deactivated successfully. Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 68e4d091-746c-4a47-9b13-cdf9fb352c0a Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 69ef7c6c-1664-4ae2-81a5-9eeddd480dfc Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 6ba4dc6f-a508-4a65-97e6-29609aef50ea Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:44:27 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 59e09ee9-9ede-4ee6-a793-af1b3a45be3d Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 8e7b9eb5-00af-4e2b-a5a0-0fa395ab283e Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l d629571f-4fb8-4a29-857b-a54b59f536b7 Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8de0bc99-c435-4f60-89c3-4e83afeb53ec Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 673a1ceb-f787-4126-bcbc-40873053bee6 Oct 13 20:44:28 np0005486557.novalocal sudo[93257]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Oct 13 20:44:28 np0005486557.novalocal systemd[1]: Started Session c102 of User root. Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:44:28 np0005486557.novalocal sudo[93257]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 9e14bd2c-1c7f-44b7-b379-0ef74a1053b3 Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l f8941418-7909-4bb5-ac70-2036c6f6f8e0 Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 68e4d091-746c-4a47-9b13-cdf9fb352c0a Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 69ef7c6c-1664-4ae2-81a5-9eeddd480dfc Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 6ba4dc6f-a508-4a65-97e6-29609aef50ea Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 59e09ee9-9ede-4ee6-a793-af1b3a45be3d Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:44:28 np0005486557.novalocal sudo[93257]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:28 np0005486557.novalocal systemd[1]: session-c102.scope: Deactivated successfully. Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 3bfc11ad-07ee-424e-920f-dad35cecf47d Oct 13 20:44:28 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. For complete SELinux messages run: sealert -l 980bdd32-aa12-4eb5-8562-6464cbdc91fd Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98604d51-9895-4f07-b3d3-a08fc4a35bd3 Oct 13 20:44:29 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l af37ad94-dc94-44a6-8a32-7c1b5b5be733 Oct 13 20:44:29 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l e3227df9-501e-4b5b-acc3-681936564f7e Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal iscsid[70744]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856, portal: ::1,3260] through [iface: default] is shutdown. Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a1c1f852-8d52-4901-800e-b33172a0e4f8 Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1a82a36c-7758-4914-8e0c-f9018ae5044b Oct 13 20:44:29 np0005486557.novalocal sudo[93302]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 iqn.1994-05.com.redhat:e2594393a727 Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal systemd[1]: Started Session c103 of User root. Oct 13 20:44:29 np0005486557.novalocal sudo[93302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 604d6e2e-9fa7-4355-91ee-c7b4495bfdc6 Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. For complete SELinux messages run: sealert -l 6171c909-8414-431b-a1bc-edd3556db3b0 Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 4cce59b0-77c5-4dad-a6ff-dbd5c09f35c0 Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e0324ff8-3480-4d35-99ea-daf9571c3540 Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l e6ac9743-6a1f-491e-bf0c-67074d0c8417 Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 0f4f0307-c8c9-4af1-be3a-4f46c1368c28 Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c4d8ab8f-ebdc-42bc-b570-9d2d263e1fe7 Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 6541765a-7f61-4f52-bbef-a7853ca3a7e9 Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 788a640e-4a41-4497-b364-c620a95d6055 Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856. For complete SELinux messages run: sealert -l 8f0122ac-34c4-4d15-acc5-93484fad0038 Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l c80bc617-57ba-456e-8eef-82dfc669a3c4 Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 527df182-574e-4481-8bb2-fe424acccff9 Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal sudo[93309]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856. For complete SELinux messages run: sealert -l 1ad47321-dc36-4819-9943-f3c7b1051872 Oct 13 20:44:29 np0005486557.novalocal setroubleshoot[93132]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:44:29 np0005486557.novalocal systemd[1]: Started Session c104 of User root. Oct 13 20:44:29 np0005486557.novalocal sudo[93309]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:44:29 np0005486557.novalocal sudo[93302]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:29 np0005486557.novalocal systemd[1]: session-c103.scope: Deactivated successfully. Oct 13 20:44:29 np0005486557.novalocal sudo[93315]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:44:29 np0005486557.novalocal systemd[1]: Started Session c105 of User root. Oct 13 20:44:29 np0005486557.novalocal sudo[93315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:44:29 np0005486557.novalocal sudo[93309]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:29 np0005486557.novalocal systemd[1]: session-c104.scope: Deactivated successfully. Oct 13 20:44:29 np0005486557.novalocal sudo[93318]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:44:29 np0005486557.novalocal systemd[1]: Started Session c106 of User root. Oct 13 20:44:29 np0005486557.novalocal sudo[93318]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:44:30 np0005486557.novalocal sudo[93318]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:30 np0005486557.novalocal systemd[1]: session-c106.scope: Deactivated successfully. Oct 13 20:44:30 np0005486557.novalocal sudo[93315]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:30 np0005486557.novalocal systemd[1]: session-c105.scope: Deactivated successfully. Oct 13 20:44:30 np0005486557.novalocal sudo[93324]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:44:30 np0005486557.novalocal systemd[1]: Started Session c107 of User root. Oct 13 20:44:30 np0005486557.novalocal sudo[93326]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 13 20:44:30 np0005486557.novalocal sudo[93324]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:44:30 np0005486557.novalocal systemd[1]: Started Session c108 of User root. Oct 13 20:44:30 np0005486557.novalocal sudo[93326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:44:30 np0005486557.novalocal sudo[93324]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:30 np0005486557.novalocal systemd[1]: session-c107.scope: Deactivated successfully. Oct 13 20:44:30 np0005486557.novalocal sudo[93332]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:44:30 np0005486557.novalocal systemd[1]: Started Session c109 of User root. Oct 13 20:44:30 np0005486557.novalocal sudo[93332]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:44:30 np0005486557.novalocal sudo[93326]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:30 np0005486557.novalocal systemd[1]: session-c108.scope: Deactivated successfully. Oct 13 20:44:30 np0005486557.novalocal sudo[93336]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 Oct 13 20:44:30 np0005486557.novalocal systemd[1]: Started Session c110 of User root. Oct 13 20:44:30 np0005486557.novalocal sudo[93336]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:44:31 np0005486557.novalocal sudo[93332]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:31 np0005486557.novalocal systemd[1]: session-c109.scope: Deactivated successfully. Oct 13 20:44:31 np0005486557.novalocal sudo[93336]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:31 np0005486557.novalocal systemd[1]: session-c110.scope: Deactivated successfully. Oct 13 20:44:31 np0005486557.novalocal sudo[93342]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:44:31 np0005486557.novalocal systemd[1]: Started Session c111 of User root. Oct 13 20:44:31 np0005486557.novalocal sudo[93342]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:44:32 np0005486557.novalocal sudo[93342]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:32 np0005486557.novalocal systemd[1]: session-c111.scope: Deactivated successfully. Oct 13 20:44:32 np0005486557.novalocal sudo[93350]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context nova.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmphkpw2gto/privsep.sock Oct 13 20:44:32 np0005486557.novalocal systemd[1]: Started Session c112 of User root. Oct 13 20:44:32 np0005486557.novalocal sudo[93350]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Oct 13 20:44:33 np0005486557.novalocal sudo[93350]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:34 np0005486557.novalocal sudo[93388]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context vif_plug_ovs.privsep.vif_plug --privsep_sock_path /tmp/tmpp8re27sr/privsep.sock Oct 13 20:44:34 np0005486557.novalocal systemd[1]: Started Session c113 of User root. Oct 13 20:44:34 np0005486557.novalocal sudo[93388]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Oct 13 20:44:35 np0005486557.novalocal sudo[93388]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:37 np0005486557.novalocal kernel: tun: Universal TUN/TAP device driver, 1.6 Oct 13 20:44:37 np0005486557.novalocal kernel: tap02a6b3b6-38: entered promiscuous mode Oct 13 20:44:37 np0005486557.novalocal kernel: tap510e443b-a3: entered promiscuous mode Oct 13 20:44:37 np0005486557.novalocal NetworkManager[856]: [1760402677.1689] manager: (tap02a6b3b6-38): new Tun device (/org/freedesktop/NetworkManager/Devices/9) Oct 13 20:44:37 np0005486557.novalocal NetworkManager[856]: [1760402677.1704] manager: (tap510e443b-a3): new Tun device (/org/freedesktop/NetworkManager/Devices/10) Oct 13 20:44:37 np0005486557.novalocal virtqemud[90345]: Domain id=1 name='instance-00000001' uuid=d2307bf5-8ed4-4944-8c1f-72bf478ccb1c is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 13 20:44:37 np0005486557.novalocal virtqemud[90345]: Domain id=1 name='instance-00000001' uuid=d2307bf5-8ed4-4944-8c1f-72bf478ccb1c is tainted: deprecated-config (CPU model 'qemu64') Oct 13 20:44:37 np0005486557.novalocal virtqemud[90345]: Domain id=2 name='instance-00000002' uuid=9f25b17c-4c8c-4c0f-860e-e14c99aab748 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 13 20:44:37 np0005486557.novalocal virtqemud[90345]: Domain id=2 name='instance-00000002' uuid=9f25b17c-4c8c-4c0f-860e-e14c99aab748 is tainted: deprecated-config (CPU model 'qemu64') Oct 13 20:44:37 np0005486557.novalocal systemd-machined[87255]: New machine qemu-1-instance-00000001. Oct 13 20:44:37 np0005486557.novalocal systemd[1]: Started Virtual Machine qemu-1-instance-00000001. Oct 13 20:44:37 np0005486557.novalocal systemd-machined[87255]: New machine qemu-2-instance-00000002. Oct 13 20:44:37 np0005486557.novalocal systemd[1]: Started Virtual Machine qemu-2-instance-00000002. Oct 13 20:44:37 np0005486557.novalocal systemd-udevd[93439]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:44:37 np0005486557.novalocal systemd-udevd[93440]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:44:37 np0005486557.novalocal NetworkManager[856]: [1760402677.3245] device (tap510e443b-a3): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 13 20:44:37 np0005486557.novalocal NetworkManager[856]: [1760402677.3254] device (tap510e443b-a3): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 13 20:44:37 np0005486557.novalocal NetworkManager[856]: [1760402677.3303] device (tap02a6b3b6-38): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 13 20:44:37 np0005486557.novalocal NetworkManager[856]: [1760402677.3310] device (tap02a6b3b6-38): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 13 20:44:37 np0005486557.novalocal sudo[93458]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmpcl88ucqs/privsep.sock Oct 13 20:44:37 np0005486557.novalocal systemd[1]: Started Session c114 of User root. Oct 13 20:44:37 np0005486557.novalocal sudo[93458]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:44:38 np0005486557.novalocal sudo[93458]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:39 np0005486557.novalocal systemd-udevd[93438]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:44:39 np0005486557.novalocal NetworkManager[856]: [1760402679.3077] manager: (tap16ec732b-30): new Veth device (/org/freedesktop/NetworkManager/Devices/11) Oct 13 20:44:39 np0005486557.novalocal NetworkManager[856]: [1760402679.3860] device (tap16ec732b-30): carrier: link connected Oct 13 20:44:39 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Deactivated successfully. Oct 13 20:44:39 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Consumed 1.268s CPU time. Oct 13 20:44:39 np0005486557.novalocal kernel: tap16ec732b-30: entered promiscuous mode Oct 13 20:44:39 np0005486557.novalocal sudo[93527]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-16ec732b-3476-4cfb-8177-45df2ed898e7 env PROCESS_TAG=haproxy-16ec732b-3476-4cfb-8177-45df2ed898e7 haproxy -f /var/lib/neutron/ovn-metadata-proxy/16ec732b-3476-4cfb-8177-45df2ed898e7.conf Oct 13 20:44:39 np0005486557.novalocal systemd[1]: Started Session c115 of User root. Oct 13 20:44:39 np0005486557.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 13 20:44:39 np0005486557.novalocal sudo[93527]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:44:39 np0005486557.novalocal systemd[1]: setroubleshootd.service: Consumed 3.855s CPU time. Oct 13 20:44:40 np0005486557.novalocal sudo[93527]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:40 np0005486557.novalocal NetworkManager[856]: [1760402680.2828] manager: (tapdc30a3b1-80): new Veth device (/org/freedesktop/NetworkManager/Devices/12) Oct 13 20:44:40 np0005486557.novalocal systemd-udevd[93550]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:44:40 np0005486557.novalocal NetworkManager[856]: [1760402680.3595] device (tapdc30a3b1-80): carrier: link connected Oct 13 20:44:40 np0005486557.novalocal kernel: tapdc30a3b1-80: entered promiscuous mode Oct 13 20:44:40 np0005486557.novalocal sudo[93577]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-dc30a3b1-899f-4080-a4eb-8a7054e951ac env PROCESS_TAG=haproxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac haproxy -f /var/lib/neutron/ovn-metadata-proxy/dc30a3b1-899f-4080-a4eb-8a7054e951ac.conf Oct 13 20:44:40 np0005486557.novalocal systemd[1]: Started Session c116 of User root. Oct 13 20:44:40 np0005486557.novalocal sudo[93577]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:44:40 np0005486557.novalocal sudo[93577]: pam_unix(sudo:session): session closed for user root Oct 13 20:44:49 np0005486557.novalocal kernel: tap510e443b-a3 (unregistering): left promiscuous mode Oct 13 20:44:49 np0005486557.novalocal NetworkManager[856]: [1760402689.2669] device (tap510e443b-a3): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 13 20:44:49 np0005486557.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Deactivated successfully. Oct 13 20:44:49 np0005486557.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Consumed 11.680s CPU time. Oct 13 20:44:49 np0005486557.novalocal systemd-machined[87255]: Machine qemu-2-instance-00000002 terminated. Oct 13 20:44:49 np0005486557.novalocal kernel: tap16ec732b-30: left promiscuous mode Oct 13 20:44:49 np0005486557.novalocal systemd[1]: session-c115.scope: Deactivated successfully. Oct 13 20:44:49 np0005486557.novalocal systemd[1]: run-netns-ovnmeta\x2d16ec732b\x2d3476\x2d4cfb\x2d8177\x2d45df2ed898e7.mount: Deactivated successfully. Oct 13 20:45:01 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:45:01 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:45:01 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:45:01 np0005486557.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 13 20:45:02 np0005486557.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 13 20:45:03 np0005486557.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service. Oct 13 20:45:04 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:60166 [13/Oct/2025:20:45:01.289] listener listener/metadata 0/0/0/3261/3261 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 13 20:45:04 np0005486557.novalocal setroubleshoot[93684]: SELinux is preventing /usr/sbin/httpd from read access on the file efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l f9a42ffa-d707-4e0b-b19b-569c2eae624e Oct 13 20:45:04 np0005486557.novalocal setroubleshoot[93684]: SELinux is preventing /usr/sbin/httpd from read access on the file efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:45:04 np0005486557.novalocal setroubleshoot[93684]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66': Oct 13 20:45:04 np0005486557.novalocal setroubleshoot[93684]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l 7dc6a043-cf05-47de-a4cb-d14a12d25445 Oct 13 20:45:04 np0005486557.novalocal setroubleshoot[93684]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:45:04 np0005486557.novalocal setroubleshoot[93684]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l 8648b409-184c-450e-86a9-e4c32116b718 Oct 13 20:45:04 np0005486557.novalocal setroubleshoot[93684]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:45:04 np0005486557.novalocal setroubleshoot[93684]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. For complete SELinux messages run: sealert -l 08d6afe4-121c-430e-9265-026fef2a2986 Oct 13 20:45:04 np0005486557.novalocal setroubleshoot[93684]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the efdbfd5663dc7fb52903b40f6f35b47b59804efa4b70ced726239c422cff2f66 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:45:07 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:46646 [13/Oct/2025:20:45:04.629] listener listener/metadata 0/0/0/2567/2567 200 115 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Oct 13 20:45:07 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:46662 [13/Oct/2025:20:45:07.251] listener listener/metadata 0/0/0/13/13 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Oct 13 20:45:07 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:46666 [13/Oct/2025:20:45:07.325] listener listener/metadata 0/0/0/12/12 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 13 20:45:07 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:46676 [13/Oct/2025:20:45:07.406] listener listener/metadata 0/0/0/13/13 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Oct 13 20:45:07 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:46692 [13/Oct/2025:20:45:07.470] listener listener/metadata 0/0/0/9/9 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Oct 13 20:45:07 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:46708 [13/Oct/2025:20:45:07.527] listener listener/metadata 0/0/0/23/23 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Oct 13 20:45:07 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:46722 [13/Oct/2025:20:45:07.592] listener listener/metadata 0/0/0/12/12 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Oct 13 20:45:07 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:46726 [13/Oct/2025:20:45:07.645] listener listener/metadata 0/0/0/11/11 200 152 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Oct 13 20:45:07 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:46730 [13/Oct/2025:20:45:07.697] listener listener/metadata 0/0/0/10/10 200 152 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Oct 13 20:45:07 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:46742 [13/Oct/2025:20:45:07.745] listener listener/metadata 0/0/0/14/14 200 182 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Oct 13 20:45:07 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:46752 [13/Oct/2025:20:45:07.800] listener listener/metadata 0/0/0/12/12 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Oct 13 20:45:07 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:46760 [13/Oct/2025:20:45:07.839] listener listener/metadata 0/0/0/13/13 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Oct 13 20:45:07 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:46772 [13/Oct/2025:20:45:07.879] listener listener/metadata 0/0/0/29/29 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Oct 13 20:45:07 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:46782 [13/Oct/2025:20:45:07.959] listener listener/metadata 0/0/0/8/8 200 152 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Oct 13 20:45:08 np0005486557.novalocal haproxy-metadata-proxy-dc30a3b1-899f-4080-a4eb-8a7054e951ac[93582]: 10.100.0.6:46798 [13/Oct/2025:20:45:08.004] listener listener/metadata 0/0/0/11/11 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Oct 13 20:45:14 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Deactivated successfully. Oct 13 20:45:14 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Consumed 1.266s CPU time. Oct 13 20:45:15 np0005486557.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 13 20:45:15 np0005486557.novalocal systemd[1]: setroubleshootd.service: Consumed 1.372s CPU time. Oct 13 20:45:19 np0005486557.novalocal kernel: tap27a8b074-cc: entered promiscuous mode Oct 13 20:45:19 np0005486557.novalocal NetworkManager[856]: [1760402719.3512] manager: (tap27a8b074-cc): new Tun device (/org/freedesktop/NetworkManager/Devices/13) Oct 13 20:45:19 np0005486557.novalocal virtqemud[90345]: Domain id=3 name='instance-00000003' uuid=4366a34d-2713-493f-92b6-941a1a22d2d9 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 13 20:45:19 np0005486557.novalocal virtqemud[90345]: Domain id=3 name='instance-00000003' uuid=4366a34d-2713-493f-92b6-941a1a22d2d9 is tainted: deprecated-config (CPU model 'qemu64') Oct 13 20:45:19 np0005486557.novalocal systemd-machined[87255]: New machine qemu-3-instance-00000003. Oct 13 20:45:19 np0005486557.novalocal systemd[1]: Started Virtual Machine qemu-3-instance-00000003. Oct 13 20:45:19 np0005486557.novalocal systemd-udevd[93822]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:45:19 np0005486557.novalocal NetworkManager[856]: [1760402719.4631] device (tap27a8b074-cc): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 13 20:45:19 np0005486557.novalocal NetworkManager[856]: [1760402719.4637] device (tap27a8b074-cc): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 13 20:45:19 np0005486557.novalocal NetworkManager[856]: [1760402719.5308] manager: (tap851f4502-30): new Veth device (/org/freedesktop/NetworkManager/Devices/14) Oct 13 20:45:19 np0005486557.novalocal NetworkManager[856]: [1760402719.5991] device (tap851f4502-30): carrier: link connected Oct 13 20:45:19 np0005486557.novalocal kernel: tap851f4502-30: entered promiscuous mode Oct 13 20:45:19 np0005486557.novalocal sudo[93868]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-851f4502-3602-4f4d-ab47-807d2a0df7c5 env PROCESS_TAG=haproxy-851f4502-3602-4f4d-ab47-807d2a0df7c5 haproxy -f /var/lib/neutron/ovn-metadata-proxy/851f4502-3602-4f4d-ab47-807d2a0df7c5.conf Oct 13 20:45:19 np0005486557.novalocal systemd[1]: Started Session c117 of User root. Oct 13 20:45:19 np0005486557.novalocal sudo[93868]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:45:20 np0005486557.novalocal sudo[93868]: pam_unix(sudo:session): session closed for user root Oct 13 20:45:29 np0005486557.novalocal sudo[93885]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:45:29 np0005486557.novalocal systemd[1]: Started Session c118 of User root. Oct 13 20:45:29 np0005486557.novalocal sudo[93885]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:45:29 np0005486557.novalocal sudo[93885]: pam_unix(sudo:session): session closed for user root Oct 13 20:45:29 np0005486557.novalocal systemd[1]: session-c118.scope: Deactivated successfully. Oct 13 20:45:29 np0005486557.novalocal sudo[93889]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:45:29 np0005486557.novalocal systemd[1]: Started Session c119 of User root. Oct 13 20:45:29 np0005486557.novalocal sudo[93889]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:45:30 np0005486557.novalocal sudo[93889]: pam_unix(sudo:session): session closed for user root Oct 13 20:45:30 np0005486557.novalocal systemd[1]: session-c119.scope: Deactivated successfully. Oct 13 20:45:30 np0005486557.novalocal sudo[93893]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:45:30 np0005486557.novalocal systemd[1]: Started Session c120 of User root. Oct 13 20:45:30 np0005486557.novalocal sudo[93893]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:45:30 np0005486557.novalocal sudo[93893]: pam_unix(sudo:session): session closed for user root Oct 13 20:45:30 np0005486557.novalocal systemd[1]: session-c120.scope: Deactivated successfully. Oct 13 20:45:30 np0005486557.novalocal sudo[93897]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:45:30 np0005486557.novalocal systemd[1]: Started Session c121 of User root. Oct 13 20:45:30 np0005486557.novalocal sudo[93897]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:45:31 np0005486557.novalocal sudo[93897]: pam_unix(sudo:session): session closed for user root Oct 13 20:45:31 np0005486557.novalocal systemd[1]: session-c121.scope: Deactivated successfully. Oct 13 20:45:34 np0005486557.novalocal kernel: tap27a8b074-cc (unregistering): left promiscuous mode Oct 13 20:45:34 np0005486557.novalocal NetworkManager[856]: [1760402734.4996] device (tap27a8b074-cc): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 13 20:45:34 np0005486557.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Deactivated successfully. Oct 13 20:45:34 np0005486557.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Consumed 14.517s CPU time. Oct 13 20:45:34 np0005486557.novalocal systemd[1]: session-c117.scope: Deactivated successfully. Oct 13 20:45:34 np0005486557.novalocal systemd-machined[87255]: Machine qemu-3-instance-00000003 terminated. Oct 13 20:45:34 np0005486557.novalocal kernel: tap851f4502-30: left promiscuous mode Oct 13 20:45:34 np0005486557.novalocal systemd[1]: run-netns-ovnmeta\x2d851f4502\x2d3602\x2d4f4d\x2dab47\x2d807d2a0df7c5.mount: Deactivated successfully. Oct 13 20:45:41 np0005486557.novalocal kernel: tap02a6b3b6-38 (unregistering): left promiscuous mode Oct 13 20:45:41 np0005486557.novalocal NetworkManager[856]: [1760402741.2696] device (tap02a6b3b6-38): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 13 20:45:41 np0005486557.novalocal systemd[1]: session-c116.scope: Deactivated successfully. Oct 13 20:45:41 np0005486557.novalocal kernel: tapdc30a3b1-80: left promiscuous mode Oct 13 20:45:41 np0005486557.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Deactivated successfully. Oct 13 20:45:41 np0005486557.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Consumed 25.389s CPU time. Oct 13 20:45:41 np0005486557.novalocal systemd-machined[87255]: Machine qemu-1-instance-00000001 terminated. Oct 13 20:45:41 np0005486557.novalocal systemd[1]: run-netns-ovnmeta\x2ddc30a3b1\x2d899f\x2d4080\x2da4eb\x2d8a7054e951ac.mount: Deactivated successfully. Oct 13 20:46:04 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:46:04 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:46:04 np0005486557.novalocal kernel: tap847bbe8e-3e: entered promiscuous mode Oct 13 20:46:04 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:46:04 np0005486557.novalocal NetworkManager[856]: [1760402764.2870] manager: (tap847bbe8e-3e): new Tun device (/org/freedesktop/NetworkManager/Devices/15) Oct 13 20:46:04 np0005486557.novalocal virtqemud[90345]: Domain id=4 name='instance-00000004' uuid=947f536b-3b46-474d-a27b-9ae92a8e1ff6 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 13 20:46:04 np0005486557.novalocal virtqemud[90345]: Domain id=4 name='instance-00000004' uuid=947f536b-3b46-474d-a27b-9ae92a8e1ff6 is tainted: deprecated-config (CPU model 'qemu64') Oct 13 20:46:04 np0005486557.novalocal systemd-machined[87255]: New machine qemu-4-instance-00000004. Oct 13 20:46:04 np0005486557.novalocal systemd[1]: Started Virtual Machine qemu-4-instance-00000004. Oct 13 20:46:04 np0005486557.novalocal systemd-udevd[94072]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:46:04 np0005486557.novalocal NetworkManager[856]: [1760402764.3772] device (tap847bbe8e-3e): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 13 20:46:04 np0005486557.novalocal NetworkManager[856]: [1760402764.3778] device (tap847bbe8e-3e): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 13 20:46:04 np0005486557.novalocal NetworkManager[856]: [1760402764.3812] manager: (tape429b406-00): new Veth device (/org/freedesktop/NetworkManager/Devices/16) Oct 13 20:46:04 np0005486557.novalocal NetworkManager[856]: [1760402764.4337] device (tape429b406-00): carrier: link connected Oct 13 20:46:04 np0005486557.novalocal kernel: tape429b406-00: entered promiscuous mode Oct 13 20:46:04 np0005486557.novalocal sudo[94113]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-e429b406-00e6-42cd-8420-ad7f147eda76 env PROCESS_TAG=haproxy-e429b406-00e6-42cd-8420-ad7f147eda76 haproxy -f /var/lib/neutron/ovn-metadata-proxy/e429b406-00e6-42cd-8420-ad7f147eda76.conf Oct 13 20:46:04 np0005486557.novalocal systemd[1]: Started Session c122 of User root. Oct 13 20:46:04 np0005486557.novalocal sudo[94113]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:46:04 np0005486557.novalocal sudo[94113]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:06 np0005486557.novalocal sudo[94128]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 Oct 13 20:46:06 np0005486557.novalocal systemd[1]: Started Session c123 of User root. Oct 13 20:46:06 np0005486557.novalocal sudo[94128]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:06 np0005486557.novalocal sudo[94128]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:06 np0005486557.novalocal systemd[1]: session-c123.scope: Deactivated successfully. Oct 13 20:46:07 np0005486557.novalocal sudo[94133]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate --name volume-56425f29-d92e-4259-bdd8-388ecd23a7b6 --snapshot cinder-volumes/volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 Oct 13 20:46:07 np0005486557.novalocal systemd[1]: Started Session c124 of User root. Oct 13 20:46:07 np0005486557.novalocal sudo[94133]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:07 np0005486557.novalocal dmeventd[85598]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Oct 13 20:46:07 np0005486557.novalocal dmeventd[85598]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Oct 13 20:46:07 np0005486557.novalocal lvm[94144]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:46:07 np0005486557.novalocal lvm[94144]: VG cinder-volumes finished Oct 13 20:46:07 np0005486557.novalocal sudo[94133]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:07 np0005486557.novalocal systemd[1]: session-c124.scope: Deactivated successfully. Oct 13 20:46:07 np0005486557.novalocal sudo[94146]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -k n cinder-volumes/volume-56425f29-d92e-4259-bdd8-388ecd23a7b6 Oct 13 20:46:07 np0005486557.novalocal systemd[1]: Started Session c125 of User root. Oct 13 20:46:07 np0005486557.novalocal sudo[94146]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:07 np0005486557.novalocal lvm[94151]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:46:07 np0005486557.novalocal lvm[94151]: VG cinder-volumes finished Oct 13 20:46:08 np0005486557.novalocal sudo[94146]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:08 np0005486557.novalocal systemd[1]: session-c125.scope: Deactivated successfully. Oct 13 20:46:15 np0005486557.novalocal sudo[94167]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpyg37kxwi/privsep.sock Oct 13 20:46:15 np0005486557.novalocal systemd[1]: Started Session c126 of User root. Oct 13 20:46:15 np0005486557.novalocal sudo[94167]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Oct 13 20:46:16 np0005486557.novalocal sudo[94167]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:16 np0005486557.novalocal sudo[94181]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-56425f29-d92e-4259-bdd8-388ecd23a7b6 Oct 13 20:46:16 np0005486557.novalocal systemd[1]: Started Session c127 of User root. Oct 13 20:46:16 np0005486557.novalocal sudo[94181]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:16 np0005486557.novalocal sudo[94181]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:16 np0005486557.novalocal systemd[1]: session-c127.scope: Deactivated successfully. Oct 13 20:46:16 np0005486557.novalocal sudo[94185]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-56425f29-d92e-4259-bdd8-388ecd23a7b6 iqn.2010-10.org.openstack:volume-56425f29-d92e-4259-bdd8-388ecd23a7b6 MQU2GLqKMZq5JkjtZ9P5 LbqBMmXJb7j5f63u False -p3260 -a::1 Oct 13 20:46:16 np0005486557.novalocal systemd[1]: Started Session c128 of User root. Oct 13 20:46:16 np0005486557.novalocal sudo[94185]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:17 np0005486557.novalocal sudo[94185]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:17 np0005486557.novalocal systemd[1]: session-c128.scope: Deactivated successfully. Oct 13 20:46:17 np0005486557.novalocal sudo[94227]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 13 20:46:17 np0005486557.novalocal systemd[1]: Started Session c129 of User root. Oct 13 20:46:17 np0005486557.novalocal sudo[94227]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:18 np0005486557.novalocal sudo[94227]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:18 np0005486557.novalocal systemd[1]: session-c129.scope: Deactivated successfully. Oct 13 20:46:18 np0005486557.novalocal sudo[94232]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:46:18 np0005486557.novalocal systemd[1]: Started Session c130 of User root. Oct 13 20:46:18 np0005486557.novalocal sudo[94232]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:18 np0005486557.novalocal sudo[94232]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:18 np0005486557.novalocal systemd[1]: session-c130.scope: Deactivated successfully. Oct 13 20:46:18 np0005486557.novalocal sudo[94238]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-56425f29-d92e-4259-bdd8-388ecd23a7b6 MQU2GLqKMZq5JkjtZ9P5 LbqBMmXJb7j5f63u iqn.1994-05.com.redhat:e2594393a727 Oct 13 20:46:18 np0005486557.novalocal systemd[1]: Started Session c131 of User root. Oct 13 20:46:18 np0005486557.novalocal sudo[94238]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:19 np0005486557.novalocal sudo[94238]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:19 np0005486557.novalocal systemd[1]: session-c131.scope: Deactivated successfully. Oct 13 20:46:19 np0005486557.novalocal sudo[94244]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:46:19 np0005486557.novalocal systemd[1]: Started Session c132 of User root. Oct 13 20:46:19 np0005486557.novalocal sudo[94244]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:19 np0005486557.novalocal sudo[94244]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:19 np0005486557.novalocal systemd[1]: session-c132.scope: Deactivated successfully. Oct 13 20:46:22 np0005486557.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 13 20:46:22 np0005486557.novalocal iscsid[70744]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-56425f29-d92e-4259-bdd8-388ecd23a7b6, portal: ::1,3260] through [iface: default] is operational now Oct 13 20:46:22 np0005486557.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 13 20:46:22 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 13 20:46:22 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: device naa.600140522abfe9af7d945a7b4ef32395 port group 0 rel port 1 Oct 13 20:46:22 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 13 20:46:22 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 13 20:46:22 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 13 20:46:22 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 13 20:46:22 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:46:22 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 13 20:46:22 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 13 20:46:22 np0005486557.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Oct 13 20:46:22 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:46:22 np0005486557.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Oct 13 20:46:22 np0005486557.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 13 20:46:22 np0005486557.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 13 20:46:22 np0005486557.novalocal kernel: GPT:229375 != 2097151 Oct 13 20:46:22 np0005486557.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 13 20:46:22 np0005486557.novalocal kernel: GPT:229375 != 2097151 Oct 13 20:46:22 np0005486557.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 13 20:46:22 np0005486557.novalocal kernel: sda: sda1 sda15 Oct 13 20:46:22 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 13 20:46:23 np0005486557.novalocal systemd[1]: Listening on libvirt secret daemon admin socket. Oct 13 20:46:23 np0005486557.novalocal systemd[1]: Listening on libvirt secret daemon read-only socket. Oct 13 20:46:23 np0005486557.novalocal systemd[1]: Starting libvirt secret daemon... Oct 13 20:46:23 np0005486557.novalocal systemd[1]: Started libvirt secret daemon. Oct 13 20:46:25 np0005486557.novalocal kernel: tapacec7534-6d: entered promiscuous mode Oct 13 20:46:25 np0005486557.novalocal NetworkManager[856]: [1760402785.8567] manager: (tapacec7534-6d): new Tun device (/org/freedesktop/NetworkManager/Devices/17) Oct 13 20:46:25 np0005486557.novalocal virtqemud[90345]: Domain id=5 name='instance-00000005' uuid=4d181531-6e9b-4907-9a2a-5cbebe4dbbd4 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 13 20:46:25 np0005486557.novalocal virtqemud[90345]: Domain id=5 name='instance-00000005' uuid=4d181531-6e9b-4907-9a2a-5cbebe4dbbd4 is tainted: deprecated-config (CPU model 'qemu64') Oct 13 20:46:25 np0005486557.novalocal systemd-udevd[94353]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:46:25 np0005486557.novalocal systemd-machined[87255]: New machine qemu-5-instance-00000005. Oct 13 20:46:25 np0005486557.novalocal NetworkManager[856]: [1760402785.9311] device (tapacec7534-6d): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 13 20:46:25 np0005486557.novalocal NetworkManager[856]: [1760402785.9320] device (tapacec7534-6d): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 13 20:46:25 np0005486557.novalocal systemd[1]: Started Virtual Machine qemu-5-instance-00000005. Oct 13 20:46:25 np0005486557.novalocal NetworkManager[856]: [1760402785.9707] manager: (tap9cad6be5-a0): new Veth device (/org/freedesktop/NetworkManager/Devices/18) Oct 13 20:46:26 np0005486557.novalocal NetworkManager[856]: [1760402786.0420] device (tap9cad6be5-a0): carrier: link connected Oct 13 20:46:26 np0005486557.novalocal kernel: tap9cad6be5-a0: entered promiscuous mode Oct 13 20:46:26 np0005486557.novalocal sudo[94399]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-9cad6be5-a765-4a9d-a649-2d42696e800d env PROCESS_TAG=haproxy-9cad6be5-a765-4a9d-a649-2d42696e800d haproxy -f /var/lib/neutron/ovn-metadata-proxy/9cad6be5-a765-4a9d-a649-2d42696e800d.conf Oct 13 20:46:26 np0005486557.novalocal systemd[1]: Started Session c133 of User root. Oct 13 20:46:26 np0005486557.novalocal sudo[94399]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:46:26 np0005486557.novalocal sudo[94399]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:29 np0005486557.novalocal sudo[94412]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:46:29 np0005486557.novalocal systemd[1]: Started Session c134 of User root. Oct 13 20:46:29 np0005486557.novalocal sudo[94412]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:29 np0005486557.novalocal sudo[94412]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:29 np0005486557.novalocal systemd[1]: session-c134.scope: Deactivated successfully. Oct 13 20:46:29 np0005486557.novalocal sudo[94416]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:46:29 np0005486557.novalocal systemd[1]: Started Session c135 of User root. Oct 13 20:46:29 np0005486557.novalocal sudo[94416]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:30 np0005486557.novalocal sudo[94416]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:30 np0005486557.novalocal systemd[1]: session-c135.scope: Deactivated successfully. Oct 13 20:46:30 np0005486557.novalocal sudo[94421]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:46:30 np0005486557.novalocal systemd[1]: Started Session c136 of User root. Oct 13 20:46:30 np0005486557.novalocal sudo[94421]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:30 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36324 [13/Oct/2025:20:46:30.251] listener listener/metadata 0/0/0/169/169 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 13 20:46:30 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36328 [13/Oct/2025:20:46:30.483] listener listener/metadata 0/0/0/10/10 200 114 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Oct 13 20:46:30 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36334 [13/Oct/2025:20:46:30.522] listener listener/metadata 0/0/0/10/10 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Oct 13 20:46:30 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36342 [13/Oct/2025:20:46:30.572] listener listener/metadata 0/0/0/9/9 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 13 20:46:30 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36352 [13/Oct/2025:20:46:30.620] listener listener/metadata 0/0/0/17/17 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Oct 13 20:46:30 np0005486557.novalocal sudo[94421]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:30 np0005486557.novalocal systemd[1]: session-c136.scope: Deactivated successfully. Oct 13 20:46:30 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36360 [13/Oct/2025:20:46:30.672] listener listener/metadata 0/0/0/20/20 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Oct 13 20:46:30 np0005486557.novalocal sudo[94432]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:46:30 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36368 [13/Oct/2025:20:46:30.729] listener listener/metadata 0/0/0/26/26 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Oct 13 20:46:30 np0005486557.novalocal systemd[1]: Started Session c137 of User root. Oct 13 20:46:30 np0005486557.novalocal sudo[94432]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:30 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36376 [13/Oct/2025:20:46:30.791] listener listener/metadata 0/0/0/17/17 200 99 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Oct 13 20:46:30 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36392 [13/Oct/2025:20:46:30.842] listener listener/metadata 0/0/0/17/17 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Oct 13 20:46:30 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36394 [13/Oct/2025:20:46:30.897] listener listener/metadata 0/0/0/16/16 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Oct 13 20:46:30 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36410 [13/Oct/2025:20:46:30.950] listener listener/metadata 0/0/0/15/15 200 182 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Oct 13 20:46:31 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36422 [13/Oct/2025:20:46:31.002] listener listener/metadata 0/0/0/16/16 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Oct 13 20:46:31 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36436 [13/Oct/2025:20:46:31.045] listener listener/metadata 0/0/0/15/15 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Oct 13 20:46:31 np0005486557.novalocal sudo[94432]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:31 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36440 [13/Oct/2025:20:46:31.086] listener listener/metadata 0/0/0/11/11 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Oct 13 20:46:31 np0005486557.novalocal systemd[1]: session-c137.scope: Deactivated successfully. Oct 13 20:46:31 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36442 [13/Oct/2025:20:46:31.137] listener listener/metadata 0/0/0/15/15 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Oct 13 20:46:31 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94118]: 10.100.0.10:36458 [13/Oct/2025:20:46:31.193] listener listener/metadata 0/0/0/15/15 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Oct 13 20:46:31 np0005486557.novalocal kernel: tapacec7534-6d (unregistering): left promiscuous mode Oct 13 20:46:31 np0005486557.novalocal NetworkManager[856]: [1760402791.8781] device (tapacec7534-6d): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 13 20:46:31 np0005486557.novalocal systemd[1]: session-c133.scope: Deactivated successfully. Oct 13 20:46:31 np0005486557.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Deactivated successfully. Oct 13 20:46:31 np0005486557.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Consumed 5.759s CPU time. Oct 13 20:46:31 np0005486557.novalocal systemd-machined[87255]: Machine qemu-5-instance-00000005 terminated. Oct 13 20:46:31 np0005486557.novalocal kernel: tap9cad6be5-a0: left promiscuous mode Oct 13 20:46:31 np0005486557.novalocal systemd[1]: run-netns-ovnmeta\x2d9cad6be5\x2da765\x2d4a9d\x2da649\x2d2d42696e800d.mount: Deactivated successfully. Oct 13 20:46:32 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:46:32 np0005486557.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 13 20:46:32 np0005486557.novalocal kernel: GPT:229375 != 2097151 Oct 13 20:46:32 np0005486557.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 13 20:46:32 np0005486557.novalocal kernel: GPT:229375 != 2097151 Oct 13 20:46:32 np0005486557.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 13 20:46:32 np0005486557.novalocal kernel: sda: sda1 sda15 Oct 13 20:46:32 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:46:32 np0005486557.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 13 20:46:32 np0005486557.novalocal kernel: GPT:229375 != 2097151 Oct 13 20:46:32 np0005486557.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 13 20:46:32 np0005486557.novalocal kernel: GPT:229375 != 2097151 Oct 13 20:46:32 np0005486557.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 13 20:46:32 np0005486557.novalocal kernel: sda: sda1 sda15 Oct 13 20:46:32 np0005486557.novalocal kernel: tapacec7534-6d: entered promiscuous mode Oct 13 20:46:32 np0005486557.novalocal NetworkManager[856]: [1760402792.1260] manager: (tapacec7534-6d): new Tun device (/org/freedesktop/NetworkManager/Devices/19) Oct 13 20:46:32 np0005486557.novalocal kernel: tapacec7534-6d (unregistering): left promiscuous mode Oct 13 20:46:32 np0005486557.novalocal systemd-udevd[94452]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:46:32 np0005486557.novalocal NetworkManager[856]: [1760402792.2452] manager: (tap9cad6be5-a0): new Veth device (/org/freedesktop/NetworkManager/Devices/20) Oct 13 20:46:32 np0005486557.novalocal NetworkManager[856]: [1760402792.3107] device (tap9cad6be5-a0): carrier: link connected Oct 13 20:46:32 np0005486557.novalocal kernel: tap9cad6be5-a0: entered promiscuous mode Oct 13 20:46:32 np0005486557.novalocal sudo[94528]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-9cad6be5-a765-4a9d-a649-2d42696e800d env PROCESS_TAG=haproxy-9cad6be5-a765-4a9d-a649-2d42696e800d haproxy -f /var/lib/neutron/ovn-metadata-proxy/9cad6be5-a765-4a9d-a649-2d42696e800d.conf Oct 13 20:46:32 np0005486557.novalocal systemd[1]: Started Session c138 of User root. Oct 13 20:46:32 np0005486557.novalocal sudo[94528]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:46:32 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 13 20:46:32 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 13 20:46:32 np0005486557.novalocal sudo[94528]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:32 np0005486557.novalocal iscsid[70744]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-56425f29-d92e-4259-bdd8-388ecd23a7b6, portal: ::1,3260] through [iface: default] is shutdown. Oct 13 20:46:32 np0005486557.novalocal systemd[1]: session-c138.scope: Deactivated successfully. Oct 13 20:46:32 np0005486557.novalocal kernel: tap9cad6be5-a0: left promiscuous mode Oct 13 20:46:32 np0005486557.novalocal systemd[1]: run-netns-ovnmeta\x2d9cad6be5\x2da765\x2d4a9d\x2da649\x2d2d42696e800d.mount: Deactivated successfully. Oct 13 20:46:35 np0005486557.novalocal sudo[94578]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-56425f29-d92e-4259-bdd8-388ecd23a7b6 iqn.1994-05.com.redhat:e2594393a727 Oct 13 20:46:35 np0005486557.novalocal systemd[1]: Started Session c139 of User root. Oct 13 20:46:35 np0005486557.novalocal sudo[94578]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:35 np0005486557.novalocal sudo[94578]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:35 np0005486557.novalocal systemd[1]: session-c139.scope: Deactivated successfully. Oct 13 20:46:35 np0005486557.novalocal sudo[94584]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:46:35 np0005486557.novalocal systemd[1]: Started Session c140 of User root. Oct 13 20:46:35 np0005486557.novalocal sudo[94584]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:36 np0005486557.novalocal sudo[94584]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:36 np0005486557.novalocal systemd[1]: session-c140.scope: Deactivated successfully. Oct 13 20:46:36 np0005486557.novalocal sudo[94589]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 13 20:46:36 np0005486557.novalocal systemd[1]: Started Session c141 of User root. Oct 13 20:46:36 np0005486557.novalocal sudo[94589]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:36 np0005486557.novalocal sudo[94589]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:36 np0005486557.novalocal systemd[1]: session-c141.scope: Deactivated successfully. Oct 13 20:46:36 np0005486557.novalocal sudo[94594]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-56425f29-d92e-4259-bdd8-388ecd23a7b6 Oct 13 20:46:36 np0005486557.novalocal systemd[1]: Started Session c142 of User root. Oct 13 20:46:36 np0005486557.novalocal sudo[94594]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:37 np0005486557.novalocal sudo[94594]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:37 np0005486557.novalocal systemd[1]: session-c142.scope: Deactivated successfully. Oct 13 20:46:37 np0005486557.novalocal sudo[94603]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:46:37 np0005486557.novalocal systemd[1]: Started Session c143 of User root. Oct 13 20:46:37 np0005486557.novalocal sudo[94603]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:37 np0005486557.novalocal sudo[94603]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:38 np0005486557.novalocal systemd[1]: session-c143.scope: Deactivated successfully. Oct 13 20:46:38 np0005486557.novalocal sudo[94610]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 13 20:46:38 np0005486557.novalocal systemd[1]: Started Session c144 of User root. Oct 13 20:46:38 np0005486557.novalocal sudo[94610]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:38 np0005486557.novalocal sudo[94610]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:38 np0005486557.novalocal systemd[1]: session-c144.scope: Deactivated successfully. Oct 13 20:46:38 np0005486557.novalocal sudo[94616]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-56425f29-d92e-4259-bdd8-388ecd23a7b6 Oct 13 20:46:38 np0005486557.novalocal systemd[1]: Started Session c145 of User root. Oct 13 20:46:38 np0005486557.novalocal sudo[94616]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:39 np0005486557.novalocal sudo[94616]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:39 np0005486557.novalocal systemd[1]: session-c145.scope: Deactivated successfully. Oct 13 20:46:39 np0005486557.novalocal sudo[94620]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-56425f29-d92e-4259-bdd8-388ecd23a7b6 Oct 13 20:46:39 np0005486557.novalocal systemd[1]: Started Session c146 of User root. Oct 13 20:46:39 np0005486557.novalocal sudo[94620]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:39 np0005486557.novalocal sudo[94620]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:39 np0005486557.novalocal systemd[1]: session-c146.scope: Deactivated successfully. Oct 13 20:46:39 np0005486557.novalocal sudo[94625]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-56425f29-d92e-4259-bdd8-388ecd23a7b6 Oct 13 20:46:39 np0005486557.novalocal systemd[1]: Started Session c147 of User root. Oct 13 20:46:39 np0005486557.novalocal sudo[94625]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:40 np0005486557.novalocal lvm[94638]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:46:40 np0005486557.novalocal lvm[94638]: VG cinder-volumes finished Oct 13 20:46:40 np0005486557.novalocal sudo[94625]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:40 np0005486557.novalocal systemd[1]: session-c147.scope: Deactivated successfully. Oct 13 20:46:40 np0005486557.novalocal sudo[94639]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:46:40 np0005486557.novalocal systemd[1]: Started Session c148 of User root. Oct 13 20:46:40 np0005486557.novalocal sudo[94639]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:40 np0005486557.novalocal sudo[94639]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:40 np0005486557.novalocal systemd[1]: session-c148.scope: Deactivated successfully. Oct 13 20:46:40 np0005486557.novalocal sudo[94643]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:46:40 np0005486557.novalocal systemd[1]: Started Session c149 of User root. Oct 13 20:46:40 np0005486557.novalocal sudo[94643]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:40 np0005486557.novalocal sudo[94643]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:40 np0005486557.novalocal systemd[1]: session-c149.scope: Deactivated successfully. Oct 13 20:46:40 np0005486557.novalocal sudo[94647]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:46:40 np0005486557.novalocal systemd[1]: Started Session c150 of User root. Oct 13 20:46:40 np0005486557.novalocal sudo[94647]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:41 np0005486557.novalocal sudo[94647]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:41 np0005486557.novalocal systemd[1]: session-c150.scope: Deactivated successfully. Oct 13 20:46:41 np0005486557.novalocal sudo[94651]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:46:41 np0005486557.novalocal systemd[1]: Started Session c151 of User root. Oct 13 20:46:41 np0005486557.novalocal sudo[94651]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:46:41 np0005486557.novalocal sudo[94651]: pam_unix(sudo:session): session closed for user root Oct 13 20:46:41 np0005486557.novalocal systemd[1]: session-c151.scope: Deactivated successfully. Oct 13 20:46:41 np0005486557.novalocal kernel: tap847bbe8e-3e (unregistering): left promiscuous mode Oct 13 20:46:41 np0005486557.novalocal NetworkManager[856]: [1760402801.9447] device (tap847bbe8e-3e): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 13 20:46:41 np0005486557.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Deactivated successfully. Oct 13 20:46:41 np0005486557.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Consumed 20.651s CPU time. Oct 13 20:46:41 np0005486557.novalocal systemd[1]: session-c122.scope: Deactivated successfully. Oct 13 20:46:41 np0005486557.novalocal systemd-machined[87255]: Machine qemu-4-instance-00000004 terminated. Oct 13 20:46:42 np0005486557.novalocal kernel: tape429b406-00: left promiscuous mode Oct 13 20:46:42 np0005486557.novalocal systemd[1]: run-netns-ovnmeta\x2de429b406\x2d00e6\x2d42cd\x2d8420\x2dad7f147eda76.mount: Deactivated successfully. Oct 13 20:46:45 np0005486557.novalocal NetworkManager[856]: [1760402805.1991] manager: (tap847bbe8e-3e): new Tun device (/org/freedesktop/NetworkManager/Devices/21) Oct 13 20:46:45 np0005486557.novalocal kernel: tap847bbe8e-3e: entered promiscuous mode Oct 13 20:46:45 np0005486557.novalocal virtqemud[90345]: Domain id=6 name='instance-00000004' uuid=947f536b-3b46-474d-a27b-9ae92a8e1ff6 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 13 20:46:45 np0005486557.novalocal virtqemud[90345]: Domain id=6 name='instance-00000004' uuid=947f536b-3b46-474d-a27b-9ae92a8e1ff6 is tainted: deprecated-config (CPU model 'qemu64') Oct 13 20:46:45 np0005486557.novalocal systemd-machined[87255]: New machine qemu-6-instance-00000004. Oct 13 20:46:45 np0005486557.novalocal systemd[1]: Started Virtual Machine qemu-6-instance-00000004. Oct 13 20:46:45 np0005486557.novalocal systemd-udevd[94722]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:46:45 np0005486557.novalocal NetworkManager[856]: [1760402805.3180] device (tap847bbe8e-3e): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 13 20:46:45 np0005486557.novalocal NetworkManager[856]: [1760402805.3186] device (tap847bbe8e-3e): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 13 20:46:45 np0005486557.novalocal NetworkManager[856]: [1760402805.3299] manager: (tape429b406-00): new Veth device (/org/freedesktop/NetworkManager/Devices/22) Oct 13 20:46:45 np0005486557.novalocal NetworkManager[856]: [1760402805.4038] device (tape429b406-00): carrier: link connected Oct 13 20:46:45 np0005486557.novalocal kernel: tape429b406-00: entered promiscuous mode Oct 13 20:46:45 np0005486557.novalocal sudo[94766]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-e429b406-00e6-42cd-8420-ad7f147eda76 env PROCESS_TAG=haproxy-e429b406-00e6-42cd-8420-ad7f147eda76 haproxy -f /var/lib/neutron/ovn-metadata-proxy/e429b406-00e6-42cd-8420-ad7f147eda76.conf Oct 13 20:46:45 np0005486557.novalocal systemd[1]: Started Session c152 of User root. Oct 13 20:46:45 np0005486557.novalocal sudo[94766]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:46:45 np0005486557.novalocal sudo[94766]: pam_unix(sudo:session): session closed for user root Oct 13 20:47:01 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:47:01 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:47:01 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:47:01 np0005486557.novalocal kernel: tap36ec1587-c8: entered promiscuous mode Oct 13 20:47:01 np0005486557.novalocal NetworkManager[856]: [1760402821.7198] manager: (tap36ec1587-c8): new Tun device (/org/freedesktop/NetworkManager/Devices/23) Oct 13 20:47:01 np0005486557.novalocal virtqemud[90345]: Domain id=7 name='instance-00000006' uuid=eaaef68c-99fa-417b-bba1-8db457b3c481 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 13 20:47:01 np0005486557.novalocal virtqemud[90345]: Domain id=7 name='instance-00000006' uuid=eaaef68c-99fa-417b-bba1-8db457b3c481 is tainted: deprecated-config (CPU model 'qemu64') Oct 13 20:47:01 np0005486557.novalocal systemd-machined[87255]: New machine qemu-7-instance-00000006. Oct 13 20:47:01 np0005486557.novalocal systemd[1]: Started Virtual Machine qemu-7-instance-00000006. Oct 13 20:47:01 np0005486557.novalocal systemd-udevd[94839]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:47:01 np0005486557.novalocal NetworkManager[856]: [1760402821.8339] device (tap36ec1587-c8): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 13 20:47:01 np0005486557.novalocal NetworkManager[856]: [1760402821.8346] device (tap36ec1587-c8): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 13 20:47:01 np0005486557.novalocal NetworkManager[856]: [1760402821.8579] manager: (tap6b36ca94-40): new Veth device (/org/freedesktop/NetworkManager/Devices/24) Oct 13 20:47:01 np0005486557.novalocal systemd-udevd[94845]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:47:01 np0005486557.novalocal NetworkManager[856]: [1760402821.9005] device (tap6b36ca94-40): carrier: link connected Oct 13 20:47:02 np0005486557.novalocal kernel: tap6b36ca94-40: entered promiscuous mode Oct 13 20:47:02 np0005486557.novalocal sudo[94882]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-6b36ca94-44ab-4a04-be66-f375ea4cc2f4 env PROCESS_TAG=haproxy-6b36ca94-44ab-4a04-be66-f375ea4cc2f4 haproxy -f /var/lib/neutron/ovn-metadata-proxy/6b36ca94-44ab-4a04-be66-f375ea4cc2f4.conf Oct 13 20:47:02 np0005486557.novalocal systemd[1]: Started Session c153 of User root. Oct 13 20:47:02 np0005486557.novalocal sudo[94882]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:47:02 np0005486557.novalocal sudo[94882]: pam_unix(sudo:session): session closed for user root Oct 13 20:47:04 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:47922 [13/Oct/2025:20:47:04.635] listener listener/metadata 0/0/0/99/99 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 13 20:47:04 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:47934 [13/Oct/2025:20:47:04.791] listener listener/metadata 0/0/0/11/11 200 114 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Oct 13 20:47:04 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:47938 [13/Oct/2025:20:47:04.830] listener listener/metadata 0/0/0/13/13 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Oct 13 20:47:04 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:47940 [13/Oct/2025:20:47:04.877] listener listener/metadata 0/0/0/15/15 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 13 20:47:04 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:47944 [13/Oct/2025:20:47:04.928] listener listener/metadata 0/0/0/10/10 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Oct 13 20:47:04 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:47960 [13/Oct/2025:20:47:04.973] listener listener/metadata 0/0/0/11/11 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Oct 13 20:47:05 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:47974 [13/Oct/2025:20:47:05.023] listener listener/metadata 0/0/0/13/13 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Oct 13 20:47:05 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:47990 [13/Oct/2025:20:47:05.073] listener listener/metadata 0/0/0/14/14 200 99 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Oct 13 20:47:05 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:48002 [13/Oct/2025:20:47:05.126] listener listener/metadata 0/0/0/14/14 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Oct 13 20:47:05 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:48006 [13/Oct/2025:20:47:05.177] listener listener/metadata 0/0/0/13/13 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Oct 13 20:47:05 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:48008 [13/Oct/2025:20:47:05.227] listener listener/metadata 0/0/0/16/16 200 182 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Oct 13 20:47:05 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:48016 [13/Oct/2025:20:47:05.279] listener listener/metadata 0/0/0/23/23 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Oct 13 20:47:05 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:48018 [13/Oct/2025:20:47:05.329] listener listener/metadata 0/0/0/11/11 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Oct 13 20:47:05 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:48032 [13/Oct/2025:20:47:05.368] listener listener/metadata 0/0/0/15/15 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Oct 13 20:47:05 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:48044 [13/Oct/2025:20:47:05.428] listener listener/metadata 0/0/0/85/85 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Oct 13 20:47:05 np0005486557.novalocal haproxy-metadata-proxy-e429b406-00e6-42cd-8420-ad7f147eda76[94771]: 10.100.0.10:48058 [13/Oct/2025:20:47:05.556] listener listener/metadata 0/0/0/16/16 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Oct 13 20:47:14 np0005486557.novalocal kernel: tap36ec1587-c8 (unregistering): left promiscuous mode Oct 13 20:47:14 np0005486557.novalocal NetworkManager[856]: [1760402834.3864] device (tap36ec1587-c8): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 13 20:47:14 np0005486557.novalocal systemd[1]: session-c153.scope: Deactivated successfully. Oct 13 20:47:14 np0005486557.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Deactivated successfully. Oct 13 20:47:14 np0005486557.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Consumed 12.567s CPU time. Oct 13 20:47:14 np0005486557.novalocal kernel: tap6b36ca94-40: left promiscuous mode Oct 13 20:47:14 np0005486557.novalocal systemd-machined[87255]: Machine qemu-7-instance-00000006 terminated. Oct 13 20:47:14 np0005486557.novalocal systemd[1]: run-netns-ovnmeta\x2d6b36ca94\x2d44ab\x2d4a04\x2dbe66\x2df375ea4cc2f4.mount: Deactivated successfully. Oct 13 20:47:21 np0005486557.novalocal kernel: tap847bbe8e-3e (unregistering): left promiscuous mode Oct 13 20:47:21 np0005486557.novalocal NetworkManager[856]: [1760402841.6828] device (tap847bbe8e-3e): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 13 20:47:21 np0005486557.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000004.scope: Deactivated successfully. Oct 13 20:47:21 np0005486557.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000004.scope: Consumed 19.774s CPU time. Oct 13 20:47:21 np0005486557.novalocal systemd-machined[87255]: Machine qemu-6-instance-00000004 terminated. Oct 13 20:47:21 np0005486557.novalocal kernel: tape429b406-00: left promiscuous mode Oct 13 20:47:21 np0005486557.novalocal systemd[1]: session-c152.scope: Deactivated successfully. Oct 13 20:47:21 np0005486557.novalocal systemd[1]: run-netns-ovnmeta\x2de429b406\x2d00e6\x2d42cd\x2d8420\x2dad7f147eda76.mount: Deactivated successfully. Oct 13 20:47:21 np0005486557.novalocal NetworkManager[856]: [1760402841.8955] manager: (tap847bbe8e-3e): new Tun device (/org/freedesktop/NetworkManager/Devices/25) Oct 13 20:47:29 np0005486557.novalocal sudo[95053]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:47:29 np0005486557.novalocal systemd[1]: Started Session c154 of User root. Oct 13 20:47:29 np0005486557.novalocal sudo[95053]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:47:29 np0005486557.novalocal sudo[95053]: pam_unix(sudo:session): session closed for user root Oct 13 20:47:29 np0005486557.novalocal systemd[1]: session-c154.scope: Deactivated successfully. Oct 13 20:47:29 np0005486557.novalocal sudo[95057]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:47:29 np0005486557.novalocal systemd[1]: Started Session c155 of User root. Oct 13 20:47:29 np0005486557.novalocal sudo[95057]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:47:30 np0005486557.novalocal sudo[95057]: pam_unix(sudo:session): session closed for user root Oct 13 20:47:30 np0005486557.novalocal systemd[1]: session-c155.scope: Deactivated successfully. Oct 13 20:47:30 np0005486557.novalocal sudo[95061]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:47:30 np0005486557.novalocal systemd[1]: Started Session c156 of User root. Oct 13 20:47:30 np0005486557.novalocal sudo[95061]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:47:30 np0005486557.novalocal sudo[95061]: pam_unix(sudo:session): session closed for user root Oct 13 20:47:30 np0005486557.novalocal systemd[1]: session-c156.scope: Deactivated successfully. Oct 13 20:47:30 np0005486557.novalocal sudo[95065]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:47:30 np0005486557.novalocal systemd[1]: Started Session c157 of User root. Oct 13 20:47:30 np0005486557.novalocal sudo[95065]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:47:31 np0005486557.novalocal sudo[95065]: pam_unix(sudo:session): session closed for user root Oct 13 20:47:31 np0005486557.novalocal systemd[1]: session-c157.scope: Deactivated successfully. Oct 13 20:47:46 np0005486557.novalocal kernel: tap070e85d5-46: entered promiscuous mode Oct 13 20:47:46 np0005486557.novalocal NetworkManager[856]: [1760402866.0625] manager: (tap070e85d5-46): new Tun device (/org/freedesktop/NetworkManager/Devices/26) Oct 13 20:47:46 np0005486557.novalocal virtqemud[90345]: Domain id=8 name='instance-00000007' uuid=0a5d5c86-0761-4682-9b0b-dbba1c1cc394 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 13 20:47:46 np0005486557.novalocal virtqemud[90345]: Domain id=8 name='instance-00000007' uuid=0a5d5c86-0761-4682-9b0b-dbba1c1cc394 is tainted: deprecated-config (CPU model 'qemu64') Oct 13 20:47:46 np0005486557.novalocal systemd-machined[87255]: New machine qemu-8-instance-00000007. Oct 13 20:47:46 np0005486557.novalocal systemd[1]: Started Virtual Machine qemu-8-instance-00000007. Oct 13 20:47:46 np0005486557.novalocal systemd-udevd[95120]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:47:46 np0005486557.novalocal NetworkManager[856]: [1760402866.1970] manager: (tape19a7061-70): new Veth device (/org/freedesktop/NetworkManager/Devices/27) Oct 13 20:47:46 np0005486557.novalocal systemd-udevd[95128]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:47:46 np0005486557.novalocal NetworkManager[856]: [1760402866.2036] device (tap070e85d5-46): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 13 20:47:46 np0005486557.novalocal NetworkManager[856]: [1760402866.2041] device (tap070e85d5-46): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 13 20:47:46 np0005486557.novalocal NetworkManager[856]: [1760402866.2540] device (tape19a7061-70): carrier: link connected Oct 13 20:47:46 np0005486557.novalocal kernel: tape19a7061-70: entered promiscuous mode Oct 13 20:47:46 np0005486557.novalocal sudo[95163]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-e19a7061-744f-4f83-8835-1656dc921806 env PROCESS_TAG=haproxy-e19a7061-744f-4f83-8835-1656dc921806 haproxy -f /var/lib/neutron/ovn-metadata-proxy/e19a7061-744f-4f83-8835-1656dc921806.conf Oct 13 20:47:46 np0005486557.novalocal systemd[1]: Started Session c158 of User root. Oct 13 20:47:46 np0005486557.novalocal sudo[95163]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:47:46 np0005486557.novalocal sudo[95163]: pam_unix(sudo:session): session closed for user root Oct 13 20:47:57 np0005486557.novalocal kernel: tap070e85d5-46 (unregistering): left promiscuous mode Oct 13 20:47:57 np0005486557.novalocal NetworkManager[856]: [1760402877.4382] device (tap070e85d5-46): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 13 20:47:57 np0005486557.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Deactivated successfully. Oct 13 20:47:57 np0005486557.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Consumed 11.235s CPU time. Oct 13 20:47:57 np0005486557.novalocal systemd-machined[87255]: Machine qemu-8-instance-00000007 terminated. Oct 13 20:47:57 np0005486557.novalocal kernel: tape19a7061-70: left promiscuous mode Oct 13 20:47:57 np0005486557.novalocal systemd[1]: session-c158.scope: Deactivated successfully. Oct 13 20:47:57 np0005486557.novalocal systemd[1]: run-netns-ovnmeta\x2de19a7061\x2d744f\x2d4f83\x2d8835\x2d1656dc921806.mount: Deactivated successfully. Oct 13 20:47:57 np0005486557.novalocal kernel: tap070e85d5-46: entered promiscuous mode Oct 13 20:47:57 np0005486557.novalocal NetworkManager[856]: [1760402877.6465] manager: (tap070e85d5-46): new Tun device (/org/freedesktop/NetworkManager/Devices/28) Oct 13 20:47:57 np0005486557.novalocal systemd-udevd[95196]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:47:57 np0005486557.novalocal kernel: tap070e85d5-46 (unregistering): left promiscuous mode Oct 13 20:47:57 np0005486557.novalocal NetworkManager[856]: [1760402877.7918] manager: (tape19a7061-70): new Veth device (/org/freedesktop/NetworkManager/Devices/29) Oct 13 20:47:57 np0005486557.novalocal NetworkManager[856]: [1760402877.8798] device (tape19a7061-70): carrier: link connected Oct 13 20:47:58 np0005486557.novalocal kernel: tape19a7061-70: entered promiscuous mode Oct 13 20:47:58 np0005486557.novalocal sudo[95253]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-e19a7061-744f-4f83-8835-1656dc921806 env PROCESS_TAG=haproxy-e19a7061-744f-4f83-8835-1656dc921806 haproxy -f /var/lib/neutron/ovn-metadata-proxy/e19a7061-744f-4f83-8835-1656dc921806.conf Oct 13 20:47:58 np0005486557.novalocal systemd[1]: Started Session c159 of User root. Oct 13 20:47:58 np0005486557.novalocal sudo[95253]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:47:58 np0005486557.novalocal sudo[95253]: pam_unix(sudo:session): session closed for user root Oct 13 20:47:58 np0005486557.novalocal systemd[1]: session-c159.scope: Deactivated successfully. Oct 13 20:47:58 np0005486557.novalocal kernel: tape19a7061-70: left promiscuous mode Oct 13 20:47:58 np0005486557.novalocal systemd[1]: run-netns-ovnmeta\x2de19a7061\x2d744f\x2d4f83\x2d8835\x2d1656dc921806.mount: Deactivated successfully. Oct 13 20:48:08 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:48:08 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:48:08 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:48:29 np0005486557.novalocal sudo[95329]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:48:29 np0005486557.novalocal systemd[1]: Started Session c160 of User root. Oct 13 20:48:29 np0005486557.novalocal sudo[95329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:48:29 np0005486557.novalocal sudo[95329]: pam_unix(sudo:session): session closed for user root Oct 13 20:48:29 np0005486557.novalocal systemd[1]: session-c160.scope: Deactivated successfully. Oct 13 20:48:29 np0005486557.novalocal sudo[95333]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:48:29 np0005486557.novalocal systemd[1]: Started Session c161 of User root. Oct 13 20:48:29 np0005486557.novalocal sudo[95333]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:48:30 np0005486557.novalocal sudo[95333]: pam_unix(sudo:session): session closed for user root Oct 13 20:48:30 np0005486557.novalocal systemd[1]: session-c161.scope: Deactivated successfully. Oct 13 20:48:30 np0005486557.novalocal sudo[95337]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:48:30 np0005486557.novalocal systemd[1]: Started Session c162 of User root. Oct 13 20:48:30 np0005486557.novalocal sudo[95337]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:48:30 np0005486557.novalocal sudo[95337]: pam_unix(sudo:session): session closed for user root Oct 13 20:48:30 np0005486557.novalocal systemd[1]: session-c162.scope: Deactivated successfully. Oct 13 20:48:30 np0005486557.novalocal sudo[95342]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:48:30 np0005486557.novalocal systemd[1]: Started Session c163 of User root. Oct 13 20:48:30 np0005486557.novalocal sudo[95342]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:48:31 np0005486557.novalocal sudo[95342]: pam_unix(sudo:session): session closed for user root Oct 13 20:48:31 np0005486557.novalocal systemd[1]: session-c163.scope: Deactivated successfully. Oct 13 20:48:55 np0005486557.novalocal sudo[95359]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-48dae6bc-f658-4a7d-86d0-04401327063d cinder-volumes/cinder-volumes-pool Oct 13 20:48:55 np0005486557.novalocal systemd[1]: Started Session c164 of User root. Oct 13 20:48:55 np0005486557.novalocal sudo[95359]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:48:55 np0005486557.novalocal lvm[95371]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:48:55 np0005486557.novalocal lvm[95371]: VG cinder-volumes finished Oct 13 20:48:55 np0005486557.novalocal sudo[95359]: pam_unix(sudo:session): session closed for user root Oct 13 20:48:55 np0005486557.novalocal systemd[1]: session-c164.scope: Deactivated successfully. Oct 13 20:48:56 np0005486557.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 13 20:48:57 np0005486557.novalocal sudo[95384]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-48dae6bc-f658-4a7d-86d0-04401327063d Oct 13 20:48:57 np0005486557.novalocal systemd[1]: Started Session c165 of User root. Oct 13 20:48:57 np0005486557.novalocal sudo[95384]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:48:57 np0005486557.novalocal sudo[95384]: pam_unix(sudo:session): session closed for user root Oct 13 20:48:57 np0005486557.novalocal systemd[1]: session-c165.scope: Deactivated successfully. Oct 13 20:48:57 np0005486557.novalocal sudo[95389]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-48dae6bc-f658-4a7d-86d0-04401327063d iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d BMdGWwfWHR2xegEdWNTM r4XZUujTaCUjBNY9 False -p3260 -a::1 Oct 13 20:48:57 np0005486557.novalocal systemd[1]: Started Session c166 of User root. Oct 13 20:48:57 np0005486557.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 13 20:48:57 np0005486557.novalocal sudo[95389]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:48:58 np0005486557.novalocal sudo[95389]: pam_unix(sudo:session): session closed for user root Oct 13 20:48:58 np0005486557.novalocal systemd[1]: session-c166.scope: Deactivated successfully. Oct 13 20:48:58 np0005486557.novalocal sudo[95404]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 13 20:48:58 np0005486557.novalocal systemd[1]: Started Session c167 of User root. Oct 13 20:48:58 np0005486557.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service. Oct 13 20:48:58 np0005486557.novalocal sudo[95404]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:48:58 np0005486557.novalocal sudo[95404]: pam_unix(sudo:session): session closed for user root Oct 13 20:48:58 np0005486557.novalocal systemd[1]: session-c167.scope: Deactivated successfully. Oct 13 20:48:58 np0005486557.novalocal sudo[95414]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:48:58 np0005486557.novalocal systemd[1]: Started Session c168 of User root. Oct 13 20:48:58 np0005486557.novalocal sudo[95414]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:48:59 np0005486557.novalocal sudo[95414]: pam_unix(sudo:session): session closed for user root Oct 13 20:48:59 np0005486557.novalocal systemd[1]: session-c168.scope: Deactivated successfully. Oct 13 20:48:59 np0005486557.novalocal sudo[95421]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d BMdGWwfWHR2xegEdWNTM r4XZUujTaCUjBNY9 iqn.1994-05.com.redhat:e2594393a727 Oct 13 20:48:59 np0005486557.novalocal systemd[1]: Started Session c169 of User root. Oct 13 20:48:59 np0005486557.novalocal sudo[95421]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 996a9dbd-c111-4c87-ae7b-7277433abc06 Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:48:59 np0005486557.novalocal sudo[95421]: pam_unix(sudo:session): session closed for user root Oct 13 20:48:59 np0005486557.novalocal systemd[1]: session-c169.scope: Deactivated successfully. Oct 13 20:48:59 np0005486557.novalocal sudo[95428]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:48:59 np0005486557.novalocal systemd[1]: Started Session c170 of User root. Oct 13 20:48:59 np0005486557.novalocal sudo[95428]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 66f93532-c8ae-4237-835f-424ef6d44279 Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: failed to retrieve rpm info for path '/dev/vda1': Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l ac0ce202-8235-4e41-8f78-01d1c1666383 Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l d629571f-4fb8-4a29-857b-a54b59f536b7 Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8de0bc99-c435-4f60-89c3-4e83afeb53ec Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 673a1ceb-f787-4126-bcbc-40873053bee6 Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l c77561fd-ceb8-43ce-ace3-25ebbfbe5213 Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 727aa859-6a69-4801-8fb3-b17ee37f32f3 Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a3dce856-b059-49fc-86ee-c0b4855a31bc Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l bc43eed9-46f6-475e-983a-c5fdde4e5077 Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-m1lykS. For complete SELinux messages run: sealert -l 077347e3-e8a6-4ab3-9c72-a5071a7ba3d0 Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-m1lykS. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-m1lykS file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 52e671fc-2db7-456a-81d6-0a89403f803f Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l f59f5a6a-a099-48e6-8e29-050304c42951 Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l a2153f30-bda5-4821-b931-f65cf2f3087e Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 8bfa59e7-18bb-4420-bfd8-fc79a1bb695d Oct 13 20:48:59 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:00 np0005486557.novalocal sudo[95428]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:00 np0005486557.novalocal systemd[1]: session-c170.scope: Deactivated successfully. Oct 13 20:49:00 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:49:00 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:49:00 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:49:00 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l e6ac9743-6a1f-491e-bf0c-67074d0c8417 Oct 13 20:49:00 np0005486557.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 13 20:49:00 np0005486557.novalocal iscsid[70744]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d, portal: ::1,3260] through [iface: default] is operational now Oct 13 20:49:00 np0005486557.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 13 20:49:00 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 13 20:49:00 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405c48a758a70ec40d1a237dd87a port group 0 rel port 1 Oct 13 20:49:00 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 13 20:49:00 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 13 20:49:00 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 13 20:49:00 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 13 20:49:00 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:49:00 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 13 20:49:00 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 13 20:49:00 np0005486557.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Oct 13 20:49:00 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:49:00 np0005486557.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Oct 13 20:49:00 np0005486557.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 13 20:49:00 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 13 20:49:00 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:49:00 np0005486557.novalocal setroubleshoot[95380]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Oct 13 20:49:00 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 0f4f0307-c8c9-4af1-be3a-4f46c1368c28 Oct 13 20:49:00 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:49:00 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c4d8ab8f-ebdc-42bc-b570-9d2d263e1fe7 Oct 13 20:49:00 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:49:00 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 8c62f848-5fe9-4e74-94b9-1d238b0ca82c Oct 13 20:49:00 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:00 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98604d51-9895-4f07-b3d3-a08fc4a35bd3 Oct 13 20:49:00 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:00 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l af37ad94-dc94-44a6-8a32-7c1b5b5be733 Oct 13 20:49:00 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:00 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l e3227df9-501e-4b5b-acc3-681936564f7e Oct 13 20:49:00 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a1c1f852-8d52-4901-800e-b33172a0e4f8 Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1a82a36c-7758-4914-8e0c-f9018ae5044b Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 3bfc11ad-07ee-424e-920f-dad35cecf47d Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 4cce59b0-77c5-4dad-a6ff-dbd5c09f35c0 Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e0324ff8-3480-4d35-99ea-daf9571c3540 Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 8f0122ac-34c4-4d15-acc5-93484fad0038 Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 20b9d5fc-ffa8-459b-87e9-6c738988bfeb Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l e5c53959-fe67-4ad5-bbc4-03e1df109faa Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 49072790-8997-477e-8c10-15511f21cb33 Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. For complete SELinux messages run: sealert -l 305ddb2e-563b-43df-a7a5-9b042e674240 Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. For complete SELinux messages run: sealert -l 980bdd32-aa12-4eb5-8562-6464cbdc91fd Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 604d6e2e-9fa7-4355-91ee-c7b4495bfdc6 Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. For complete SELinux messages run: sealert -l 980bdd32-aa12-4eb5-8562-6464cbdc91fd Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 604d6e2e-9fa7-4355-91ee-c7b4495bfdc6 Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. For complete SELinux messages run: sealert -l 6171c909-8414-431b-a1bc-edd3556db3b0 Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 788a640e-4a41-4497-b364-c620a95d6055 Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:01 np0005486557.novalocal sudo[95495]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Oct 13 20:49:01 np0005486557.novalocal systemd[1]: Started Session c171 of User root. Oct 13 20:49:01 np0005486557.novalocal sudo[95495]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 9662081d-dd3c-4214-8670-f34d9c02ed59 Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l dbac7ea3-d717-4fbb-af00-c1da53023ea1 Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:49:01 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 6541765a-7f61-4f52-bbef-a7853ca3a7e9 Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: failed to retrieve rpm info for path '/dev/sda': Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l ac0ce202-8235-4e41-8f78-01d1c1666383 Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:02 np0005486557.novalocal sudo[95495]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:02 np0005486557.novalocal systemd[1]: session-c171.scope: Deactivated successfully. Oct 13 20:49:02 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:49:02 np0005486557.novalocal sudo[95508]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 9e14bd2c-1c7f-44b7-b379-0ef74a1053b3 Oct 13 20:49:02 np0005486557.novalocal systemd[1]: Started Session c172 of User root. Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:49:02 np0005486557.novalocal sudo[95508]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l f8941418-7909-4bb5-ac70-2036c6f6f8e0 Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 68e4d091-746c-4a47-9b13-cdf9fb352c0a Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 69ef7c6c-1664-4ae2-81a5-9eeddd480dfc Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 6ba4dc6f-a508-4a65-97e6-29609aef50ea Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 59e09ee9-9ede-4ee6-a793-af1b3a45be3d Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:49:02 np0005486557.novalocal sudo[95508]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:02 np0005486557.novalocal systemd[1]: session-c172.scope: Deactivated successfully. Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 8e7b9eb5-00af-4e2b-a5a0-0fa395ab283e Oct 13 20:49:02 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 13 20:49:02 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l c5a52ec1-f6a3-444a-b427-6c63a6e0359a Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8de0bc99-c435-4f60-89c3-4e83afeb53ec Oct 13 20:49:02 np0005486557.novalocal iscsid[70744]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d, portal: ::1,3260] through [iface: default] is shutdown. Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 673a1ceb-f787-4126-bcbc-40873053bee6 Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l f8941418-7909-4bb5-ac70-2036c6f6f8e0 Oct 13 20:49:02 np0005486557.novalocal sudo[95558]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d iqn.1994-05.com.redhat:e2594393a727 Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 68e4d091-746c-4a47-9b13-cdf9fb352c0a Oct 13 20:49:02 np0005486557.novalocal systemd[1]: Started Session c173 of User root. Oct 13 20:49:02 np0005486557.novalocal sudo[95558]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 69ef7c6c-1664-4ae2-81a5-9eeddd480dfc Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 6ba4dc6f-a508-4a65-97e6-29609aef50ea Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 59e09ee9-9ede-4ee6-a793-af1b3a45be3d Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 9e14bd2c-1c7f-44b7-b379-0ef74a1053b3 Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98604d51-9895-4f07-b3d3-a08fc4a35bd3 Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l af37ad94-dc94-44a6-8a32-7c1b5b5be733 Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l e3227df9-501e-4b5b-acc3-681936564f7e Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a1c1f852-8d52-4901-800e-b33172a0e4f8 Oct 13 20:49:02 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1a82a36c-7758-4914-8e0c-f9018ae5044b Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 4cce59b0-77c5-4dad-a6ff-dbd5c09f35c0 Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e0324ff8-3480-4d35-99ea-daf9571c3540 Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 3bfc11ad-07ee-424e-920f-dad35cecf47d Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l e6ac9743-6a1f-491e-bf0c-67074d0c8417 Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 0f4f0307-c8c9-4af1-be3a-4f46c1368c28 Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c4d8ab8f-ebdc-42bc-b570-9d2d263e1fe7 Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l d629571f-4fb8-4a29-857b-a54b59f536b7 Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 6541765a-7f61-4f52-bbef-a7853ca3a7e9 Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d. For complete SELinux messages run: sealert -l 8f0122ac-34c4-4d15-acc5-93484fad0038 Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l c80bc617-57ba-456e-8eef-82dfc669a3c4 Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 527df182-574e-4481-8bb2-fe424acccff9 Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d. For complete SELinux messages run: sealert -l 1ad47321-dc36-4819-9943-f3c7b1051872 Oct 13 20:49:03 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:03 np0005486557.novalocal sudo[95558]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:03 np0005486557.novalocal systemd[1]: session-c173.scope: Deactivated successfully. Oct 13 20:49:03 np0005486557.novalocal sudo[95566]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:49:03 np0005486557.novalocal systemd[1]: Started Session c174 of User root. Oct 13 20:49:03 np0005486557.novalocal sudo[95566]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:03 np0005486557.novalocal sudo[95566]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:03 np0005486557.novalocal systemd[1]: session-c174.scope: Deactivated successfully. Oct 13 20:49:03 np0005486557.novalocal sudo[95571]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 13 20:49:03 np0005486557.novalocal systemd[1]: Started Session c175 of User root. Oct 13 20:49:03 np0005486557.novalocal sudo[95571]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:04 np0005486557.novalocal sudo[95571]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:04 np0005486557.novalocal systemd[1]: session-c175.scope: Deactivated successfully. Oct 13 20:49:04 np0005486557.novalocal sudo[95577]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d Oct 13 20:49:04 np0005486557.novalocal systemd[1]: Started Session c176 of User root. Oct 13 20:49:04 np0005486557.novalocal sudo[95577]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:05 np0005486557.novalocal sudo[95577]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:05 np0005486557.novalocal systemd[1]: session-c176.scope: Deactivated successfully. Oct 13 20:49:05 np0005486557.novalocal sudo[95582]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:49:05 np0005486557.novalocal systemd[1]: Started Session c177 of User root. Oct 13 20:49:05 np0005486557.novalocal sudo[95582]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:05 np0005486557.novalocal sudo[95582]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:05 np0005486557.novalocal systemd[1]: session-c177.scope: Deactivated successfully. Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 996a9dbd-c111-4c87-ae7b-7277433abc06 Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 66f93532-c8ae-4237-835f-424ef6d44279 Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l ac0ce202-8235-4e41-8f78-01d1c1666383 Oct 13 20:49:06 np0005486557.novalocal sudo[95606]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-48dae6bc-f658-4a7d-86d0-04401327063d Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:06 np0005486557.novalocal systemd[1]: Started Session c178 of User root. Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l d629571f-4fb8-4a29-857b-a54b59f536b7 Oct 13 20:49:06 np0005486557.novalocal sudo[95606]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8de0bc99-c435-4f60-89c3-4e83afeb53ec Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 673a1ceb-f787-4126-bcbc-40873053bee6 Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l c77561fd-ceb8-43ce-ace3-25ebbfbe5213 Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 727aa859-6a69-4801-8fb3-b17ee37f32f3 Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a3dce856-b059-49fc-86ee-c0b4855a31bc Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l bc43eed9-46f6-475e-983a-c5fdde4e5077 Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-GfyHkD. For complete SELinux messages run: sealert -l 077347e3-e8a6-4ab3-9c72-a5071a7ba3d0 Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-GfyHkD. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-GfyHkD file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 52e671fc-2db7-456a-81d6-0a89403f803f Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l f59f5a6a-a099-48e6-8e29-050304c42951 Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l a2153f30-bda5-4821-b931-f65cf2f3087e Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 8bfa59e7-18bb-4420-bfd8-fc79a1bb695d Oct 13 20:49:06 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:07 np0005486557.novalocal sudo[95606]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:07 np0005486557.novalocal systemd[1]: session-c178.scope: Deactivated successfully. Oct 13 20:49:07 np0005486557.novalocal sudo[95610]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-48dae6bc-f658-4a7d-86d0-04401327063d iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d BMdGWwfWHR2xegEdWNTM r4XZUujTaCUjBNY9 False -p3260 -a::1 Oct 13 20:49:07 np0005486557.novalocal systemd[1]: Started Session c179 of User root. Oct 13 20:49:07 np0005486557.novalocal sudo[95610]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:07 np0005486557.novalocal sudo[95610]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:07 np0005486557.novalocal systemd[1]: session-c179.scope: Deactivated successfully. Oct 13 20:49:07 np0005486557.novalocal sudo[95616]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 13 20:49:07 np0005486557.novalocal systemd[1]: Started Session c180 of User root. Oct 13 20:49:07 np0005486557.novalocal sudo[95616]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:08 np0005486557.novalocal sudo[95616]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:08 np0005486557.novalocal systemd[1]: session-c180.scope: Deactivated successfully. Oct 13 20:49:08 np0005486557.novalocal sudo[95621]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:49:08 np0005486557.novalocal systemd[1]: Started Session c181 of User root. Oct 13 20:49:08 np0005486557.novalocal sudo[95621]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:08 np0005486557.novalocal sudo[95621]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:08 np0005486557.novalocal systemd[1]: session-c181.scope: Deactivated successfully. Oct 13 20:49:08 np0005486557.novalocal sudo[95626]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d BMdGWwfWHR2xegEdWNTM r4XZUujTaCUjBNY9 iqn.1994-05.com.redhat:e2594393a727 Oct 13 20:49:08 np0005486557.novalocal systemd[1]: Started Session c182 of User root. Oct 13 20:49:08 np0005486557.novalocal sudo[95626]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:09 np0005486557.novalocal sudo[95626]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:09 np0005486557.novalocal systemd[1]: session-c182.scope: Deactivated successfully. Oct 13 20:49:09 np0005486557.novalocal sudo[95631]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:49:09 np0005486557.novalocal systemd[1]: Started Session c183 of User root. Oct 13 20:49:09 np0005486557.novalocal sudo[95631]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:10 np0005486557.novalocal sudo[95631]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:10 np0005486557.novalocal systemd[1]: session-c183.scope: Deactivated successfully. Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 8c62f848-5fe9-4e74-94b9-1d238b0ca82c Oct 13 20:49:10 np0005486557.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 13 20:49:10 np0005486557.novalocal iscsid[70744]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d, portal: ::1,3260] through [iface: default] is operational now Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98604d51-9895-4f07-b3d3-a08fc4a35bd3 Oct 13 20:49:10 np0005486557.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 13 20:49:10 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 13 20:49:10 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014058f0f4fdd56b64bcfb5f8297ec port group 0 rel port 1 Oct 13 20:49:10 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 13 20:49:10 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 13 20:49:10 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 13 20:49:10 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 13 20:49:10 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:49:10 np0005486557.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Oct 13 20:49:10 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 13 20:49:10 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 13 20:49:10 np0005486557.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 13 20:49:10 np0005486557.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Oct 13 20:49:10 np0005486557.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l af37ad94-dc94-44a6-8a32-7c1b5b5be733 Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l e3227df9-501e-4b5b-acc3-681936564f7e Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a1c1f852-8d52-4901-800e-b33172a0e4f8 Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1a82a36c-7758-4914-8e0c-f9018ae5044b Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 3bfc11ad-07ee-424e-920f-dad35cecf47d Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 4cce59b0-77c5-4dad-a6ff-dbd5c09f35c0 Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e0324ff8-3480-4d35-99ea-daf9571c3540 Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 8f0122ac-34c4-4d15-acc5-93484fad0038 Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 20b9d5fc-ffa8-459b-87e9-6c738988bfeb Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l e5c53959-fe67-4ad5-bbc4-03e1df109faa Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 49072790-8997-477e-8c10-15511f21cb33 Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. For complete SELinux messages run: sealert -l 305ddb2e-563b-43df-a7a5-9b042e674240 Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. For complete SELinux messages run: sealert -l 980bdd32-aa12-4eb5-8562-6464cbdc91fd Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 604d6e2e-9fa7-4355-91ee-c7b4495bfdc6 Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98604d51-9895-4f07-b3d3-a08fc4a35bd3 Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l af37ad94-dc94-44a6-8a32-7c1b5b5be733 Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1a82a36c-7758-4914-8e0c-f9018ae5044b Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. For complete SELinux messages run: sealert -l 980bdd32-aa12-4eb5-8562-6464cbdc91fd Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 604d6e2e-9fa7-4355-91ee-c7b4495bfdc6 Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. For complete SELinux messages run: sealert -l 6171c909-8414-431b-a1bc-edd3556db3b0 Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 788a640e-4a41-4497-b364-c620a95d6055 Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e0324ff8-3480-4d35-99ea-daf9571c3540 Oct 13 20:49:10 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:11 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l dbac7ea3-d717-4fbb-af00-c1da53023ea1 Oct 13 20:49:11 np0005486557.novalocal sudo[95688]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Oct 13 20:49:11 np0005486557.novalocal systemd[1]: Started Session c184 of User root. Oct 13 20:49:11 np0005486557.novalocal sudo[95688]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 13 20:49:11 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:49:11 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 6541765a-7f61-4f52-bbef-a7853ca3a7e9 Oct 13 20:49:11 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:49:11 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l ac0ce202-8235-4e41-8f78-01d1c1666383 Oct 13 20:49:11 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:11 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 9e14bd2c-1c7f-44b7-b379-0ef74a1053b3 Oct 13 20:49:11 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:49:11 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l f8941418-7909-4bb5-ac70-2036c6f6f8e0 Oct 13 20:49:11 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:49:11 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 68e4d091-746c-4a47-9b13-cdf9fb352c0a Oct 13 20:49:11 np0005486557.novalocal sudo[95688]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:11 np0005486557.novalocal systemd[1]: session-c184.scope: Deactivated successfully. Oct 13 20:49:11 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:49:11 np0005486557.novalocal sudo[95693]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Oct 13 20:49:11 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 69ef7c6c-1664-4ae2-81a5-9eeddd480dfc Oct 13 20:49:11 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 13 20:49:11 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 6ba4dc6f-a508-4a65-97e6-29609aef50ea Oct 13 20:49:12 np0005486557.novalocal systemd[1]: Started Session c185 of User root. Oct 13 20:49:12 np0005486557.novalocal sudo[95693]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 59e09ee9-9ede-4ee6-a793-af1b3a45be3d Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 6ba4dc6f-a508-4a65-97e6-29609aef50ea Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 59e09ee9-9ede-4ee6-a793-af1b3a45be3d Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 9e14bd2c-1c7f-44b7-b379-0ef74a1053b3 Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 8e7b9eb5-00af-4e2b-a5a0-0fa395ab283e Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l d629571f-4fb8-4a29-857b-a54b59f536b7 Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8de0bc99-c435-4f60-89c3-4e83afeb53ec Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 673a1ceb-f787-4126-bcbc-40873053bee6 Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 13 20:49:12 np0005486557.novalocal sudo[95693]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:12 np0005486557.novalocal systemd[1]: session-c185.scope: Deactivated successfully. Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 3bfc11ad-07ee-424e-920f-dad35cecf47d Oct 13 20:49:12 np0005486557.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 13 20:49:12 np0005486557.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l e3227df9-501e-4b5b-acc3-681936564f7e Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:12 np0005486557.novalocal iscsid[70744]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d, portal: ::1,3260] through [iface: default] is shutdown. Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a1c1f852-8d52-4901-800e-b33172a0e4f8 Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 4cce59b0-77c5-4dad-a6ff-dbd5c09f35c0 Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l e6ac9743-6a1f-491e-bf0c-67074d0c8417 Oct 13 20:49:12 np0005486557.novalocal sudo[95732]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d iqn.1994-05.com.redhat:e2594393a727 Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:49:12 np0005486557.novalocal systemd[1]: Started Session c186 of User root. Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 0f4f0307-c8c9-4af1-be3a-4f46c1368c28 Oct 13 20:49:12 np0005486557.novalocal sudo[95732]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c4d8ab8f-ebdc-42bc-b570-9d2d263e1fe7 Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 6541765a-7f61-4f52-bbef-a7853ca3a7e9 Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d. For complete SELinux messages run: sealert -l 8f0122ac-34c4-4d15-acc5-93484fad0038 Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l c80bc617-57ba-456e-8eef-82dfc669a3c4 Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 527df182-574e-4481-8bb2-fe424acccff9 Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d. For complete SELinux messages run: sealert -l 1ad47321-dc36-4819-9943-f3c7b1051872 Oct 13 20:49:12 np0005486557.novalocal setroubleshoot[95380]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 13 20:49:13 np0005486557.novalocal sudo[95732]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:13 np0005486557.novalocal systemd[1]: session-c186.scope: Deactivated successfully. Oct 13 20:49:13 np0005486557.novalocal sudo[95740]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:49:13 np0005486557.novalocal systemd[1]: Started Session c187 of User root. Oct 13 20:49:13 np0005486557.novalocal sudo[95740]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:13 np0005486557.novalocal sudo[95740]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:13 np0005486557.novalocal systemd[1]: session-c187.scope: Deactivated successfully. Oct 13 20:49:13 np0005486557.novalocal sudo[95745]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 13 20:49:13 np0005486557.novalocal systemd[1]: Started Session c188 of User root. Oct 13 20:49:13 np0005486557.novalocal sudo[95745]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:14 np0005486557.novalocal sudo[95745]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:14 np0005486557.novalocal systemd[1]: session-c188.scope: Deactivated successfully. Oct 13 20:49:14 np0005486557.novalocal sudo[95750]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-48dae6bc-f658-4a7d-86d0-04401327063d Oct 13 20:49:14 np0005486557.novalocal systemd[1]: Started Session c189 of User root. Oct 13 20:49:14 np0005486557.novalocal sudo[95750]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:14 np0005486557.novalocal sudo[95750]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:14 np0005486557.novalocal systemd[1]: session-c189.scope: Deactivated successfully. Oct 13 20:49:14 np0005486557.novalocal sudo[95755]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 13 20:49:14 np0005486557.novalocal systemd[1]: Started Session c190 of User root. Oct 13 20:49:14 np0005486557.novalocal sudo[95755]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:15 np0005486557.novalocal sudo[95755]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:15 np0005486557.novalocal systemd[1]: session-c190.scope: Deactivated successfully. Oct 13 20:49:18 np0005486557.novalocal sudo[95798]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 13 20:49:18 np0005486557.novalocal systemd[1]: Started Session c191 of User root. Oct 13 20:49:18 np0005486557.novalocal sudo[95798]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:18 np0005486557.novalocal sudo[95798]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:18 np0005486557.novalocal systemd[1]: session-c191.scope: Deactivated successfully. Oct 13 20:49:18 np0005486557.novalocal sudo[95803]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-48dae6bc-f658-4a7d-86d0-04401327063d Oct 13 20:49:18 np0005486557.novalocal systemd[1]: Started Session c192 of User root. Oct 13 20:49:18 np0005486557.novalocal sudo[95803]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:19 np0005486557.novalocal sudo[95803]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:19 np0005486557.novalocal systemd[1]: session-c192.scope: Deactivated successfully. Oct 13 20:49:19 np0005486557.novalocal sudo[95807]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-48dae6bc-f658-4a7d-86d0-04401327063d Oct 13 20:49:19 np0005486557.novalocal systemd[1]: Started Session c193 of User root. Oct 13 20:49:19 np0005486557.novalocal sudo[95807]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:19 np0005486557.novalocal sudo[95807]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:19 np0005486557.novalocal systemd[1]: session-c193.scope: Deactivated successfully. Oct 13 20:49:19 np0005486557.novalocal sudo[95811]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-48dae6bc-f658-4a7d-86d0-04401327063d Oct 13 20:49:19 np0005486557.novalocal systemd[1]: Started Session c194 of User root. Oct 13 20:49:19 np0005486557.novalocal sudo[95811]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:20 np0005486557.novalocal lvm[95818]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:49:20 np0005486557.novalocal lvm[95818]: VG cinder-volumes finished Oct 13 20:49:20 np0005486557.novalocal sudo[95811]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:20 np0005486557.novalocal systemd[1]: session-c194.scope: Deactivated successfully. Oct 13 20:49:20 np0005486557.novalocal sudo[95819]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:49:20 np0005486557.novalocal systemd[1]: Started Session c195 of User root. Oct 13 20:49:20 np0005486557.novalocal sudo[95819]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:20 np0005486557.novalocal sudo[95819]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:20 np0005486557.novalocal systemd[1]: session-c195.scope: Deactivated successfully. Oct 13 20:49:20 np0005486557.novalocal sudo[95823]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:49:20 np0005486557.novalocal systemd[1]: Started Session c196 of User root. Oct 13 20:49:20 np0005486557.novalocal sudo[95823]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:21 np0005486557.novalocal sudo[95823]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:21 np0005486557.novalocal systemd[1]: session-c196.scope: Deactivated successfully. Oct 13 20:49:21 np0005486557.novalocal sudo[95827]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:49:21 np0005486557.novalocal systemd[1]: Started Session c197 of User root. Oct 13 20:49:21 np0005486557.novalocal sudo[95827]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:21 np0005486557.novalocal sudo[95827]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:21 np0005486557.novalocal systemd[1]: session-c197.scope: Deactivated successfully. Oct 13 20:49:21 np0005486557.novalocal sudo[95831]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:49:21 np0005486557.novalocal systemd[1]: Started Session c198 of User root. Oct 13 20:49:21 np0005486557.novalocal sudo[95831]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:21 np0005486557.novalocal sudo[95831]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:21 np0005486557.novalocal systemd[1]: session-c198.scope: Deactivated successfully. Oct 13 20:49:22 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Deactivated successfully. Oct 13 20:49:22 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Consumed 1.385s CPU time. Oct 13 20:49:22 np0005486557.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 13 20:49:22 np0005486557.novalocal systemd[1]: setroubleshootd.service: Consumed 5.997s CPU time. Oct 13 20:49:25 np0005486557.novalocal sudo[95838]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-d66930b0-6946-4e5b-9bc9-fd528a01f2d6 cinder-volumes/cinder-volumes-pool Oct 13 20:49:25 np0005486557.novalocal systemd[1]: Started Session c199 of User root. Oct 13 20:49:25 np0005486557.novalocal sudo[95838]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:26 np0005486557.novalocal lvm[95849]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:49:26 np0005486557.novalocal lvm[95849]: VG cinder-volumes finished Oct 13 20:49:26 np0005486557.novalocal sudo[95838]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:26 np0005486557.novalocal systemd[1]: session-c199.scope: Deactivated successfully. Oct 13 20:49:29 np0005486557.novalocal sudo[95850]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:49:29 np0005486557.novalocal systemd[1]: Started Session c200 of User root. Oct 13 20:49:29 np0005486557.novalocal sudo[95850]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:29 np0005486557.novalocal sudo[95850]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:29 np0005486557.novalocal systemd[1]: session-c200.scope: Deactivated successfully. Oct 13 20:49:29 np0005486557.novalocal sudo[95854]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:49:29 np0005486557.novalocal systemd[1]: Started Session c201 of User root. Oct 13 20:49:29 np0005486557.novalocal sudo[95854]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:30 np0005486557.novalocal sudo[95854]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:30 np0005486557.novalocal systemd[1]: session-c201.scope: Deactivated successfully. Oct 13 20:49:30 np0005486557.novalocal sudo[95858]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:49:30 np0005486557.novalocal systemd[1]: Started Session c202 of User root. Oct 13 20:49:30 np0005486557.novalocal sudo[95858]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:30 np0005486557.novalocal sudo[95858]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:30 np0005486557.novalocal systemd[1]: session-c202.scope: Deactivated successfully. Oct 13 20:49:30 np0005486557.novalocal sudo[95862]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:49:30 np0005486557.novalocal systemd[1]: Started Session c203 of User root. Oct 13 20:49:30 np0005486557.novalocal sudo[95862]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:49:31 np0005486557.novalocal sudo[95862]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:31 np0005486557.novalocal systemd[1]: session-c203.scope: Deactivated successfully. Oct 13 20:49:38 np0005486557.novalocal kernel: tap4bd3ff5a-69: entered promiscuous mode Oct 13 20:49:38 np0005486557.novalocal NetworkManager[856]: [1760402978.6938] manager: (tap4bd3ff5a-69): new Tun device (/org/freedesktop/NetworkManager/Devices/30) Oct 13 20:49:38 np0005486557.novalocal virtqemud[90345]: Domain id=9 name='instance-00000008' uuid=87528f4e-d299-4518-a629-018ea7933689 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 13 20:49:38 np0005486557.novalocal virtqemud[90345]: Domain id=9 name='instance-00000008' uuid=87528f4e-d299-4518-a629-018ea7933689 is tainted: deprecated-config (CPU model 'qemu64') Oct 13 20:49:38 np0005486557.novalocal systemd-udevd[95912]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:49:38 np0005486557.novalocal systemd-machined[87255]: New machine qemu-9-instance-00000008. Oct 13 20:49:38 np0005486557.novalocal systemd[1]: Started Virtual Machine qemu-9-instance-00000008. Oct 13 20:49:38 np0005486557.novalocal NetworkManager[856]: [1760402978.7895] device (tap4bd3ff5a-69): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 13 20:49:38 np0005486557.novalocal NetworkManager[856]: [1760402978.7913] device (tap4bd3ff5a-69): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 13 20:49:38 np0005486557.novalocal NetworkManager[856]: [1760402978.8274] manager: (tap03d66ff8-b0): new Veth device (/org/freedesktop/NetworkManager/Devices/31) Oct 13 20:49:38 np0005486557.novalocal NetworkManager[856]: [1760402978.8963] device (tap03d66ff8-b0): carrier: link connected Oct 13 20:49:39 np0005486557.novalocal kernel: tap03d66ff8-b0: entered promiscuous mode Oct 13 20:49:39 np0005486557.novalocal sudo[95958]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-03d66ff8-bf6b-4f80-a9cc-67eb9c5c164d env PROCESS_TAG=haproxy-03d66ff8-bf6b-4f80-a9cc-67eb9c5c164d haproxy -f /var/lib/neutron/ovn-metadata-proxy/03d66ff8-bf6b-4f80-a9cc-67eb9c5c164d.conf Oct 13 20:49:39 np0005486557.novalocal systemd[1]: Started Session c204 of User root. Oct 13 20:49:39 np0005486557.novalocal sudo[95958]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:49:39 np0005486557.novalocal sudo[95958]: pam_unix(sudo:session): session closed for user root Oct 13 20:49:51 np0005486557.novalocal kernel: tap4bd3ff5a-69 (unregistering): left promiscuous mode Oct 13 20:49:51 np0005486557.novalocal NetworkManager[856]: [1760402991.3855] device (tap4bd3ff5a-69): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 13 20:49:51 np0005486557.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Deactivated successfully. Oct 13 20:49:51 np0005486557.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Consumed 12.368s CPU time. Oct 13 20:49:51 np0005486557.novalocal systemd-machined[87255]: Machine qemu-9-instance-00000008 terminated. Oct 13 20:49:51 np0005486557.novalocal kernel: tap03d66ff8-b0: left promiscuous mode Oct 13 20:49:51 np0005486557.novalocal systemd[1]: session-c204.scope: Deactivated successfully. Oct 13 20:49:51 np0005486557.novalocal systemd[1]: run-netns-ovnmeta\x2d03d66ff8\x2dbf6b\x2d4f80\x2da9cc\x2d67eb9c5c164d.mount: Deactivated successfully. Oct 13 20:50:00 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:50:00 np0005486557.novalocal sudo[96061]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-d66930b0-6946-4e5b-9bc9-fd528a01f2d6 Oct 13 20:50:00 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:50:00 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:50:00 np0005486557.novalocal systemd[1]: Started Session c205 of User root. Oct 13 20:50:00 np0005486557.novalocal sudo[96061]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:01 np0005486557.novalocal sudo[96061]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:01 np0005486557.novalocal systemd[1]: session-c205.scope: Deactivated successfully. Oct 13 20:50:01 np0005486557.novalocal sudo[96066]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-d66930b0-6946-4e5b-9bc9-fd528a01f2d6 Oct 13 20:50:01 np0005486557.novalocal systemd[1]: Started Session c206 of User root. Oct 13 20:50:01 np0005486557.novalocal sudo[96066]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:01 np0005486557.novalocal sudo[96066]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:01 np0005486557.novalocal systemd[1]: session-c206.scope: Deactivated successfully. Oct 13 20:50:01 np0005486557.novalocal sudo[96070]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-d66930b0-6946-4e5b-9bc9-fd528a01f2d6 Oct 13 20:50:01 np0005486557.novalocal systemd[1]: Started Session c207 of User root. Oct 13 20:50:01 np0005486557.novalocal sudo[96070]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:02 np0005486557.novalocal lvm[96077]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:02 np0005486557.novalocal lvm[96077]: VG cinder-volumes finished Oct 13 20:50:02 np0005486557.novalocal sudo[96070]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:02 np0005486557.novalocal systemd[1]: session-c207.scope: Deactivated successfully. Oct 13 20:50:02 np0005486557.novalocal sudo[96078]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:50:02 np0005486557.novalocal systemd[1]: Started Session c208 of User root. Oct 13 20:50:02 np0005486557.novalocal sudo[96078]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:02 np0005486557.novalocal sudo[96078]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:02 np0005486557.novalocal systemd[1]: session-c208.scope: Deactivated successfully. Oct 13 20:50:02 np0005486557.novalocal sudo[96082]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:02 np0005486557.novalocal systemd[1]: Started Session c209 of User root. Oct 13 20:50:02 np0005486557.novalocal sudo[96082]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:03 np0005486557.novalocal sudo[96082]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:03 np0005486557.novalocal systemd[1]: session-c209.scope: Deactivated successfully. Oct 13 20:50:03 np0005486557.novalocal sudo[96086]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:50:03 np0005486557.novalocal systemd[1]: Started Session c210 of User root. Oct 13 20:50:03 np0005486557.novalocal sudo[96086]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:03 np0005486557.novalocal sudo[96086]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:03 np0005486557.novalocal systemd[1]: session-c210.scope: Deactivated successfully. Oct 13 20:50:03 np0005486557.novalocal sudo[96090]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:03 np0005486557.novalocal systemd[1]: Started Session c211 of User root. Oct 13 20:50:03 np0005486557.novalocal sudo[96090]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:03 np0005486557.novalocal sudo[96090]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:03 np0005486557.novalocal systemd[1]: session-c211.scope: Deactivated successfully. Oct 13 20:50:07 np0005486557.novalocal sudo[96101]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-9a4f39a8-761d-473d-99c6-33ce138126c9 cinder-volumes/cinder-volumes-pool Oct 13 20:50:07 np0005486557.novalocal systemd[1]: Started Session c212 of User root. Oct 13 20:50:07 np0005486557.novalocal sudo[96101]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:08 np0005486557.novalocal lvm[96114]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:08 np0005486557.novalocal lvm[96114]: VG cinder-volumes finished Oct 13 20:50:08 np0005486557.novalocal sudo[96101]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:08 np0005486557.novalocal systemd[1]: session-c212.scope: Deactivated successfully. Oct 13 20:50:09 np0005486557.novalocal sudo[96117]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-f9a50282-e940-4c0b-8879-37672ee11abd cinder-volumes/cinder-volumes-pool Oct 13 20:50:09 np0005486557.novalocal systemd[1]: Started Session c213 of User root. Oct 13 20:50:09 np0005486557.novalocal sudo[96117]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:09 np0005486557.novalocal lvm[96126]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:09 np0005486557.novalocal lvm[96126]: VG cinder-volumes finished Oct 13 20:50:09 np0005486557.novalocal sudo[96117]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:09 np0005486557.novalocal systemd[1]: session-c213.scope: Deactivated successfully. Oct 13 20:50:10 np0005486557.novalocal sudo[96128]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-f9a50282-e940-4c0b-8879-37672ee11abd Oct 13 20:50:10 np0005486557.novalocal systemd[1]: Started Session c214 of User root. Oct 13 20:50:10 np0005486557.novalocal sudo[96128]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:10 np0005486557.novalocal sudo[96128]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:10 np0005486557.novalocal systemd[1]: session-c214.scope: Deactivated successfully. Oct 13 20:50:11 np0005486557.novalocal sudo[96132]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-f9a50282-e940-4c0b-8879-37672ee11abd Oct 13 20:50:11 np0005486557.novalocal systemd[1]: Started Session c215 of User root. Oct 13 20:50:11 np0005486557.novalocal sudo[96132]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:11 np0005486557.novalocal sudo[96132]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:11 np0005486557.novalocal systemd[1]: session-c215.scope: Deactivated successfully. Oct 13 20:50:11 np0005486557.novalocal sudo[96137]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-f9a50282-e940-4c0b-8879-37672ee11abd Oct 13 20:50:11 np0005486557.novalocal systemd[1]: Started Session c216 of User root. Oct 13 20:50:11 np0005486557.novalocal sudo[96137]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:11 np0005486557.novalocal lvm[96145]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:11 np0005486557.novalocal lvm[96145]: VG cinder-volumes finished Oct 13 20:50:11 np0005486557.novalocal sudo[96137]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:11 np0005486557.novalocal systemd[1]: session-c216.scope: Deactivated successfully. Oct 13 20:50:12 np0005486557.novalocal sudo[96146]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:50:12 np0005486557.novalocal systemd[1]: Started Session c217 of User root. Oct 13 20:50:12 np0005486557.novalocal sudo[96146]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:12 np0005486557.novalocal sudo[96146]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:12 np0005486557.novalocal systemd[1]: session-c217.scope: Deactivated successfully. Oct 13 20:50:12 np0005486557.novalocal sudo[96150]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:12 np0005486557.novalocal systemd[1]: Started Session c218 of User root. Oct 13 20:50:12 np0005486557.novalocal sudo[96150]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:12 np0005486557.novalocal sudo[96153]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-9a4f39a8-761d-473d-99c6-33ce138126c9 Oct 13 20:50:12 np0005486557.novalocal systemd[1]: Started Session c219 of User root. Oct 13 20:50:12 np0005486557.novalocal sudo[96153]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:12 np0005486557.novalocal sudo[96150]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:12 np0005486557.novalocal systemd[1]: session-c218.scope: Deactivated successfully. Oct 13 20:50:12 np0005486557.novalocal sudo[96157]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:50:12 np0005486557.novalocal systemd[1]: Started Session c220 of User root. Oct 13 20:50:12 np0005486557.novalocal sudo[96157]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:13 np0005486557.novalocal sudo[96153]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:13 np0005486557.novalocal systemd[1]: session-c219.scope: Deactivated successfully. Oct 13 20:50:13 np0005486557.novalocal sudo[96161]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-9a4f39a8-761d-473d-99c6-33ce138126c9 Oct 13 20:50:13 np0005486557.novalocal systemd[1]: Started Session c221 of User root. Oct 13 20:50:13 np0005486557.novalocal sudo[96161]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:13 np0005486557.novalocal sudo[96157]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:13 np0005486557.novalocal systemd[1]: session-c220.scope: Deactivated successfully. Oct 13 20:50:13 np0005486557.novalocal sudo[96165]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:13 np0005486557.novalocal systemd[1]: Started Session c222 of User root. Oct 13 20:50:13 np0005486557.novalocal sudo[96165]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:13 np0005486557.novalocal sudo[96161]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:13 np0005486557.novalocal systemd[1]: session-c221.scope: Deactivated successfully. Oct 13 20:50:13 np0005486557.novalocal sudo[96169]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-9a4f39a8-761d-473d-99c6-33ce138126c9 Oct 13 20:50:13 np0005486557.novalocal systemd[1]: Started Session c223 of User root. Oct 13 20:50:13 np0005486557.novalocal sudo[96169]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:13 np0005486557.novalocal sudo[96165]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:13 np0005486557.novalocal systemd[1]: session-c222.scope: Deactivated successfully. Oct 13 20:50:13 np0005486557.novalocal lvm[96175]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:13 np0005486557.novalocal lvm[96175]: VG cinder-volumes finished Oct 13 20:50:13 np0005486557.novalocal sudo[96169]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:13 np0005486557.novalocal systemd[1]: session-c223.scope: Deactivated successfully. Oct 13 20:50:14 np0005486557.novalocal sudo[96176]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:50:14 np0005486557.novalocal systemd[1]: Started Session c224 of User root. Oct 13 20:50:14 np0005486557.novalocal sudo[96176]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:14 np0005486557.novalocal sudo[96176]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:14 np0005486557.novalocal systemd[1]: session-c224.scope: Deactivated successfully. Oct 13 20:50:14 np0005486557.novalocal sudo[96180]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:14 np0005486557.novalocal systemd[1]: Started Session c225 of User root. Oct 13 20:50:14 np0005486557.novalocal sudo[96180]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:15 np0005486557.novalocal sudo[96180]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:15 np0005486557.novalocal systemd[1]: session-c225.scope: Deactivated successfully. Oct 13 20:50:15 np0005486557.novalocal sudo[96184]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:50:15 np0005486557.novalocal systemd[1]: Started Session c226 of User root. Oct 13 20:50:15 np0005486557.novalocal sudo[96184]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:15 np0005486557.novalocal sudo[96184]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:15 np0005486557.novalocal systemd[1]: session-c226.scope: Deactivated successfully. Oct 13 20:50:15 np0005486557.novalocal sudo[96191]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:15 np0005486557.novalocal systemd[1]: Started Session c227 of User root. Oct 13 20:50:15 np0005486557.novalocal sudo[96191]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:15 np0005486557.novalocal sudo[96194]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 Oct 13 20:50:15 np0005486557.novalocal systemd[1]: Started Session c228 of User root. Oct 13 20:50:15 np0005486557.novalocal sudo[96194]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:15 np0005486557.novalocal sudo[96191]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:15 np0005486557.novalocal systemd[1]: session-c227.scope: Deactivated successfully. Oct 13 20:50:16 np0005486557.novalocal sudo[96194]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:16 np0005486557.novalocal systemd[1]: session-c228.scope: Deactivated successfully. Oct 13 20:50:16 np0005486557.novalocal sudo[96200]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate --name volume-54a97fa3-8ee4-4b82-add8-71068dbd5caa --snapshot cinder-volumes/volume-a3e61e78-34b6-4b56-9f0b-156fbe7e9856 Oct 13 20:50:16 np0005486557.novalocal systemd[1]: Started Session c229 of User root. Oct 13 20:50:16 np0005486557.novalocal sudo[96200]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:16 np0005486557.novalocal dmeventd[85598]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Oct 13 20:50:16 np0005486557.novalocal dmeventd[85598]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Oct 13 20:50:16 np0005486557.novalocal lvm[96210]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:16 np0005486557.novalocal lvm[96210]: VG cinder-volumes finished Oct 13 20:50:16 np0005486557.novalocal sudo[96200]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:16 np0005486557.novalocal systemd[1]: session-c229.scope: Deactivated successfully. Oct 13 20:50:16 np0005486557.novalocal sudo[96211]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -k n cinder-volumes/volume-54a97fa3-8ee4-4b82-add8-71068dbd5caa Oct 13 20:50:16 np0005486557.novalocal systemd[1]: Started Session c230 of User root. Oct 13 20:50:16 np0005486557.novalocal sudo[96211]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:17 np0005486557.novalocal lvm[96216]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:17 np0005486557.novalocal lvm[96216]: VG cinder-volumes finished Oct 13 20:50:17 np0005486557.novalocal sudo[96211]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:17 np0005486557.novalocal systemd[1]: session-c230.scope: Deactivated successfully. Oct 13 20:50:18 np0005486557.novalocal sudo[96259]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-131f503d-e292-4a99-b768-532c0aae0484 cinder-volumes/cinder-volumes-pool Oct 13 20:50:18 np0005486557.novalocal systemd[1]: Started Session c231 of User root. Oct 13 20:50:18 np0005486557.novalocal sudo[96259]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:18 np0005486557.novalocal lvm[96268]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:18 np0005486557.novalocal lvm[96268]: VG cinder-volumes finished Oct 13 20:50:18 np0005486557.novalocal sudo[96259]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:18 np0005486557.novalocal systemd[1]: session-c231.scope: Deactivated successfully. Oct 13 20:50:19 np0005486557.novalocal sudo[96269]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-131f503d-e292-4a99-b768-532c0aae0484 Oct 13 20:50:19 np0005486557.novalocal systemd[1]: Started Session c232 of User root. Oct 13 20:50:19 np0005486557.novalocal sudo[96269]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:20 np0005486557.novalocal sudo[96269]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:20 np0005486557.novalocal systemd[1]: session-c232.scope: Deactivated successfully. Oct 13 20:50:20 np0005486557.novalocal sudo[96273]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-131f503d-e292-4a99-b768-532c0aae0484 Oct 13 20:50:20 np0005486557.novalocal systemd[1]: Started Session c233 of User root. Oct 13 20:50:20 np0005486557.novalocal sudo[96273]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:20 np0005486557.novalocal sudo[96273]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:20 np0005486557.novalocal systemd[1]: session-c233.scope: Deactivated successfully. Oct 13 20:50:20 np0005486557.novalocal sudo[96278]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-131f503d-e292-4a99-b768-532c0aae0484 Oct 13 20:50:20 np0005486557.novalocal systemd[1]: Started Session c234 of User root. Oct 13 20:50:20 np0005486557.novalocal sudo[96278]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:20 np0005486557.novalocal lvm[96285]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:20 np0005486557.novalocal lvm[96285]: VG cinder-volumes finished Oct 13 20:50:20 np0005486557.novalocal sudo[96278]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:20 np0005486557.novalocal systemd[1]: session-c234.scope: Deactivated successfully. Oct 13 20:50:21 np0005486557.novalocal sudo[96286]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:50:21 np0005486557.novalocal systemd[1]: Started Session c235 of User root. Oct 13 20:50:21 np0005486557.novalocal sudo[96286]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:21 np0005486557.novalocal sudo[96286]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:21 np0005486557.novalocal systemd[1]: session-c235.scope: Deactivated successfully. Oct 13 20:50:21 np0005486557.novalocal sudo[96291]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:21 np0005486557.novalocal systemd[1]: Started Session c236 of User root. Oct 13 20:50:21 np0005486557.novalocal sudo[96291]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:21 np0005486557.novalocal sudo[96295]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-54a97fa3-8ee4-4b82-add8-71068dbd5caa Oct 13 20:50:21 np0005486557.novalocal systemd[1]: Started Session c237 of User root. Oct 13 20:50:22 np0005486557.novalocal sudo[96295]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:22 np0005486557.novalocal sudo[96291]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:22 np0005486557.novalocal systemd[1]: session-c236.scope: Deactivated successfully. Oct 13 20:50:22 np0005486557.novalocal sudo[96298]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:50:22 np0005486557.novalocal systemd[1]: Started Session c238 of User root. Oct 13 20:50:22 np0005486557.novalocal sudo[96298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:22 np0005486557.novalocal sudo[96295]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:22 np0005486557.novalocal systemd[1]: session-c237.scope: Deactivated successfully. Oct 13 20:50:22 np0005486557.novalocal sudo[96302]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-54a97fa3-8ee4-4b82-add8-71068dbd5caa Oct 13 20:50:22 np0005486557.novalocal systemd[1]: Started Session c239 of User root. Oct 13 20:50:22 np0005486557.novalocal sudo[96302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:22 np0005486557.novalocal sudo[96298]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:22 np0005486557.novalocal systemd[1]: session-c238.scope: Deactivated successfully. Oct 13 20:50:22 np0005486557.novalocal sudo[96306]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:22 np0005486557.novalocal systemd[1]: Started Session c240 of User root. Oct 13 20:50:22 np0005486557.novalocal sudo[96306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:22 np0005486557.novalocal sudo[96302]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:22 np0005486557.novalocal systemd[1]: session-c239.scope: Deactivated successfully. Oct 13 20:50:22 np0005486557.novalocal sudo[96310]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-54a97fa3-8ee4-4b82-add8-71068dbd5caa Oct 13 20:50:22 np0005486557.novalocal systemd[1]: Started Session c241 of User root. Oct 13 20:50:22 np0005486557.novalocal sudo[96310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:22 np0005486557.novalocal sudo[96306]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:22 np0005486557.novalocal systemd[1]: session-c240.scope: Deactivated successfully. Oct 13 20:50:23 np0005486557.novalocal lvm[96316]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:23 np0005486557.novalocal lvm[96316]: VG cinder-volumes finished Oct 13 20:50:23 np0005486557.novalocal sudo[96310]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:23 np0005486557.novalocal systemd[1]: session-c241.scope: Deactivated successfully. Oct 13 20:50:23 np0005486557.novalocal sudo[96317]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:50:23 np0005486557.novalocal systemd[1]: Started Session c242 of User root. Oct 13 20:50:23 np0005486557.novalocal sudo[96317]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:23 np0005486557.novalocal sudo[96317]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:23 np0005486557.novalocal systemd[1]: session-c242.scope: Deactivated successfully. Oct 13 20:50:23 np0005486557.novalocal sudo[96321]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:23 np0005486557.novalocal systemd[1]: Started Session c243 of User root. Oct 13 20:50:23 np0005486557.novalocal sudo[96321]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:24 np0005486557.novalocal sudo[96321]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:24 np0005486557.novalocal systemd[1]: session-c243.scope: Deactivated successfully. Oct 13 20:50:24 np0005486557.novalocal sudo[96325]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:50:24 np0005486557.novalocal systemd[1]: Started Session c244 of User root. Oct 13 20:50:24 np0005486557.novalocal sudo[96325]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:24 np0005486557.novalocal sudo[96325]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:24 np0005486557.novalocal systemd[1]: session-c244.scope: Deactivated successfully. Oct 13 20:50:24 np0005486557.novalocal sudo[96329]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:24 np0005486557.novalocal systemd[1]: Started Session c245 of User root. Oct 13 20:50:24 np0005486557.novalocal sudo[96329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:25 np0005486557.novalocal sudo[96329]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:25 np0005486557.novalocal systemd[1]: session-c245.scope: Deactivated successfully. Oct 13 20:50:27 np0005486557.novalocal sudo[96335]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-a4fc73d1-3eb7-4f0f-b40b-df4b0755150c cinder-volumes/cinder-volumes-pool Oct 13 20:50:27 np0005486557.novalocal systemd[1]: Started Session c246 of User root. Oct 13 20:50:27 np0005486557.novalocal sudo[96335]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:28 np0005486557.novalocal lvm[96346]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:28 np0005486557.novalocal lvm[96346]: VG cinder-volumes finished Oct 13 20:50:28 np0005486557.novalocal sudo[96335]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:28 np0005486557.novalocal systemd[1]: session-c246.scope: Deactivated successfully. Oct 13 20:50:28 np0005486557.novalocal sudo[96347]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-7f4fbb76-b63b-46c8-9692-c84356b7f34b cinder-volumes/cinder-volumes-pool Oct 13 20:50:29 np0005486557.novalocal systemd[1]: Started Session c247 of User root. Oct 13 20:50:29 np0005486557.novalocal sudo[96347]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:29 np0005486557.novalocal lvm[96356]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:29 np0005486557.novalocal lvm[96356]: VG cinder-volumes finished Oct 13 20:50:29 np0005486557.novalocal sudo[96357]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:50:29 np0005486557.novalocal systemd[1]: Started Session c248 of User root. Oct 13 20:50:29 np0005486557.novalocal sudo[96357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:29 np0005486557.novalocal sudo[96347]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:29 np0005486557.novalocal systemd[1]: session-c247.scope: Deactivated successfully. Oct 13 20:50:29 np0005486557.novalocal sudo[96357]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:29 np0005486557.novalocal systemd[1]: session-c248.scope: Deactivated successfully. Oct 13 20:50:30 np0005486557.novalocal sudo[96361]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:30 np0005486557.novalocal systemd[1]: Started Session c249 of User root. Oct 13 20:50:30 np0005486557.novalocal sudo[96361]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:30 np0005486557.novalocal sudo[96361]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:30 np0005486557.novalocal systemd[1]: session-c249.scope: Deactivated successfully. Oct 13 20:50:30 np0005486557.novalocal sudo[96365]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-8d8e94ca-d278-47a3-a8ba-76e16f22eaaa cinder-volumes/cinder-volumes-pool Oct 13 20:50:30 np0005486557.novalocal systemd[1]: Started Session c250 of User root. Oct 13 20:50:30 np0005486557.novalocal sudo[96365]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:30 np0005486557.novalocal sudo[96367]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:50:30 np0005486557.novalocal systemd[1]: Started Session c251 of User root. Oct 13 20:50:30 np0005486557.novalocal sudo[96367]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:30 np0005486557.novalocal lvm[96378]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:30 np0005486557.novalocal lvm[96378]: VG cinder-volumes finished Oct 13 20:50:30 np0005486557.novalocal sudo[96367]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:30 np0005486557.novalocal systemd[1]: session-c251.scope: Deactivated successfully. Oct 13 20:50:30 np0005486557.novalocal sudo[96379]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:30 np0005486557.novalocal sudo[96365]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:30 np0005486557.novalocal systemd[1]: Started Session c252 of User root. Oct 13 20:50:30 np0005486557.novalocal systemd[1]: session-c250.scope: Deactivated successfully. Oct 13 20:50:30 np0005486557.novalocal sudo[96379]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:31 np0005486557.novalocal sudo[96379]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:31 np0005486557.novalocal systemd[1]: session-c252.scope: Deactivated successfully. Oct 13 20:50:31 np0005486557.novalocal sudo[96383]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-8d8e94ca-d278-47a3-a8ba-76e16f22eaaa Oct 13 20:50:31 np0005486557.novalocal systemd[1]: Started Session c253 of User root. Oct 13 20:50:31 np0005486557.novalocal sudo[96383]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:31 np0005486557.novalocal sudo[96383]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:31 np0005486557.novalocal systemd[1]: session-c253.scope: Deactivated successfully. Oct 13 20:50:31 np0005486557.novalocal sudo[96387]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-8d8e94ca-d278-47a3-a8ba-76e16f22eaaa Oct 13 20:50:31 np0005486557.novalocal systemd[1]: Started Session c254 of User root. Oct 13 20:50:31 np0005486557.novalocal sudo[96387]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:32 np0005486557.novalocal sudo[96387]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:32 np0005486557.novalocal systemd[1]: session-c254.scope: Deactivated successfully. Oct 13 20:50:32 np0005486557.novalocal sudo[96391]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-8d8e94ca-d278-47a3-a8ba-76e16f22eaaa Oct 13 20:50:32 np0005486557.novalocal systemd[1]: Started Session c255 of User root. Oct 13 20:50:32 np0005486557.novalocal sudo[96391]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:32 np0005486557.novalocal lvm[96398]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:32 np0005486557.novalocal lvm[96398]: VG cinder-volumes finished Oct 13 20:50:32 np0005486557.novalocal sudo[96391]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:32 np0005486557.novalocal systemd[1]: session-c255.scope: Deactivated successfully. Oct 13 20:50:33 np0005486557.novalocal sudo[96399]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:50:33 np0005486557.novalocal systemd[1]: Started Session c256 of User root. Oct 13 20:50:33 np0005486557.novalocal sudo[96399]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:33 np0005486557.novalocal sudo[96399]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:33 np0005486557.novalocal systemd[1]: session-c256.scope: Deactivated successfully. Oct 13 20:50:33 np0005486557.novalocal sudo[96403]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:33 np0005486557.novalocal systemd[1]: Started Session c257 of User root. Oct 13 20:50:33 np0005486557.novalocal sudo[96403]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:33 np0005486557.novalocal sudo[96407]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-7f4fbb76-b63b-46c8-9692-c84356b7f34b Oct 13 20:50:33 np0005486557.novalocal systemd[1]: Started Session c258 of User root. Oct 13 20:50:33 np0005486557.novalocal sudo[96407]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:33 np0005486557.novalocal sudo[96403]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:33 np0005486557.novalocal systemd[1]: session-c257.scope: Deactivated successfully. Oct 13 20:50:33 np0005486557.novalocal sudo[96410]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:50:33 np0005486557.novalocal systemd[1]: Started Session c259 of User root. Oct 13 20:50:33 np0005486557.novalocal sudo[96410]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:34 np0005486557.novalocal sudo[96407]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:34 np0005486557.novalocal systemd[1]: session-c258.scope: Deactivated successfully. Oct 13 20:50:34 np0005486557.novalocal sudo[96414]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-7f4fbb76-b63b-46c8-9692-c84356b7f34b Oct 13 20:50:34 np0005486557.novalocal systemd[1]: Started Session c260 of User root. Oct 13 20:50:34 np0005486557.novalocal sudo[96414]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:34 np0005486557.novalocal sudo[96410]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:34 np0005486557.novalocal systemd[1]: session-c259.scope: Deactivated successfully. Oct 13 20:50:34 np0005486557.novalocal sudo[96418]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:34 np0005486557.novalocal systemd[1]: Started Session c261 of User root. Oct 13 20:50:34 np0005486557.novalocal sudo[96418]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:34 np0005486557.novalocal sudo[96414]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:34 np0005486557.novalocal systemd[1]: session-c260.scope: Deactivated successfully. Oct 13 20:50:34 np0005486557.novalocal sudo[96422]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-7f4fbb76-b63b-46c8-9692-c84356b7f34b Oct 13 20:50:34 np0005486557.novalocal systemd[1]: Started Session c262 of User root. Oct 13 20:50:34 np0005486557.novalocal sudo[96422]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:34 np0005486557.novalocal sudo[96418]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:34 np0005486557.novalocal systemd[1]: session-c261.scope: Deactivated successfully. Oct 13 20:50:34 np0005486557.novalocal lvm[96428]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:34 np0005486557.novalocal lvm[96428]: VG cinder-volumes finished Oct 13 20:50:35 np0005486557.novalocal sudo[96422]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:35 np0005486557.novalocal systemd[1]: session-c262.scope: Deactivated successfully. Oct 13 20:50:35 np0005486557.novalocal sudo[96429]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:50:35 np0005486557.novalocal systemd[1]: Started Session c263 of User root. Oct 13 20:50:35 np0005486557.novalocal sudo[96429]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:35 np0005486557.novalocal sudo[96429]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:35 np0005486557.novalocal systemd[1]: session-c263.scope: Deactivated successfully. Oct 13 20:50:35 np0005486557.novalocal sudo[96435]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:35 np0005486557.novalocal systemd[1]: Started Session c264 of User root. Oct 13 20:50:35 np0005486557.novalocal sudo[96435]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:35 np0005486557.novalocal sudo[96435]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:35 np0005486557.novalocal systemd[1]: session-c264.scope: Deactivated successfully. Oct 13 20:50:36 np0005486557.novalocal sudo[96439]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:50:36 np0005486557.novalocal systemd[1]: Started Session c265 of User root. Oct 13 20:50:36 np0005486557.novalocal sudo[96439]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:36 np0005486557.novalocal sudo[96441]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-a4fc73d1-3eb7-4f0f-b40b-df4b0755150c Oct 13 20:50:36 np0005486557.novalocal systemd[1]: Started Session c266 of User root. Oct 13 20:50:36 np0005486557.novalocal sudo[96441]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:36 np0005486557.novalocal sudo[96439]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:36 np0005486557.novalocal systemd[1]: session-c265.scope: Deactivated successfully. Oct 13 20:50:36 np0005486557.novalocal sudo[96447]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:36 np0005486557.novalocal systemd[1]: Started Session c267 of User root. Oct 13 20:50:36 np0005486557.novalocal sudo[96441]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:36 np0005486557.novalocal systemd[1]: session-c266.scope: Deactivated successfully. Oct 13 20:50:36 np0005486557.novalocal sudo[96447]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:36 np0005486557.novalocal sudo[96450]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-a4fc73d1-3eb7-4f0f-b40b-df4b0755150c Oct 13 20:50:36 np0005486557.novalocal systemd[1]: Started Session c268 of User root. Oct 13 20:50:36 np0005486557.novalocal sudo[96450]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:36 np0005486557.novalocal sudo[96447]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:36 np0005486557.novalocal systemd[1]: session-c267.scope: Deactivated successfully. Oct 13 20:50:36 np0005486557.novalocal sudo[96450]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:36 np0005486557.novalocal systemd[1]: session-c268.scope: Deactivated successfully. Oct 13 20:50:36 np0005486557.novalocal sudo[96455]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-a4fc73d1-3eb7-4f0f-b40b-df4b0755150c Oct 13 20:50:36 np0005486557.novalocal systemd[1]: Started Session c269 of User root. Oct 13 20:50:36 np0005486557.novalocal sudo[96455]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:37 np0005486557.novalocal lvm[96462]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 13 20:50:37 np0005486557.novalocal lvm[96462]: VG cinder-volumes finished Oct 13 20:50:37 np0005486557.novalocal sudo[96455]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:37 np0005486557.novalocal systemd[1]: session-c269.scope: Deactivated successfully. Oct 13 20:50:37 np0005486557.novalocal sudo[96463]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:50:37 np0005486557.novalocal systemd[1]: Started Session c270 of User root. Oct 13 20:50:37 np0005486557.novalocal sudo[96463]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:37 np0005486557.novalocal sudo[96463]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:37 np0005486557.novalocal systemd[1]: session-c270.scope: Deactivated successfully. Oct 13 20:50:38 np0005486557.novalocal sudo[96467]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:38 np0005486557.novalocal systemd[1]: Started Session c271 of User root. Oct 13 20:50:38 np0005486557.novalocal sudo[96467]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:38 np0005486557.novalocal sudo[96467]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:38 np0005486557.novalocal systemd[1]: session-c271.scope: Deactivated successfully. Oct 13 20:50:38 np0005486557.novalocal sudo[96471]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:50:38 np0005486557.novalocal systemd[1]: Started Session c272 of User root. Oct 13 20:50:38 np0005486557.novalocal sudo[96471]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:38 np0005486557.novalocal sudo[96471]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:38 np0005486557.novalocal systemd[1]: session-c272.scope: Deactivated successfully. Oct 13 20:50:38 np0005486557.novalocal sudo[96475]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:50:38 np0005486557.novalocal systemd[1]: Started Session c273 of User root. Oct 13 20:50:38 np0005486557.novalocal sudo[96475]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:50:39 np0005486557.novalocal sudo[96475]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:39 np0005486557.novalocal systemd[1]: session-c273.scope: Deactivated successfully. Oct 13 20:50:52 np0005486557.novalocal sudo[96495]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpew4h41iy/privsep.sock Oct 13 20:50:52 np0005486557.novalocal systemd[1]: Started Session c274 of User root. Oct 13 20:50:52 np0005486557.novalocal sudo[96495]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:50:53 np0005486557.novalocal sudo[96495]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:54 np0005486557.novalocal sudo[96509]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmpw8c8k95i/privsep.sock Oct 13 20:50:54 np0005486557.novalocal systemd[1]: Started Session c275 of User root. Oct 13 20:50:55 np0005486557.novalocal sudo[96509]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:50:55 np0005486557.novalocal sudo[96509]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:56 np0005486557.novalocal sudo[96526]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap-daemon /etc/neutron/rootwrap.conf Oct 13 20:50:56 np0005486557.novalocal systemd[1]: Started Session c276 of User root. Oct 13 20:50:56 np0005486557.novalocal sudo[96526]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:50:57 np0005486557.novalocal kernel: vgeaf8cd2d-cee: entered promiscuous mode Oct 13 20:50:57 np0005486557.novalocal NetworkManager[856]: [1760403057.3034] manager: (vgeaf8cd2d-cee): 'openvswitch' plugin not available; creating generic device Oct 13 20:50:57 np0005486557.novalocal NetworkManager[856]: [1760403057.3050] manager: (vgeaf8cd2d-cee): new Generic device (/org/freedesktop/NetworkManager/Devices/32) Oct 13 20:50:57 np0005486557.novalocal systemd-udevd[96545]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:50:57 np0005486557.novalocal NetworkManager[856]: [1760403057.4193] manager: (tap318ec86e-40): new Veth device (/org/freedesktop/NetworkManager/Devices/33) Oct 13 20:50:57 np0005486557.novalocal NetworkManager[856]: [1760403057.4890] device (tap318ec86e-40): carrier: link connected Oct 13 20:50:57 np0005486557.novalocal kernel: tap318ec86e-40: entered promiscuous mode Oct 13 20:50:57 np0005486557.novalocal sudo[96588]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-318ec86e-4c09-45da-adc9-6e478c549977 env PROCESS_TAG=haproxy-318ec86e-4c09-45da-adc9-6e478c549977 haproxy -f /var/lib/neutron/ovn-metadata-proxy/318ec86e-4c09-45da-adc9-6e478c549977.conf Oct 13 20:50:57 np0005486557.novalocal systemd[1]: Started Session c277 of User root. Oct 13 20:50:57 np0005486557.novalocal sudo[96588]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:50:58 np0005486557.novalocal sudo[96588]: pam_unix(sudo:session): session closed for user root Oct 13 20:50:58 np0005486557.novalocal kernel: vr320ba3dc-752: entered promiscuous mode Oct 13 20:50:58 np0005486557.novalocal NetworkManager[856]: [1760403058.2602] manager: (vr320ba3dc-752): 'openvswitch' plugin not available; creating generic device Oct 13 20:50:58 np0005486557.novalocal NetworkManager[856]: [1760403058.2615] manager: (vr320ba3dc-752): new Generic device (/org/freedesktop/NetworkManager/Devices/34) Oct 13 20:50:58 np0005486557.novalocal virtnodedevd[90430]: libvirt version: 10.10.0, package: 15.el9 (builder@centos.org, 2025-08-18-13:22:20, ) Oct 13 20:50:58 np0005486557.novalocal virtnodedevd[90430]: hostname: np0005486557.novalocal Oct 13 20:50:58 np0005486557.novalocal virtnodedevd[90430]: ethtool ioctl error on vr320ba3dc-752: No such device Oct 13 20:50:58 np0005486557.novalocal virtnodedevd[90430]: ethtool ioctl error on vr320ba3dc-752: No such device Oct 13 20:50:58 np0005486557.novalocal virtnodedevd[90430]: ethtool ioctl error on vr320ba3dc-752: No such device Oct 13 20:50:58 np0005486557.novalocal virtnodedevd[90430]: ethtool ioctl error on vr320ba3dc-752: No such device Oct 13 20:50:58 np0005486557.novalocal virtnodedevd[90430]: ethtool ioctl error on vr320ba3dc-752: No such device Oct 13 20:50:58 np0005486557.novalocal virtnodedevd[90430]: ethtool ioctl error on vr320ba3dc-752: No such device Oct 13 20:50:58 np0005486557.novalocal virtnodedevd[90430]: ethtool ioctl error on vr320ba3dc-752: No such device Oct 13 20:50:58 np0005486557.novalocal virtnodedevd[90430]: ethtool ioctl error on vr320ba3dc-752: No such device Oct 13 20:51:00 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:51:00 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:51:00 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:51:00 np0005486557.novalocal kernel: IPv4 over IPsec tunneling driver Oct 13 20:51:00 np0005486557.novalocal systemd-udevd[96888]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:51:00 np0005486557.novalocal NetworkManager[856]: [1760403060.4574] manager: (ip_vti0): new IPTunnel device (/org/freedesktop/NetworkManager/Devices/35) Oct 13 20:51:00 np0005486557.novalocal kernel: IPsec XFRM device driver Oct 13 20:51:12 np0005486557.novalocal kernel: tapd15ec020-67: entered promiscuous mode Oct 13 20:51:12 np0005486557.novalocal NetworkManager[856]: [1760403072.2123] manager: (tapd15ec020-67): new Tun device (/org/freedesktop/NetworkManager/Devices/36) Oct 13 20:51:12 np0005486557.novalocal virtqemud[90345]: Domain id=10 name='instance-00000009' uuid=d203a1a6-886a-4c5e-992e-790c179d9ca1 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 13 20:51:12 np0005486557.novalocal virtqemud[90345]: Domain id=10 name='instance-00000009' uuid=d203a1a6-886a-4c5e-992e-790c179d9ca1 is tainted: deprecated-config (CPU model 'qemu64') Oct 13 20:51:12 np0005486557.novalocal systemd-machined[87255]: New machine qemu-10-instance-00000009. Oct 13 20:51:12 np0005486557.novalocal systemd[1]: Started Virtual Machine qemu-10-instance-00000009. Oct 13 20:51:12 np0005486557.novalocal systemd-udevd[97020]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:51:12 np0005486557.novalocal NetworkManager[856]: [1760403072.3201] device (tapd15ec020-67): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 13 20:51:12 np0005486557.novalocal NetworkManager[856]: [1760403072.3211] device (tapd15ec020-67): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 13 20:51:12 np0005486557.novalocal NetworkManager[856]: [1760403072.3537] manager: (tap2691cef0-f0): new Veth device (/org/freedesktop/NetworkManager/Devices/37) Oct 13 20:51:12 np0005486557.novalocal systemd-udevd[97023]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:51:12 np0005486557.novalocal NetworkManager[856]: [1760403072.4307] device (tap2691cef0-f0): carrier: link connected Oct 13 20:51:12 np0005486557.novalocal kernel: tap2691cef0-f0: entered promiscuous mode Oct 13 20:51:12 np0005486557.novalocal sudo[97063]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-2691cef0-f26d-441e-88ac-576239597d64 env PROCESS_TAG=haproxy-2691cef0-f26d-441e-88ac-576239597d64 haproxy -f /var/lib/neutron/ovn-metadata-proxy/2691cef0-f26d-441e-88ac-576239597d64.conf Oct 13 20:51:12 np0005486557.novalocal systemd[1]: Started Session c278 of User root. Oct 13 20:51:12 np0005486557.novalocal sudo[97063]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:51:13 np0005486557.novalocal sudo[97063]: pam_unix(sudo:session): session closed for user root Oct 13 20:51:20 np0005486557.novalocal systemd[1]: session-c277.scope: Deactivated successfully. Oct 13 20:51:20 np0005486557.novalocal kernel: tap318ec86e-40: left promiscuous mode Oct 13 20:51:25 np0005486557.novalocal kernel: vr320ba3dc-752: left promiscuous mode Oct 13 20:51:25 np0005486557.novalocal kernel: vgeaf8cd2d-cee: left promiscuous mode Oct 13 20:51:25 np0005486557.novalocal systemd[1]: run-netns-qvpn\x2d3e33fd4e\x2db5c0\x2d4a5c\x2dbd68\x2dde49d84d4e2c.mount: Deactivated successfully. Oct 13 20:51:29 np0005486557.novalocal sudo[97208]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:51:29 np0005486557.novalocal systemd[1]: Started Session c279 of User root. Oct 13 20:51:29 np0005486557.novalocal sudo[97208]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:51:29 np0005486557.novalocal sudo[97208]: pam_unix(sudo:session): session closed for user root Oct 13 20:51:29 np0005486557.novalocal systemd[1]: session-c279.scope: Deactivated successfully. Oct 13 20:51:29 np0005486557.novalocal sudo[97213]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:51:29 np0005486557.novalocal systemd[1]: Started Session c280 of User root. Oct 13 20:51:29 np0005486557.novalocal sudo[97213]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:51:30 np0005486557.novalocal sudo[97213]: pam_unix(sudo:session): session closed for user root Oct 13 20:51:30 np0005486557.novalocal systemd[1]: session-c280.scope: Deactivated successfully. Oct 13 20:51:30 np0005486557.novalocal sudo[97217]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:51:30 np0005486557.novalocal systemd[1]: Started Session c281 of User root. Oct 13 20:51:30 np0005486557.novalocal sudo[97217]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:51:30 np0005486557.novalocal sudo[97217]: pam_unix(sudo:session): session closed for user root Oct 13 20:51:30 np0005486557.novalocal systemd[1]: session-c281.scope: Deactivated successfully. Oct 13 20:51:30 np0005486557.novalocal sudo[97221]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:51:30 np0005486557.novalocal systemd[1]: Started Session c282 of User root. Oct 13 20:51:30 np0005486557.novalocal sudo[97221]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:51:31 np0005486557.novalocal sudo[97221]: pam_unix(sudo:session): session closed for user root Oct 13 20:51:31 np0005486557.novalocal systemd[1]: session-c282.scope: Deactivated successfully. Oct 13 20:51:50 np0005486557.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 13 20:51:51 np0005486557.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 13 20:51:52 np0005486557.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service. Oct 13 20:51:53 np0005486557.novalocal setroubleshoot[97277]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l 2ae80ca1-abdf-41c2-a9e0-055a5867a466 Oct 13 20:51:53 np0005486557.novalocal setroubleshoot[97277]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 13 20:51:53 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54068 [13/Oct/2025:20:51:53.616] listener listener/metadata 0/0/0/237/237 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 13 20:51:53 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54070 [13/Oct/2025:20:51:53.905] listener listener/metadata 0/0/0/13/13 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Oct 13 20:51:53 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54086 [13/Oct/2025:20:51:53.944] listener listener/metadata 0/0/0/13/13 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Oct 13 20:51:54 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54094 [13/Oct/2025:20:51:53.995] listener listener/metadata 0/0/0/14/14 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 13 20:51:54 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54100 [13/Oct/2025:20:51:54.046] listener listener/metadata 0/0/0/12/12 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Oct 13 20:51:54 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54114 [13/Oct/2025:20:51:54.093] listener listener/metadata 0/0/0/9/9 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Oct 13 20:51:54 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54130 [13/Oct/2025:20:51:54.142] listener listener/metadata 0/0/0/11/11 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Oct 13 20:51:54 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54144 [13/Oct/2025:20:51:54.191] listener listener/metadata 0/0/0/11/11 200 99 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Oct 13 20:51:54 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54152 [13/Oct/2025:20:51:54.274] listener listener/metadata 0/0/0/14/14 200 142 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Oct 13 20:51:54 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54160 [13/Oct/2025:20:51:54.333] listener listener/metadata 0/0/0/13/13 200 142 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Oct 13 20:51:54 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54174 [13/Oct/2025:20:51:54.390] listener listener/metadata 0/0/0/16/16 404 248 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Oct 13 20:51:54 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54184 [13/Oct/2025:20:51:54.442] listener listener/metadata 0/0/0/14/14 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Oct 13 20:51:54 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54198 [13/Oct/2025:20:51:54.484] listener listener/metadata 0/0/0/16/16 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Oct 13 20:51:54 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54202 [13/Oct/2025:20:51:54.534] listener listener/metadata 0/0/0/14/14 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Oct 13 20:51:54 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54208 [13/Oct/2025:20:51:54.591] listener listener/metadata 0/0/0/13/13 200 142 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Oct 13 20:51:54 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.14:54210 [13/Oct/2025:20:51:54.669] listener listener/metadata 0/0/0/13/13 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Oct 13 20:52:02 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Deactivated successfully. Oct 13 20:52:02 np0005486557.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Consumed 1.152s CPU time. Oct 13 20:52:02 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:52:02 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:52:02 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:52:03 np0005486557.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 13 20:52:03 np0005486557.novalocal systemd[1]: setroubleshootd.service: Consumed 1.462s CPU time. Oct 13 20:52:17 np0005486557.novalocal kernel: tapa0805ac4-3e: entered promiscuous mode Oct 13 20:52:17 np0005486557.novalocal NetworkManager[856]: [1760403137.3173] manager: (tapa0805ac4-3e): new Tun device (/org/freedesktop/NetworkManager/Devices/38) Oct 13 20:52:17 np0005486557.novalocal virtqemud[90345]: Domain id=11 name='instance-0000000a' uuid=62dfa65a-c682-4d11-b7f7-8cc80095aa25 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 13 20:52:17 np0005486557.novalocal virtqemud[90345]: Domain id=11 name='instance-0000000a' uuid=62dfa65a-c682-4d11-b7f7-8cc80095aa25 is tainted: deprecated-config (CPU model 'qemu64') Oct 13 20:52:17 np0005486557.novalocal systemd-machined[87255]: New machine qemu-11-instance-0000000a. Oct 13 20:52:17 np0005486557.novalocal systemd[1]: Started Virtual Machine qemu-11-instance-0000000a. Oct 13 20:52:17 np0005486557.novalocal systemd-udevd[97400]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:52:17 np0005486557.novalocal NetworkManager[856]: [1760403137.4017] device (tapa0805ac4-3e): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 13 20:52:17 np0005486557.novalocal NetworkManager[856]: [1760403137.4023] device (tapa0805ac4-3e): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 13 20:52:28 np0005486557.novalocal sshd-session[97462]: Connection closed by 198.235.24.101 port 50056 Oct 13 20:52:29 np0005486557.novalocal sudo[97484]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:52:29 np0005486557.novalocal systemd[1]: Started Session c283 of User root. Oct 13 20:52:29 np0005486557.novalocal sudo[97484]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:52:29 np0005486557.novalocal sudo[97484]: pam_unix(sudo:session): session closed for user root Oct 13 20:52:29 np0005486557.novalocal systemd[1]: session-c283.scope: Deactivated successfully. Oct 13 20:52:29 np0005486557.novalocal sudo[97488]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:52:29 np0005486557.novalocal systemd[1]: Started Session c284 of User root. Oct 13 20:52:29 np0005486557.novalocal sudo[97488]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:52:30 np0005486557.novalocal sudo[97488]: pam_unix(sudo:session): session closed for user root Oct 13 20:52:30 np0005486557.novalocal systemd[1]: session-c284.scope: Deactivated successfully. Oct 13 20:52:30 np0005486557.novalocal sudo[97492]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:52:30 np0005486557.novalocal systemd[1]: Started Session c285 of User root. Oct 13 20:52:30 np0005486557.novalocal sudo[97492]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:52:30 np0005486557.novalocal sudo[97492]: pam_unix(sudo:session): session closed for user root Oct 13 20:52:30 np0005486557.novalocal systemd[1]: session-c285.scope: Deactivated successfully. Oct 13 20:52:30 np0005486557.novalocal sudo[97496]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:52:30 np0005486557.novalocal systemd[1]: Started Session c286 of User root. Oct 13 20:52:30 np0005486557.novalocal sudo[97496]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:52:31 np0005486557.novalocal sudo[97496]: pam_unix(sudo:session): session closed for user root Oct 13 20:52:31 np0005486557.novalocal systemd[1]: session-c286.scope: Deactivated successfully. Oct 13 20:52:40 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60702 [13/Oct/2025:20:52:39.702] listener listener/metadata 0/0/0/837/837 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 13 20:52:40 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60718 [13/Oct/2025:20:52:40.636] listener listener/metadata 0/0/0/17/17 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Oct 13 20:52:40 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60730 [13/Oct/2025:20:52:40.684] listener listener/metadata 0/0/0/13/13 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Oct 13 20:52:40 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60738 [13/Oct/2025:20:52:40.733] listener listener/metadata 0/0/0/70/70 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 13 20:52:40 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60748 [13/Oct/2025:20:52:40.839] listener listener/metadata 0/0/0/11/11 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Oct 13 20:52:40 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60752 [13/Oct/2025:20:52:40.911] listener listener/metadata 0/0/0/10/10 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Oct 13 20:52:41 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60766 [13/Oct/2025:20:52:40.991] listener listener/metadata 0/0/0/14/14 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Oct 13 20:52:41 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60780 [13/Oct/2025:20:52:41.054] listener listener/metadata 0/0/0/14/14 200 99 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Oct 13 20:52:41 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60784 [13/Oct/2025:20:52:41.108] listener listener/metadata 0/0/0/14/14 200 141 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Oct 13 20:52:41 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60786 [13/Oct/2025:20:52:41.159] listener listener/metadata 0/0/0/14/14 200 141 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Oct 13 20:52:41 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60802 [13/Oct/2025:20:52:41.211] listener listener/metadata 0/0/0/14/14 404 248 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Oct 13 20:52:41 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60814 [13/Oct/2025:20:52:41.261] listener listener/metadata 0/0/0/13/13 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Oct 13 20:52:41 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60824 [13/Oct/2025:20:52:41.300] listener listener/metadata 0/0/0/13/13 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Oct 13 20:52:41 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60836 [13/Oct/2025:20:52:41.340] listener listener/metadata 0/0/0/13/13 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Oct 13 20:52:41 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60852 [13/Oct/2025:20:52:41.391] listener listener/metadata 0/0/0/16/16 200 141 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Oct 13 20:52:41 np0005486557.novalocal haproxy-metadata-proxy-2691cef0-f26d-441e-88ac-576239597d64[97068]: 10.100.0.6:60860 [13/Oct/2025:20:52:41.444] listener listener/metadata 0/0/0/15/15 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Oct 13 20:52:51 np0005486557.novalocal kernel: tapa0805ac4-3e (unregistering): left promiscuous mode Oct 13 20:52:51 np0005486557.novalocal NetworkManager[856]: [1760403171.4232] device (tapa0805ac4-3e): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 13 20:52:51 np0005486557.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Deactivated successfully. Oct 13 20:52:51 np0005486557.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Consumed 22.898s CPU time. Oct 13 20:52:51 np0005486557.novalocal systemd-machined[87255]: Machine qemu-11-instance-0000000a terminated. Oct 13 20:53:02 np0005486557.novalocal kernel: tapd15ec020-67 (unregistering): left promiscuous mode Oct 13 20:53:02 np0005486557.novalocal NetworkManager[856]: [1760403182.5484] device (tapd15ec020-67): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 13 20:53:02 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:53:02 np0005486557.novalocal systemd[1]: session-c278.scope: Deactivated successfully. Oct 13 20:53:02 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:53:02 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:53:02 np0005486557.novalocal kernel: tap2691cef0-f0: left promiscuous mode Oct 13 20:53:02 np0005486557.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Deactivated successfully. Oct 13 20:53:02 np0005486557.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Consumed 24.152s CPU time. Oct 13 20:53:02 np0005486557.novalocal systemd-machined[87255]: Machine qemu-10-instance-00000009 terminated. Oct 13 20:53:29 np0005486557.novalocal sudo[97711]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:53:29 np0005486557.novalocal systemd[1]: Started Session c287 of User root. Oct 13 20:53:29 np0005486557.novalocal sudo[97711]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:53:29 np0005486557.novalocal sudo[97711]: pam_unix(sudo:session): session closed for user root Oct 13 20:53:29 np0005486557.novalocal systemd[1]: session-c287.scope: Deactivated successfully. Oct 13 20:53:29 np0005486557.novalocal sudo[97715]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:53:29 np0005486557.novalocal systemd[1]: Started Session c288 of User root. Oct 13 20:53:29 np0005486557.novalocal sudo[97715]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:53:30 np0005486557.novalocal sudo[97715]: pam_unix(sudo:session): session closed for user root Oct 13 20:53:30 np0005486557.novalocal systemd[1]: session-c288.scope: Deactivated successfully. Oct 13 20:53:30 np0005486557.novalocal sudo[97719]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:53:30 np0005486557.novalocal systemd[1]: Started Session c289 of User root. Oct 13 20:53:30 np0005486557.novalocal sudo[97719]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:53:30 np0005486557.novalocal sudo[97719]: pam_unix(sudo:session): session closed for user root Oct 13 20:53:30 np0005486557.novalocal systemd[1]: session-c289.scope: Deactivated successfully. Oct 13 20:53:30 np0005486557.novalocal sudo[97723]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:53:30 np0005486557.novalocal systemd[1]: Started Session c290 of User root. Oct 13 20:53:30 np0005486557.novalocal sudo[97723]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:53:31 np0005486557.novalocal sudo[97723]: pam_unix(sudo:session): session closed for user root Oct 13 20:53:31 np0005486557.novalocal systemd[1]: session-c290.scope: Deactivated successfully. Oct 13 20:53:42 np0005486557.novalocal kernel: tap0bfb12d7-20: entered promiscuous mode Oct 13 20:53:42 np0005486557.novalocal NetworkManager[856]: [1760403222.8491] manager: (tap0bfb12d7-20): new Tun device (/org/freedesktop/NetworkManager/Devices/39) Oct 13 20:53:42 np0005486557.novalocal virtqemud[90345]: Domain id=12 name='instance-0000000b' uuid=33d2fa4b-d648-4ed1-a1ca-48220538fd2b is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 13 20:53:42 np0005486557.novalocal virtqemud[90345]: Domain id=12 name='instance-0000000b' uuid=33d2fa4b-d648-4ed1-a1ca-48220538fd2b is tainted: deprecated-config (CPU model 'qemu64') Oct 13 20:53:42 np0005486557.novalocal systemd-machined[87255]: New machine qemu-12-instance-0000000b. Oct 13 20:53:42 np0005486557.novalocal systemd[1]: Started Virtual Machine qemu-12-instance-0000000b. Oct 13 20:53:42 np0005486557.novalocal systemd-udevd[97780]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:53:42 np0005486557.novalocal NetworkManager[856]: [1760403222.9662] device (tap0bfb12d7-20): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 13 20:53:42 np0005486557.novalocal systemd-udevd[97786]: Network interface NamePolicy= disabled on kernel command line. Oct 13 20:53:42 np0005486557.novalocal NetworkManager[856]: [1760403222.9734] manager: (tap939622bd-10): new Veth device (/org/freedesktop/NetworkManager/Devices/40) Oct 13 20:53:42 np0005486557.novalocal NetworkManager[856]: [1760403222.9736] device (tap0bfb12d7-20): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 13 20:53:43 np0005486557.novalocal NetworkManager[856]: [1760403223.0224] device (tap939622bd-10): carrier: link connected Oct 13 20:53:43 np0005486557.novalocal kernel: tap939622bd-10: entered promiscuous mode Oct 13 20:53:43 np0005486557.novalocal sudo[97822]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-939622bd-1ca0-4027-a5e6-5f663163931b env PROCESS_TAG=haproxy-939622bd-1ca0-4027-a5e6-5f663163931b haproxy -f /var/lib/neutron/ovn-metadata-proxy/939622bd-1ca0-4027-a5e6-5f663163931b.conf Oct 13 20:53:43 np0005486557.novalocal systemd[1]: Started Session c291 of User root. Oct 13 20:53:43 np0005486557.novalocal sudo[97822]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 13 20:53:43 np0005486557.novalocal sudo[97822]: pam_unix(sudo:session): session closed for user root Oct 13 20:54:04 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:54:04 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:54:04 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:54:10 np0005486557.novalocal haproxy-metadata-proxy-939622bd-1ca0-4027-a5e6-5f663163931b[97827]: 10.100.0.7:53164 [13/Oct/2025:20:54:09.977] listener listener/metadata 0/0/0/112/112 200 99 - - ---- 1/1/0/0/0 0/0 "GET /latest/meta-data/public-ipv4 HTTP/1.1" Oct 13 20:54:10 np0005486557.novalocal haproxy-metadata-proxy-939622bd-1ca0-4027-a5e6-5f663163931b[97827]: 10.100.0.7:53170 [13/Oct/2025:20:54:10.374] listener listener/metadata 0/0/0/242/242 200 85 - - ---- 1/1/0/0/0 0/0 "POST /openstack/2013-10-17/password HTTP/1.1" Oct 13 20:54:14 np0005486557.novalocal kernel: tap0bfb12d7-20 (unregistering): left promiscuous mode Oct 13 20:54:14 np0005486557.novalocal NetworkManager[856]: [1760403254.5675] device (tap0bfb12d7-20): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 13 20:54:14 np0005486557.novalocal systemd[1]: machine-qemu\x2d12\x2dinstance\x2d0000000b.scope: Deactivated successfully. Oct 13 20:54:14 np0005486557.novalocal systemd[1]: machine-qemu\x2d12\x2dinstance\x2d0000000b.scope: Consumed 26.702s CPU time. Oct 13 20:54:14 np0005486557.novalocal systemd-machined[87255]: Machine qemu-12-instance-0000000b terminated. Oct 13 20:54:14 np0005486557.novalocal kernel: tap939622bd-10: left promiscuous mode Oct 13 20:54:14 np0005486557.novalocal systemd[1]: session-c291.scope: Deactivated successfully. Oct 13 20:54:29 np0005486557.novalocal sudo[98006]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:54:29 np0005486557.novalocal systemd[1]: Started Session c292 of User root. Oct 13 20:54:29 np0005486557.novalocal sudo[98006]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:54:29 np0005486557.novalocal sudo[98006]: pam_unix(sudo:session): session closed for user root Oct 13 20:54:29 np0005486557.novalocal systemd[1]: session-c292.scope: Deactivated successfully. Oct 13 20:54:29 np0005486557.novalocal sudo[98010]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:54:29 np0005486557.novalocal systemd[1]: Started Session c293 of User root. Oct 13 20:54:29 np0005486557.novalocal sudo[98010]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:54:30 np0005486557.novalocal sudo[98010]: pam_unix(sudo:session): session closed for user root Oct 13 20:54:30 np0005486557.novalocal systemd[1]: session-c293.scope: Deactivated successfully. Oct 13 20:54:30 np0005486557.novalocal sudo[98014]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:54:30 np0005486557.novalocal systemd[1]: Started Session c294 of User root. Oct 13 20:54:30 np0005486557.novalocal sudo[98014]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:54:30 np0005486557.novalocal sudo[98014]: pam_unix(sudo:session): session closed for user root Oct 13 20:54:30 np0005486557.novalocal systemd[1]: session-c294.scope: Deactivated successfully. Oct 13 20:54:30 np0005486557.novalocal sudo[98019]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:54:30 np0005486557.novalocal systemd[1]: Started Session c295 of User root. Oct 13 20:54:30 np0005486557.novalocal sudo[98019]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:54:31 np0005486557.novalocal sudo[98019]: pam_unix(sudo:session): session closed for user root Oct 13 20:54:31 np0005486557.novalocal systemd[1]: session-c295.scope: Deactivated successfully. Oct 13 20:55:03 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:55:03 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:55:03 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:55:29 np0005486557.novalocal sudo[98121]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:55:29 np0005486557.novalocal systemd[1]: Started Session c296 of User root. Oct 13 20:55:29 np0005486557.novalocal sudo[98121]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:55:29 np0005486557.novalocal sudo[98121]: pam_unix(sudo:session): session closed for user root Oct 13 20:55:29 np0005486557.novalocal systemd[1]: session-c296.scope: Deactivated successfully. Oct 13 20:55:29 np0005486557.novalocal sudo[98125]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:55:29 np0005486557.novalocal systemd[1]: Started Session c297 of User root. Oct 13 20:55:29 np0005486557.novalocal sudo[98125]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:55:30 np0005486557.novalocal sudo[98125]: pam_unix(sudo:session): session closed for user root Oct 13 20:55:30 np0005486557.novalocal systemd[1]: session-c297.scope: Deactivated successfully. Oct 13 20:55:30 np0005486557.novalocal sudo[98130]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:55:30 np0005486557.novalocal systemd[1]: Started Session c298 of User root. Oct 13 20:55:30 np0005486557.novalocal sudo[98130]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:55:30 np0005486557.novalocal sudo[98130]: pam_unix(sudo:session): session closed for user root Oct 13 20:55:30 np0005486557.novalocal systemd[1]: session-c298.scope: Deactivated successfully. Oct 13 20:55:30 np0005486557.novalocal sudo[98136]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:55:30 np0005486557.novalocal systemd[1]: Started Session c299 of User root. Oct 13 20:55:30 np0005486557.novalocal sudo[98136]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:55:31 np0005486557.novalocal sudo[98136]: pam_unix(sudo:session): session closed for user root Oct 13 20:55:31 np0005486557.novalocal systemd[1]: session-c299.scope: Deactivated successfully. Oct 13 20:56:00 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:56:00 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:56:00 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:56:29 np0005486557.novalocal sudo[98218]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:56:29 np0005486557.novalocal systemd[1]: Started Session c300 of User root. Oct 13 20:56:29 np0005486557.novalocal sudo[98218]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:56:29 np0005486557.novalocal sudo[98218]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:29 np0005486557.novalocal systemd[1]: session-c300.scope: Deactivated successfully. Oct 13 20:56:29 np0005486557.novalocal sudo[98222]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:56:29 np0005486557.novalocal systemd[1]: Started Session c301 of User root. Oct 13 20:56:29 np0005486557.novalocal sudo[98222]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:56:30 np0005486557.novalocal sudo[98222]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:30 np0005486557.novalocal systemd[1]: session-c301.scope: Deactivated successfully. Oct 13 20:56:30 np0005486557.novalocal sudo[98226]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:56:30 np0005486557.novalocal systemd[1]: Started Session c302 of User root. Oct 13 20:56:30 np0005486557.novalocal sudo[98226]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:56:30 np0005486557.novalocal sudo[98226]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:30 np0005486557.novalocal systemd[1]: session-c302.scope: Deactivated successfully. Oct 13 20:56:30 np0005486557.novalocal sudo[98230]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:56:30 np0005486557.novalocal systemd[1]: Started Session c303 of User root. Oct 13 20:56:30 np0005486557.novalocal sudo[98230]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:56:31 np0005486557.novalocal sudo[98230]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:31 np0005486557.novalocal systemd[1]: session-c303.scope: Deactivated successfully. Oct 13 20:56:38 np0005486557.novalocal lvm[98247]: PV /dev/loop3 online, VG lvm-shares is complete. Oct 13 20:56:38 np0005486557.novalocal lvm[98247]: VG lvm-shares finished Oct 13 20:56:40 np0005486557.novalocal kernel: EXT4-fs (dm-6): mounted filesystem 9219a183-6337-4d40-8edf-a3f0fdcb23b5 r/w with ordered data mode. Quota mode: none. Oct 13 20:56:43 np0005486557.novalocal systemd[1]: var-lib-manila-mnt-share\x2d50a0458a\x2dffb0\x2d49de\x2db7a1\x2dbee7937c8710.mount: Deactivated successfully. Oct 13 20:56:43 np0005486557.novalocal kernel: EXT4-fs (dm-6): unmounting filesystem 9219a183-6337-4d40-8edf-a3f0fdcb23b5. Oct 13 20:56:43 np0005486557.novalocal lvm[98265]: PV /dev/loop3 online, VG lvm-shares is complete. Oct 13 20:56:43 np0005486557.novalocal lvm[98265]: VG lvm-shares finished Oct 13 20:56:53 np0005486557.novalocal sudo[51164]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:54 np0005486557.novalocal sudo[98959]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rbglgombgugnvzvzyoglznshhqtjlqsw ; WORKSPACE=/var/log/weirdo-project /usr/bin/python3' Oct 13 20:56:54 np0005486557.novalocal sudo[98959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:56:54 np0005486557.novalocal python3[98961]: ansible-command Invoked with chdir=/tmp/puppet-openstack creates=/var/log/weirdo-project/logs _raw_params=./copy_logs.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None removes=None stdin=None Oct 13 20:56:55 np0005486557.novalocal sudo[99084]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ceph /var/log/weirdo-project/logs/etc/ Oct 13 20:56:55 np0005486557.novalocal sudo[99084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:55 np0005486557.novalocal sudo[99084]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:55 np0005486557.novalocal sudo[99087]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/cinder /var/log/weirdo-project/logs/etc/ Oct 13 20:56:55 np0005486557.novalocal sudo[99087]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:55 np0005486557.novalocal sudo[99087]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:55 np0005486557.novalocal sudo[99090]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/cinder /var/log/weirdo-project/logs Oct 13 20:56:55 np0005486557.novalocal sudo[99090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:55 np0005486557.novalocal sudo[99090]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:55 np0005486557.novalocal sudo[99093]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/glance /var/log/weirdo-project/logs/etc/ Oct 13 20:56:55 np0005486557.novalocal sudo[99093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:55 np0005486557.novalocal sudo[99093]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:55 np0005486557.novalocal sudo[99096]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/glance /var/log/weirdo-project/logs Oct 13 20:56:55 np0005486557.novalocal sudo[99096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:55 np0005486557.novalocal sudo[99096]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:55 np0005486557.novalocal sudo[99099]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/horizon /var/log/weirdo-project/logs Oct 13 20:56:55 np0005486557.novalocal sudo[99099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:55 np0005486557.novalocal sudo[99099]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:55 np0005486557.novalocal sudo[99102]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/keystone /var/log/weirdo-project/logs/etc/ Oct 13 20:56:55 np0005486557.novalocal sudo[99102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:55 np0005486557.novalocal sudo[99102]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:55 np0005486557.novalocal sudo[99105]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/keystone /var/log/weirdo-project/logs Oct 13 20:56:55 np0005486557.novalocal sudo[99105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:55 np0005486557.novalocal sudo[99105]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:55 np0005486557.novalocal sudo[99110]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/manila /var/log/weirdo-project/logs/etc/ Oct 13 20:56:55 np0005486557.novalocal sudo[99110]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:55 np0005486557.novalocal sudo[99110]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:55 np0005486557.novalocal sudo[99113]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/manila /var/log/weirdo-project/logs Oct 13 20:56:55 np0005486557.novalocal sudo[99113]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:55 np0005486557.novalocal sudo[99113]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:55 np0005486557.novalocal sudo[99116]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/neutron /var/log/weirdo-project/logs/etc/ Oct 13 20:56:55 np0005486557.novalocal sudo[99116]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:55 np0005486557.novalocal sudo[99116]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:55 np0005486557.novalocal sudo[99119]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/neutron /var/log/weirdo-project/logs Oct 13 20:56:55 np0005486557.novalocal sudo[99119]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:55 np0005486557.novalocal sudo[99119]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:55 np0005486557.novalocal sudo[99122]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/nova /var/log/weirdo-project/logs/etc/ Oct 13 20:56:55 np0005486557.novalocal sudo[99122]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:55 np0005486557.novalocal sudo[99122]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99125]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/nova /var/log/weirdo-project/logs Oct 13 20:56:56 np0005486557.novalocal sudo[99125]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99125]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99128]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/octavia /var/log/weirdo-project/logs/etc/ Oct 13 20:56:56 np0005486557.novalocal sudo[99128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99128]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99132]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/octavia /var/log/weirdo-project/logs Oct 13 20:56:56 np0005486557.novalocal sudo[99132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99132]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99135]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ovn /var/log/weirdo-project/logs/etc/ Oct 13 20:56:56 np0005486557.novalocal sudo[99135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99135]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99138]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/ovn /var/log/weirdo-project/logs Oct 13 20:56:56 np0005486557.novalocal sudo[99138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99138]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99141]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/placement /var/log/weirdo-project/logs/etc/ Oct 13 20:56:56 np0005486557.novalocal sudo[99141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99141]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99144]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/placement /var/log/weirdo-project/logs Oct 13 20:56:56 np0005486557.novalocal sudo[99144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99144]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99147]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/tempest /var/log/weirdo-project/logs/etc/ Oct 13 20:56:56 np0005486557.novalocal sudo[99147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99147]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99150]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/puppet/puppet.conf /var/log/weirdo-project/logs/ Oct 13 20:56:56 np0005486557.novalocal sudo[99150]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99150]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99154]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/journalctl --no-pager Oct 13 20:56:56 np0005486557.novalocal sudo[99154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99154]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99157]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rsyslog.d /var/log/weirdo-project/logs/etc/ Oct 13 20:56:56 np0005486557.novalocal sudo[99157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99157]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99160]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyslog.conf /var/log/weirdo-project/logs/etc/ Oct 13 20:56:56 np0005486557.novalocal sudo[99160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99160]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99163]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/network-scripts /var/log/weirdo-project/logs/etc/sysconfig/ Oct 13 20:56:56 np0005486557.novalocal sudo[99163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99163]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99166]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rabbitmq /var/log/weirdo-project/logs/etc/ Oct 13 20:56:56 np0005486557.novalocal sudo[99166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99166]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99170]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/rabbitmq /var/log/weirdo-project/logs Oct 13 20:56:56 np0005486557.novalocal sudo[99170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99170]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99173]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/my.cnf /var/log/weirdo-project/logs/etc/ Oct 13 20:56:56 np0005486557.novalocal sudo[99173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99173]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99176]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/my.cnf.d /var/log/weirdo-project/logs/etc/ Oct 13 20:56:56 np0005486557.novalocal sudo[99176]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99176]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99179]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/mariadb /var/log/weirdo-project/logs/ Oct 13 20:56:56 np0005486557.novalocal sudo[99179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99179]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99182]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/iscsi /var/log/weirdo-project/logs/etc/ Oct 13 20:56:56 np0005486557.novalocal sudo[99182]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99182]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99185]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/tempest.log /var/log/weirdo-project/logs/ Oct 13 20:56:56 np0005486557.novalocal sudo[99185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99185]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:56 np0005486557.novalocal sudo[99188]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testrepository.subunit /var/log/weirdo-project/logs/testrepository.subunit Oct 13 20:56:56 np0005486557.novalocal sudo[99188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:56 np0005486557.novalocal sudo[99188]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99191]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testr_results.html /var/log/weirdo-project/logs/testr_results.html Oct 13 20:56:57 np0005486557.novalocal sudo[99191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99191]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99194]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dstat.log /var/log/weirdo-project/logs/ Oct 13 20:56:57 np0005486557.novalocal sudo[99194]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99194]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99197]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iostat.log /var/log/weirdo-project/logs/ Oct 13 20:56:57 np0005486557.novalocal sudo[99197]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99197]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99200]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iotop.log /var/log/weirdo-project/logs/ Oct 13 20:56:57 np0005486557.novalocal sudo[99200]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99200]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99203]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/libvirt /var/log/weirdo-project/logs/ Oct 13 20:56:57 np0005486557.novalocal sudo[99203]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99203]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99206]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/virsh net-list --all Oct 13 20:56:57 np0005486557.novalocal sudo[99206]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal virtqemud[90345]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Oct 13 20:56:57 np0005486557.novalocal sudo[99206]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99210]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/libvirt /var/log/weirdo-project/logs/etc/ Oct 13 20:56:57 np0005486557.novalocal sudo[99210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99210]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99213]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig Oct 13 20:56:57 np0005486557.novalocal sudo[99213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99213]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99216]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openvswitch /var/log/weirdo-project/logs/etc/ Oct 13 20:56:57 np0005486557.novalocal sudo[99216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99216]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99219]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/openvswitch /var/log/weirdo-project/logs/ Oct 13 20:56:57 np0005486557.novalocal sudo[99219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99219]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99223]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Oct 13 20:56:57 np0005486557.novalocal sudo[99223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99223]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99226]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Oct 13 20:56:57 np0005486557.novalocal sudo[99226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99226]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99229]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-ssl Oct 13 20:56:57 np0005486557.novalocal sudo[99229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99229]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99232]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Oct 13 20:56:57 np0005486557.novalocal sudo[99232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99232]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99235]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Oct 13 20:56:57 np0005486557.novalocal sudo[99235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99235]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99238]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-ssl Oct 13 20:56:57 np0005486557.novalocal sudo[99238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99238]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99241]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ Oct 13 20:56:57 np0005486557.novalocal sudo[99241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99241]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99244]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ Oct 13 20:56:57 np0005486557.novalocal sudo[99244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99244]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99247]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sudoers.d /var/log/weirdo-project/logs/ Oct 13 20:56:57 np0005486557.novalocal sudo[99247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99247]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99250]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sudoers /var/log/weirdo-project/logs/sudoers.txt Oct 13 20:56:57 np0005486557.novalocal sudo[99250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99250]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:57 np0005486557.novalocal sudo[99254]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/magic /etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ Oct 13 20:56:57 np0005486557.novalocal sudo[99254]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:57 np0005486557.novalocal sudo[99254]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99258]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.d/10-cinder_wsgi.conf /etc/httpd/conf.d/10-glance_wsgi.conf /etc/httpd/conf.d/10-keystone_wsgi.conf /etc/httpd/conf.d/10-manila_wsgi.conf /etc/httpd/conf.d/10-neutron_wsgi.conf /etc/httpd/conf.d/10-nova_api_wsgi.conf /etc/httpd/conf.d/10-nova_metadata_wsgi.conf /etc/httpd/conf.d/10-octavia_wsgi.conf /etc/httpd/conf.d/10-placement_wsgi.conf /etc/httpd/conf.d/15-horizon_ssl_vhost.conf /etc/httpd/conf.d/15-horizon_vhost.conf /etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/ Oct 13 20:56:58 np0005486557.novalocal sudo[99258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99258]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99262]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.modules.d/alias.conf /etc/httpd/conf.modules.d/alias.load /etc/httpd/conf.modules.d/authz_core.load /etc/httpd/conf.modules.d/authz_host.load /etc/httpd/conf.modules.d/filter.load /etc/httpd/conf.modules.d/log_config.load /etc/httpd/conf.modules.d/mime.conf /etc/httpd/conf.modules.d/mime.load /etc/httpd/conf.modules.d/prefork.conf /etc/httpd/conf.modules.d/prefork.load /etc/httpd/conf.modules.d/setenvif.conf /etc/httpd/conf.modules.d/setenvif.load /etc/httpd/conf.modules.d/socache_shmcb.load /etc/httpd/conf.modules.d/ssl.conf /etc/httpd/conf.modules.d/ssl.load /etc/httpd/conf.modules.d/systemd.load /etc/httpd/conf.modules.d/unixd.load /etc/httpd/conf.modules.d/wsgi.conf /etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ Oct 13 20:56:58 np0005486557.novalocal sudo[99262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99262]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99265]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/httpd /var/log/weirdo-project/logs/apache Oct 13 20:56:58 np0005486557.novalocal sudo[99265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99265]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99268]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/redis /var/log/weirdo-project/logs/ Oct 13 20:56:58 np0005486557.novalocal sudo[99268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99268]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99271]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/redis /var/log/weirdo-project/logs/etc/ Oct 13 20:56:58 np0005486557.novalocal sudo[99271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99271]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99274]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/audit/audit.log /var/log/weirdo-project/logs/audit.log.txt Oct 13 20:56:58 np0005486557.novalocal sudo[99274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99274]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99277]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/spool/cron /var/log/weirdo-project/logs/ Oct 13 20:56:58 np0005486557.novalocal sudo[99277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99277]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99280]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/etc/tempest.conf /var/log/weirdo-project/logs/tempest.conf.txt Oct 13 20:56:58 np0005486557.novalocal sudo[99280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99280]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99283]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack-dashboard /var/log/weirdo-project/logs/etc/openstack-dashboard Oct 13 20:56:58 np0005486557.novalocal sudo[99283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99283]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99287]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt Oct 13 20:56:58 np0005486557.novalocal sudo[99287]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99287]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99290]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt Oct 13 20:56:58 np0005486557.novalocal sudo[99290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99290]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99293]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt Oct 13 20:56:58 np0005486557.novalocal sudo[99293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99293]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99296]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt Oct 13 20:56:58 np0005486557.novalocal sudo[99296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99296]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99299]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt Oct 13 20:56:58 np0005486557.novalocal sudo[99299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99299]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99302]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt Oct 13 20:56:58 np0005486557.novalocal sudo[99302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99302]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99305]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt Oct 13 20:56:58 np0005486557.novalocal sudo[99305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99305]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99308]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt Oct 13 20:56:58 np0005486557.novalocal sudo[99308]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99308]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99311]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt Oct 13 20:56:58 np0005486557.novalocal sudo[99311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99311]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99314]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt Oct 13 20:56:58 np0005486557.novalocal sudo[99314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99314]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99317]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt Oct 13 20:56:58 np0005486557.novalocal sudo[99317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99317]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99320]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt Oct 13 20:56:58 np0005486557.novalocal sudo[99320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99320]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:58 np0005486557.novalocal sudo[99324]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf Oct 13 20:56:58 np0005486557.novalocal sudo[99324]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:56:58 np0005486557.novalocal sudo[99324]: pam_unix(sudo:session): session closed for user root Oct 13 20:56:59 np0005486557.novalocal sudo[99331]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf repolist -v Oct 13 20:56:59 np0005486557.novalocal sudo[99331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:00 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:57:00 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:57:00 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:57:01 np0005486557.novalocal sudo[99331]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:01 np0005486557.novalocal sudo[99335]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf list installed Oct 13 20:57:01 np0005486557.novalocal sudo[99335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:02 np0005486557.novalocal sudo[99335]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:02 np0005486557.novalocal sudo[99338]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf module list Oct 13 20:57:02 np0005486557.novalocal sudo[99338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:03 np0005486557.novalocal sudo[99338]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:03 np0005486557.novalocal sudo[99341]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/yum.repos.d /var/log/weirdo-project/logs/etc/yum.repos.d Oct 13 20:57:03 np0005486557.novalocal sudo[99341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:03 np0005486557.novalocal sudo[99341]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:03 np0005486557.novalocal sudo[99345]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.log /var/log/weirdo-project/logs/dnf Oct 13 20:57:03 np0005486557.novalocal sudo[99345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:03 np0005486557.novalocal sudo[99345]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:03 np0005486557.novalocal sudo[99348]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.rpm.log /var/log/weirdo-project/logs/dnf Oct 13 20:57:03 np0005486557.novalocal sudo[99348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:03 np0005486557.novalocal sudo[99348]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:03 np0005486557.novalocal sudo[99354]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/passwd /var/log/weirdo-project/logs/etc Oct 13 20:57:03 np0005486557.novalocal sudo[99354]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:03 np0005486557.novalocal sudo[99354]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:03 np0005486557.novalocal sudo[99357]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/group /var/log/weirdo-project/logs/etc Oct 13 20:57:03 np0005486557.novalocal sudo[99357]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:03 np0005486557.novalocal sudo[99357]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:03 np0005486557.novalocal sudo[99360]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack /var/log/weirdo-project/logs/etc Oct 13 20:57:03 np0005486557.novalocal sudo[99360]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:03 np0005486557.novalocal sudo[99360]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:03 np0005486557.novalocal sudo[99363]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml Oct 13 20:57:03 np0005486557.novalocal sudo[99363]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:03 np0005486557.novalocal sudo[99363]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:03 np0005486557.novalocal sudo[99370]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ps -eo user,pid,ppid,lwp,%cpu,%mem,size,rss,cmd Oct 13 20:57:03 np0005486557.novalocal sudo[99370]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:03 np0005486557.novalocal sudo[99370]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:03 np0005486557.novalocal sudo[99373]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/ip -d address Oct 13 20:57:03 np0005486557.novalocal sudo[99373]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:03 np0005486557.novalocal sudo[99373]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:03 np0005486557.novalocal sudo[99379]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl list open_vswitch Oct 13 20:57:03 np0005486557.novalocal sudo[99379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:03 np0005486557.novalocal sudo[99379]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:03 np0005486557.novalocal sudo[99382]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl show Oct 13 20:57:03 np0005486557.novalocal sudo[99382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:04 np0005486557.novalocal sudo[99382]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:04 np0005486557.novalocal sudo[99386]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Oct 13 20:57:04 np0005486557.novalocal sudo[99386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:04 np0005486557.novalocal sudo[99386]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:04 np0005486557.novalocal sudo[99389]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl list connection Oct 13 20:57:04 np0005486557.novalocal sudo[99389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:04 np0005486557.novalocal sudo[99389]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:04 np0005486557.novalocal sudo[99392]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Oct 13 20:57:04 np0005486557.novalocal sudo[99392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:04 np0005486557.novalocal sudo[99392]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:04 np0005486557.novalocal sudo[99396]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Oct 13 20:57:04 np0005486557.novalocal sudo[99396]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:04 np0005486557.novalocal sudo[99396]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:04 np0005486557.novalocal sudo[99399]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl list connection Oct 13 20:57:04 np0005486557.novalocal sudo[99399]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:04 np0005486557.novalocal sudo[99399]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:04 np0005486557.novalocal sudo[99402]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Oct 13 20:57:04 np0005486557.novalocal sudo[99402]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:04 np0005486557.novalocal sudo[99402]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:04 np0005486557.novalocal sudo[99405]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/netstat -tulpn Oct 13 20:57:04 np0005486557.novalocal sudo[99405]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:04 np0005486557.novalocal sudo[99405]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:04 np0005486557.novalocal sudo[99408]: root : PWD=/tmp/puppet-openstack ; USER=root ; ENV=LC_CTYPE=C SYSTEMD_COLORS=false ; COMMAND=/bin/systemctl status --all --no-pager Oct 13 20:57:04 np0005486557.novalocal sudo[99408]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:06 np0005486557.novalocal sudo[99408]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:06 np0005486557.novalocal sudo[99413]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t raw -vnxL Oct 13 20:57:06 np0005486557.novalocal sudo[99413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:06 np0005486557.novalocal sudo[99413]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:06 np0005486557.novalocal sudo[99416]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t filter -vnxL Oct 13 20:57:06 np0005486557.novalocal sudo[99416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:06 np0005486557.novalocal sudo[99416]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:07 np0005486557.novalocal sudo[99419]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t nat -vnxL Oct 13 20:57:07 np0005486557.novalocal sudo[99419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:07 np0005486557.novalocal sudo[99419]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:07 np0005486557.novalocal sudo[99422]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t mangle -vnxL Oct 13 20:57:07 np0005486557.novalocal sudo[99422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:07 np0005486557.novalocal sudo[99422]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:07 np0005486557.novalocal sudo[99425]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/fstab /var/log/weirdo-project/logs/etc/ Oct 13 20:57:07 np0005486557.novalocal sudo[99425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:07 np0005486557.novalocal sudo[99425]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:07 np0005486557.novalocal sudo[99428]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mount Oct 13 20:57:07 np0005486557.novalocal sudo[99428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:07 np0005486557.novalocal sudo[99428]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:07 np0005486557.novalocal sudo[99431]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/losetup -al Oct 13 20:57:07 np0005486557.novalocal sudo[99431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:07 np0005486557.novalocal sudo[99431]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:07 np0005486557.novalocal sudo[99434]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/pvs Oct 13 20:57:07 np0005486557.novalocal sudo[99434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:07 np0005486557.novalocal sudo[99434]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:07 np0005486557.novalocal sudo[99437]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/vgs Oct 13 20:57:07 np0005486557.novalocal sudo[99437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:07 np0005486557.novalocal sudo[99437]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:07 np0005486557.novalocal sudo[99440]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/lvs Oct 13 20:57:07 np0005486557.novalocal sudo[99440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:07 np0005486557.novalocal sudo[99440]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:07 np0005486557.novalocal sudo[99444]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/semanage boolean --list Oct 13 20:57:07 np0005486557.novalocal sudo[99444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:08 np0005486557.novalocal sudo[99444]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:12 np0005486557.novalocal sudo[99454]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_cells --verbose Oct 13 20:57:12 np0005486557.novalocal sudo[99454]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Oct 13 20:57:15 np0005486557.novalocal sudo[99454]: pam_unix(sudo:session): session closed for user nova Oct 13 20:57:15 np0005486557.novalocal sudo[99461]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_hosts Oct 13 20:57:15 np0005486557.novalocal sudo[99461]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Oct 13 20:57:17 np0005486557.novalocal sudo[99461]: pam_unix(sudo:session): session closed for user nova Oct 13 20:57:29 np0005486557.novalocal sudo[99526]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 13 20:57:29 np0005486557.novalocal systemd[1]: Started Session c304 of User root. Oct 13 20:57:29 np0005486557.novalocal sudo[99526]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:57:29 np0005486557.novalocal sudo[99526]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:29 np0005486557.novalocal systemd[1]: session-c304.scope: Deactivated successfully. Oct 13 20:57:29 np0005486557.novalocal sudo[99530]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:57:29 np0005486557.novalocal systemd[1]: Started Session c305 of User root. Oct 13 20:57:29 np0005486557.novalocal sudo[99530]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:57:29 np0005486557.novalocal sudo[99534]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type d -execdir sudo chmod 755 {} ; Oct 13 20:57:30 np0005486557.novalocal sudo[99534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99537]: root : PWD=/var/log/weirdo-project ; USER=root ; COMMAND=/bin/chmod 755 ./logs Oct 13 20:57:30 np0005486557.novalocal sudo[99537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99537]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99540]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./etc Oct 13 20:57:30 np0005486557.novalocal sudo[99540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99540]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99543]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./sysconfig Oct 13 20:57:30 np0005486557.novalocal sudo[99543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99543]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99546]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 755 ./network-scripts Oct 13 20:57:30 np0005486557.novalocal sudo[99546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99546]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99549]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ceph Oct 13 20:57:30 np0005486557.novalocal sudo[99549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99549]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99552]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Oct 13 20:57:30 np0005486557.novalocal sudo[99552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99552]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99556]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Oct 13 20:57:30 np0005486557.novalocal sudo[99556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99556]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99559]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./volumes Oct 13 20:57:30 np0005486557.novalocal sudo[99559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99559]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99530]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal systemd[1]: session-c305.scope: Deactivated successfully. Oct 13 20:57:30 np0005486557.novalocal sudo[99562]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 13 20:57:30 np0005486557.novalocal sudo[99562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99562]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99566]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 13 20:57:30 np0005486557.novalocal sudo[99566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99566]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99564]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 13 20:57:30 np0005486557.novalocal sudo[99569]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./glance Oct 13 20:57:30 np0005486557.novalocal systemd[1]: Started Session c306 of User root. Oct 13 20:57:30 np0005486557.novalocal sudo[99569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99564]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:57:30 np0005486557.novalocal sudo[99569]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99574]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 13 20:57:30 np0005486557.novalocal sudo[99574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99574]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99577]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 13 20:57:30 np0005486557.novalocal sudo[99577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99577]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99580]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./metadefs Oct 13 20:57:30 np0005486557.novalocal sudo[99580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99580]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99583]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Oct 13 20:57:30 np0005486557.novalocal sudo[99583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99583]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99586]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Oct 13 20:57:30 np0005486557.novalocal sudo[99586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99586]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99589]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./fernet-keys Oct 13 20:57:30 np0005486557.novalocal sudo[99589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99589]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99592]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./credential-keys Oct 13 20:57:30 np0005486557.novalocal sudo[99592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99592]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99596]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./policy.d Oct 13 20:57:30 np0005486557.novalocal sudo[99596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99596]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99599]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 13 20:57:30 np0005486557.novalocal sudo[99599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99599]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99602]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 13 20:57:30 np0005486557.novalocal sudo[99602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99602]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99564]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal systemd[1]: session-c306.scope: Deactivated successfully. Oct 13 20:57:30 np0005486557.novalocal sudo[99605]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./manila Oct 13 20:57:30 np0005486557.novalocal sudo[99605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99605]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99606]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 13 20:57:30 np0005486557.novalocal sudo[99609]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 13 20:57:30 np0005486557.novalocal sudo[99609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99609]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal systemd[1]: Started Session c307 of User root. Oct 13 20:57:30 np0005486557.novalocal sudo[99606]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 13 20:57:30 np0005486557.novalocal sudo[99613]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 13 20:57:30 np0005486557.novalocal sudo[99613]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99613]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99617]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Oct 13 20:57:30 np0005486557.novalocal sudo[99617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99617]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99620]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./kill_scripts Oct 13 20:57:30 np0005486557.novalocal sudo[99620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99620]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99623]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Oct 13 20:57:30 np0005486557.novalocal sudo[99623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99623]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99626]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovn-agent Oct 13 20:57:30 np0005486557.novalocal sudo[99626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99626]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99629]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-dhcp-agent Oct 13 20:57:30 np0005486557.novalocal sudo[99629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99629]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99632]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-l3-agent Oct 13 20:57:30 np0005486557.novalocal sudo[99632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:30 np0005486557.novalocal sudo[99632]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:30 np0005486557.novalocal sudo[99635]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-rpc-server Oct 13 20:57:31 np0005486557.novalocal sudo[99635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99635]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99638]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-metadata-agent Oct 13 20:57:31 np0005486557.novalocal sudo[99638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99638]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99642]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-netns-cleanup Oct 13 20:57:31 np0005486557.novalocal sudo[99642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99642]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99645]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovs-cleanup Oct 13 20:57:31 np0005486557.novalocal sudo[99645]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99645]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99606]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal systemd[1]: session-c307.scope: Deactivated successfully. Oct 13 20:57:31 np0005486557.novalocal sudo[99648]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-server Oct 13 20:57:31 np0005486557.novalocal sudo[99648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99648]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99651]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-vpn-agent Oct 13 20:57:31 np0005486557.novalocal sudo[99651]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99651]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99654]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Oct 13 20:57:31 np0005486557.novalocal sudo[99654]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99654]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99657]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 13 20:57:31 np0005486557.novalocal sudo[99657]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99657]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99660]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 13 20:57:31 np0005486557.novalocal sudo[99660]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99660]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99663]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./plugins Oct 13 20:57:31 np0005486557.novalocal sudo[99663]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99663]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99666]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./ml2 Oct 13 20:57:31 np0005486557.novalocal sudo[99666]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99666]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99669]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./networking-ovn Oct 13 20:57:31 np0005486557.novalocal sudo[99669]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99669]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99672]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./nova Oct 13 20:57:31 np0005486557.novalocal sudo[99672]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99672]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99675]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 13 20:57:31 np0005486557.novalocal sudo[99675]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99675]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99678]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 13 20:57:31 np0005486557.novalocal sudo[99678]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99678]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99681]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Oct 13 20:57:31 np0005486557.novalocal sudo[99681]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99681]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99684]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Oct 13 20:57:31 np0005486557.novalocal sudo[99684]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99684]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99687]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-driver-agent Oct 13 20:57:31 np0005486557.novalocal sudo[99687]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99687]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99690]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-worker Oct 13 20:57:31 np0005486557.novalocal sudo[99690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99690]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99693]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-api Oct 13 20:57:31 np0005486557.novalocal sudo[99693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99693]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99696]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Oct 13 20:57:31 np0005486557.novalocal sudo[99696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99696]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99699]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-housekeeping Oct 13 20:57:31 np0005486557.novalocal sudo[99699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99699]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99702]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-health-manager Oct 13 20:57:31 np0005486557.novalocal sudo[99702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99702]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99705]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./certs Oct 13 20:57:31 np0005486557.novalocal sudo[99705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99705]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99708]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 13 20:57:31 np0005486557.novalocal sudo[99708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99708]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99711]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 13 20:57:31 np0005486557.novalocal sudo[99711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99711]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99714]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Oct 13 20:57:31 np0005486557.novalocal sudo[99714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99714]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:31 np0005486557.novalocal sudo[99717]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./placement Oct 13 20:57:31 np0005486557.novalocal sudo[99717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:31 np0005486557.novalocal sudo[99717]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99720]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 13 20:57:32 np0005486557.novalocal sudo[99720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99720]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99723]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 13 20:57:32 np0005486557.novalocal sudo[99723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99723]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99726]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./tempest Oct 13 20:57:32 np0005486557.novalocal sudo[99726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99726]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99729]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rsyslog.d Oct 13 20:57:32 np0005486557.novalocal sudo[99729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99729]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99732]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Oct 13 20:57:32 np0005486557.novalocal sudo[99732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99732]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99735]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 13 20:57:32 np0005486557.novalocal sudo[99735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99735]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99738]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 13 20:57:32 np0005486557.novalocal sudo[99738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99738]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99741]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./my.cnf.d Oct 13 20:57:32 np0005486557.novalocal sudo[99741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99741]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99744]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./iscsi Oct 13 20:57:32 np0005486557.novalocal sudo[99744]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99744]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99747]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Oct 13 20:57:32 np0005486557.novalocal sudo[99747]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99747]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99750]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./storage Oct 13 20:57:32 np0005486557.novalocal sudo[99750]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99750]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99753]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/storage ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Oct 13 20:57:32 np0005486557.novalocal sudo[99753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99753]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99756]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Oct 13 20:57:32 np0005486557.novalocal sudo[99756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99756]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99759]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./networks Oct 13 20:57:32 np0005486557.novalocal sudo[99759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99759]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99762]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Oct 13 20:57:32 np0005486557.novalocal sudo[99762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99762]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99765]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Oct 13 20:57:32 np0005486557.novalocal sudo[99765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99765]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99768]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./secrets Oct 13 20:57:32 np0005486557.novalocal sudo[99768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99768]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99771]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./nwfilter Oct 13 20:57:32 np0005486557.novalocal sudo[99771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99771]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99774]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Oct 13 20:57:32 np0005486557.novalocal sudo[99774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99774]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99777]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./httpd Oct 13 20:57:32 np0005486557.novalocal sudo[99777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99777]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99780]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf Oct 13 20:57:32 np0005486557.novalocal sudo[99780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99780]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99783]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Oct 13 20:57:32 np0005486557.novalocal sudo[99783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99783]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99786]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.modules.d Oct 13 20:57:32 np0005486557.novalocal sudo[99786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99786]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99789]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./redis Oct 13 20:57:32 np0005486557.novalocal sudo[99789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99789]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99792]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 13 20:57:32 np0005486557.novalocal sudo[99792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99792]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99795]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 13 20:57:32 np0005486557.novalocal sudo[99795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:32 np0005486557.novalocal sudo[99795]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:32 np0005486557.novalocal sudo[99798]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack-dashboard Oct 13 20:57:32 np0005486557.novalocal sudo[99798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99798]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99801]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./default_policies.txt Oct 13 20:57:33 np0005486557.novalocal sudo[99801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99801]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99804]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./enabled.txt Oct 13 20:57:33 np0005486557.novalocal sudo[99804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99804]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99807]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./local_settings.d.txt Oct 13 20:57:33 np0005486557.novalocal sudo[99807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99807]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99810]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./nova_policy.d.txt Oct 13 20:57:33 np0005486557.novalocal sudo[99810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99810]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99813]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./ssl.txt Oct 13 20:57:33 np0005486557.novalocal sudo[99813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99813]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99816]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 13 20:57:33 np0005486557.novalocal sudo[99816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99816]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99819]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./yum.repos.d Oct 13 20:57:33 np0005486557.novalocal sudo[99819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99819]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99822]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack Oct 13 20:57:33 np0005486557.novalocal sudo[99822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99822]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99825]: root : PWD=/var/log/weirdo-project/logs/etc/openstack ; USER=root ; COMMAND=/bin/chmod 755 ./puppet Oct 13 20:57:33 np0005486557.novalocal sudo[99825]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99825]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99828]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Oct 13 20:57:33 np0005486557.novalocal sudo[99828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99828]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99831]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./glance Oct 13 20:57:33 np0005486557.novalocal sudo[99831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99831]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99834]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./horizon Oct 13 20:57:33 np0005486557.novalocal sudo[99834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99834]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99837]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Oct 13 20:57:33 np0005486557.novalocal sudo[99837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99837]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99840]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./manila Oct 13 20:57:33 np0005486557.novalocal sudo[99840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99840]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99843]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Oct 13 20:57:33 np0005486557.novalocal sudo[99843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99843]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99846]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./nova Oct 13 20:57:33 np0005486557.novalocal sudo[99846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99846]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99849]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Oct 13 20:57:33 np0005486557.novalocal sudo[99849]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99849]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99852]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Oct 13 20:57:33 np0005486557.novalocal sudo[99852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99852]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99855]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./placement Oct 13 20:57:33 np0005486557.novalocal sudo[99855]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99855]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99858]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Oct 13 20:57:33 np0005486557.novalocal sudo[99858]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99858]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99861]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./mariadb Oct 13 20:57:33 np0005486557.novalocal sudo[99861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99861]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99864]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Oct 13 20:57:33 np0005486557.novalocal sudo[99864]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99864]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99867]: root : PWD=/var/log/weirdo-project/logs/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Oct 13 20:57:33 np0005486557.novalocal sudo[99867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99867]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99870]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Oct 13 20:57:33 np0005486557.novalocal sudo[99870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99870]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99873]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./sudoers.d Oct 13 20:57:33 np0005486557.novalocal sudo[99873]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99873]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99876]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./apache Oct 13 20:57:33 np0005486557.novalocal sudo[99876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99876]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99879]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./redis Oct 13 20:57:33 np0005486557.novalocal sudo[99879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99879]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99882]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cron Oct 13 20:57:33 np0005486557.novalocal sudo[99882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:33 np0005486557.novalocal sudo[99882]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:33 np0005486557.novalocal sudo[99885]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./dnf Oct 13 20:57:34 np0005486557.novalocal sudo[99885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99885]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99888]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openstack_resources Oct 13 20:57:34 np0005486557.novalocal sudo[99888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99888]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99534]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99891]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type f -execdir sudo chmod 644 {} ; Oct 13 20:57:34 np0005486557.novalocal sudo[99891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99894]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20251013_204037.log Oct 13 20:57:34 np0005486557.novalocal sudo[99894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99894]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99897]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20251013_204339.log Oct 13 20:57:34 np0005486557.novalocal sudo[99897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99897]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99900]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-eth0 Oct 13 20:57:34 np0005486557.novalocal sudo[99900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99900]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99903]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./readme-ifcfg-rh.txt Oct 13 20:57:34 np0005486557.novalocal sudo[99903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99903]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99906]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-lo Oct 13 20:57:34 np0005486557.novalocal sudo[99906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99906]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99909]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown Oct 13 20:57:34 np0005486557.novalocal sudo[99909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99909]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99912]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-eth Oct 13 20:57:34 np0005486557.novalocal sudo[99912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99912]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99915]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ipv6 Oct 13 20:57:34 np0005486557.novalocal sudo[99915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99915]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99918]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ovs Oct 13 20:57:34 np0005486557.novalocal sudo[99918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99918]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99921]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-post Oct 13 20:57:34 np0005486557.novalocal sudo[99921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99921]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99924]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-routes Oct 13 20:57:34 np0005486557.novalocal sudo[99924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99924]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99927]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-tunnel Oct 13 20:57:34 np0005486557.novalocal sudo[99927]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99927]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99930]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup Oct 13 20:57:34 np0005486557.novalocal sudo[99930]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99930]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99933]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-aliases Oct 13 20:57:34 np0005486557.novalocal sudo[99933]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99933]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99936]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-eth Oct 13 20:57:34 np0005486557.novalocal sudo[99936]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99936]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99939]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ipv6 Oct 13 20:57:34 np0005486557.novalocal sudo[99939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99939]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99942]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ovs Oct 13 20:57:34 np0005486557.novalocal sudo[99942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99942]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99945]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-post Oct 13 20:57:34 np0005486557.novalocal sudo[99945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99945]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99948]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-routes Oct 13 20:57:34 np0005486557.novalocal sudo[99948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99948]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99951]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-tunnel Oct 13 20:57:34 np0005486557.novalocal sudo[99951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99951]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99954]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./init.ipv6-global Oct 13 20:57:34 np0005486557.novalocal sudo[99954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99954]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99957]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions Oct 13 20:57:34 np0005486557.novalocal sudo[99957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99957]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99960]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions-ipv6 Oct 13 20:57:34 np0005486557.novalocal sudo[99960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99960]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99963]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-loop1 Oct 13 20:57:34 np0005486557.novalocal sudo[99963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99963]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:34 np0005486557.novalocal sudo[99966]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-br-ex Oct 13 20:57:34 np0005486557.novalocal sudo[99966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:34 np0005486557.novalocal sudo[99966]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[99969]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-guests Oct 13 20:57:35 np0005486557.novalocal sudo[99969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[99969]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[99972]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd Oct 13 20:57:35 np0005486557.novalocal sudo[99972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[99972]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[99975]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller Oct 13 20:57:35 np0005486557.novalocal sudo[99975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[99975]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[99978]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Oct 13 20:57:35 np0005486557.novalocal sudo[99978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[99978]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[99981]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.conf Oct 13 20:57:35 np0005486557.novalocal sudo[99981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[99981]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[99984]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./resource_filters.json Oct 13 20:57:35 np0005486557.novalocal sudo[99984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[99984]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[99987]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Oct 13 20:57:35 np0005486557.novalocal sudo[99987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[99987]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[99990]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 13 20:57:35 np0005486557.novalocal sudo[99990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[99990]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[99993]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005486557.novalocal.pem Oct 13 20:57:35 np0005486557.novalocal sudo[99993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[99993]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[99996]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005486557.novalocal.pem Oct 13 20:57:35 np0005486557.novalocal sudo[99996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[99996]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[99999]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api-paste.ini Oct 13 20:57:35 np0005486557.novalocal sudo[99999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[99999]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100002]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api.conf Oct 13 20:57:35 np0005486557.novalocal sudo[100002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100002]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100005]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-cache.conf Oct 13 20:57:35 np0005486557.novalocal sudo[100005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100005]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100008]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-image-import.conf Oct 13 20:57:35 np0005486557.novalocal sudo[100008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100008]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100011]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-scrubber.conf Oct 13 20:57:35 np0005486557.novalocal sudo[100011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100011]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100014]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-swift.conf Oct 13 20:57:35 np0005486557.novalocal sudo[100014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100014]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100017]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Oct 13 20:57:35 np0005486557.novalocal sudo[100017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100017]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100020]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./schema-image.json Oct 13 20:57:35 np0005486557.novalocal sudo[100020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100020]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100023]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 13 20:57:35 np0005486557.novalocal sudo[100023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100023]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100026]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-processor-allocation-setting-data.json Oct 13 20:57:35 np0005486557.novalocal sudo[100026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100026]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100029]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-resource-allocation-setting-data.json Oct 13 20:57:35 np0005486557.novalocal sudo[100029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100029]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100032]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-storage-allocation-setting-data.json Oct 13 20:57:35 np0005486557.novalocal sudo[100032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100032]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100035]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-virtual-system-setting-data.json Oct 13 20:57:35 np0005486557.novalocal sudo[100035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100035]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100038]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-disk-filter.json Oct 13 20:57:35 np0005486557.novalocal sudo[100038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100038]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100043]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-iops-filter.json Oct 13 20:57:35 np0005486557.novalocal sudo[100043]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100043]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100046]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-num-instances.json Oct 13 20:57:35 np0005486557.novalocal sudo[100046]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100046]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100049]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-mode.json Oct 13 20:57:35 np0005486557.novalocal sudo[100049]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100049]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100052]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-pinning.json Oct 13 20:57:35 np0005486557.novalocal sudo[100052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:35 np0005486557.novalocal sudo[100052]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:35 np0005486557.novalocal sudo[100055]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-memory-backing.json Oct 13 20:57:35 np0005486557.novalocal sudo[100055]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100055]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100058]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-shutdown.json Oct 13 20:57:36 np0005486557.novalocal sudo[100058]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100058]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100061]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-host-capabilities.json Oct 13 20:57:36 np0005486557.novalocal sudo[100061]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100061]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100064]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-hypervisor.json Oct 13 20:57:36 np0005486557.novalocal sudo[100064]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100064]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100067]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-instance-data.json Oct 13 20:57:36 np0005486557.novalocal sudo[100067]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100067]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100070]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt-image.json Oct 13 20:57:36 np0005486557.novalocal sudo[100070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100070]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100073]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt.json Oct 13 20:57:36 np0005486557.novalocal sudo[100073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100073]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100076]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-quota.json Oct 13 20:57:36 np0005486557.novalocal sudo[100076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100076]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100079]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-randomgen.json Oct 13 20:57:36 np0005486557.novalocal sudo[100079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100079]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100082]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vcputopology.json Oct 13 20:57:36 np0005486557.novalocal sudo[100082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100082]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100085]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-flavor.json Oct 13 20:57:36 np0005486557.novalocal sudo[100085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100085]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100088]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-quota-flavor.json Oct 13 20:57:36 np0005486557.novalocal sudo[100088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100088]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100091]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware.json Oct 13 20:57:36 np0005486557.novalocal sudo[100091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100091]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100094]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm-hw.json Oct 13 20:57:36 np0005486557.novalocal sudo[100094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100094]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100097]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm.json Oct 13 20:57:36 np0005486557.novalocal sudo[100097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100097]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100100]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-watchdog.json Oct 13 20:57:36 np0005486557.novalocal sudo[100100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100100]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100103]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-xenapi.json Oct 13 20:57:36 np0005486557.novalocal sudo[100103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100103]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100106]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./glance-common-image-props.json Oct 13 20:57:36 np0005486557.novalocal sudo[100106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100106]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100109]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./image-signature-verification.json Oct 13 20:57:36 np0005486557.novalocal sudo[100109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100109]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100112]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./operating-system.json Oct 13 20:57:36 np0005486557.novalocal sudo[100112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100112]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100115]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-databases.json Oct 13 20:57:36 np0005486557.novalocal sudo[100115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100115]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100118]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-runtimes.json Oct 13 20:57:36 np0005486557.novalocal sudo[100118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100118]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100121]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-webservers.json Oct 13 20:57:36 np0005486557.novalocal sudo[100121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100121]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100124]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./storage-volume-type.json Oct 13 20:57:36 np0005486557.novalocal sudo[100124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100124]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100127]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Oct 13 20:57:36 np0005486557.novalocal sudo[100127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100127]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100130]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Oct 13 20:57:36 np0005486557.novalocal sudo[100130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100130]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100133]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.conf Oct 13 20:57:36 np0005486557.novalocal sudo[100133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100133]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100136]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf Oct 13 20:57:36 np0005486557.novalocal sudo[100136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100136]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100139]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./sso_callback_template.html Oct 13 20:57:36 np0005486557.novalocal sudo[100139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100139]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100142]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Oct 13 20:57:36 np0005486557.novalocal sudo[100142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100142]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100145]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Oct 13 20:57:36 np0005486557.novalocal sudo[100145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100145]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100148]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 13 20:57:36 np0005486557.novalocal sudo[100148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:36 np0005486557.novalocal sudo[100148]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:36 np0005486557.novalocal sudo[100151]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005486557.novalocal.pem Oct 13 20:57:37 np0005486557.novalocal sudo[100151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100151]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100154]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005486557.novalocal.pem Oct 13 20:57:37 np0005486557.novalocal sudo[100154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100154]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100157]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Oct 13 20:57:37 np0005486557.novalocal sudo[100157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100157]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100160]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila.conf Oct 13 20:57:37 np0005486557.novalocal sudo[100160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100160]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100163]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Oct 13 20:57:37 np0005486557.novalocal sudo[100163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100163]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100166]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 13 20:57:37 np0005486557.novalocal sudo[100166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100166]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100169]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.conf Oct 13 20:57:37 np0005486557.novalocal sudo[100169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100169]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100172]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Oct 13 20:57:37 np0005486557.novalocal sudo[100172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100172]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100175]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Oct 13 20:57:37 np0005486557.novalocal sudo[100175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100175]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100178]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./dhcp_agent.ini Oct 13 20:57:37 np0005486557.novalocal sudo[100178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100178]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100181]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./l3_agent.ini Oct 13 20:57:37 np0005486557.novalocal sudo[100181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100181]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100184]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./metadata_agent.ini Oct 13 20:57:37 np0005486557.novalocal sudo[100184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100184]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100187]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_vpn_agent.ini Oct 13 20:57:37 np0005486557.novalocal sudo[100187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100187]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100190]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_vpnaas.conf Oct 13 20:57:37 np0005486557.novalocal sudo[100190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100190]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100193]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./vpn_agent.ini Oct 13 20:57:37 np0005486557.novalocal sudo[100193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100193]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100196]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Oct 13 20:57:37 np0005486557.novalocal sudo[100196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100196]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100199]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Oct 13 20:57:37 np0005486557.novalocal sudo[100199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100199]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100202]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Oct 13 20:57:37 np0005486557.novalocal sudo[100202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100202]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100205]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Oct 13 20:57:37 np0005486557.novalocal sudo[100205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100205]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100208]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Oct 13 20:57:37 np0005486557.novalocal sudo[100208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100208]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100211]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 13 20:57:37 np0005486557.novalocal sudo[100211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100211]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100214]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./README Oct 13 20:57:37 np0005486557.novalocal sudo[100214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100214]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100217]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005486557.novalocal.pem Oct 13 20:57:37 np0005486557.novalocal sudo[100217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100217]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100220]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ml2_conf.ini Oct 13 20:57:37 np0005486557.novalocal sudo[100220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100220]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100223]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_agent.ini Oct 13 20:57:37 np0005486557.novalocal sudo[100223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100223]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100226]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./sriov_agent.ini Oct 13 20:57:37 np0005486557.novalocal sudo[100226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100226]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100229]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005486557.novalocal.pem Oct 13 20:57:37 np0005486557.novalocal sudo[100229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100229]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:37 np0005486557.novalocal sudo[100232]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Oct 13 20:57:37 np0005486557.novalocal sudo[100232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:37 np0005486557.novalocal sudo[100232]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100235]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova.conf Oct 13 20:57:38 np0005486557.novalocal sudo[100235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100235]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100238]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./release Oct 13 20:57:38 np0005486557.novalocal sudo[100238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100238]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100241]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Oct 13 20:57:38 np0005486557.novalocal sudo[100241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100241]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100244]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.conf Oct 13 20:57:38 np0005486557.novalocal sudo[100244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100244]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100247]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 13 20:57:38 np0005486557.novalocal sudo[100247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100247]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100250]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Oct 13 20:57:38 np0005486557.novalocal sudo[100250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100250]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100253]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Oct 13 20:57:38 np0005486557.novalocal sudo[100253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100253]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100256]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Oct 13 20:57:38 np0005486557.novalocal sudo[100256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100256]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100259]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Oct 13 20:57:38 np0005486557.novalocal sudo[100259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100259]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100262]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Oct 13 20:57:38 np0005486557.novalocal sudo[100262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100262]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100265]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.conf Oct 13 20:57:38 np0005486557.novalocal sudo[100265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100265]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100268]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 13 20:57:38 np0005486557.novalocal sudo[100268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100268]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100271]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.cert.pem Oct 13 20:57:38 np0005486557.novalocal sudo[100271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100271]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100274]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.key.pem Oct 13 20:57:38 np0005486557.novalocal sudo[100274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100274]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100277]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client_ca.cert.pem Oct 13 20:57:38 np0005486557.novalocal sudo[100277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100277]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100280]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client.cert-and-key.pem Oct 13 20:57:38 np0005486557.novalocal sudo[100280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100280]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100283]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005486557.novalocal.pem Oct 13 20:57:38 np0005486557.novalocal sudo[100283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100283]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100286]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005486557.novalocal.pem Oct 13 20:57:38 np0005486557.novalocal sudo[100286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100286]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100289]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.conf Oct 13 20:57:38 np0005486557.novalocal sudo[100289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100289]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100292]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 13 20:57:38 np0005486557.novalocal sudo[100292]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100292]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100295]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./accounts.yaml.sample Oct 13 20:57:38 np0005486557.novalocal sudo[100295]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100295]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100298]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./allow-list.yaml Oct 13 20:57:38 np0005486557.novalocal sudo[100298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100298]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100301]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf.sample Oct 13 20:57:38 np0005486557.novalocal sudo[100301]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100301]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:38 np0005486557.novalocal sudo[100304]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./rbac-persona-accounts.yaml.sample Oct 13 20:57:38 np0005486557.novalocal sudo[100304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:38 np0005486557.novalocal sudo[100304]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100307]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf Oct 13 20:57:39 np0005486557.novalocal sudo[100307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100307]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100310]: root : PWD=/var/log/weirdo-project/logs/etc/rsyslog.d ; USER=root ; COMMAND=/bin/chmod 644 ./21-cloudinit.conf Oct 13 20:57:39 np0005486557.novalocal sudo[100310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100310]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100313]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyslog.conf Oct 13 20:57:39 np0005486557.novalocal sudo[100313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100313]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100316]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.config Oct 13 20:57:39 np0005486557.novalocal sudo[100316]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100316]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100319]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.conf Oct 13 20:57:39 np0005486557.novalocal sudo[100319]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100319]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100322]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq-env.conf Oct 13 20:57:39 np0005486557.novalocal sudo[100322]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100322]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100325]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./inetrc Oct 13 20:57:39 np0005486557.novalocal sudo[100325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100325]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100328]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmqadmin.conf Oct 13 20:57:39 np0005486557.novalocal sudo[100328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100328]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100331]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./enabled_plugins Oct 13 20:57:39 np0005486557.novalocal sudo[100331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100331]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100334]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005486557.novalocal.pem Oct 13 20:57:39 np0005486557.novalocal sudo[100334]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100334]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100337]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./my.cnf Oct 13 20:57:39 np0005486557.novalocal sudo[100337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100337]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100340]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./client.cnf Oct 13 20:57:39 np0005486557.novalocal sudo[100340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100340]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100343]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./server.cnf Oct 13 20:57:39 np0005486557.novalocal sudo[100343]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100343]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100346]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_gssapi.cnf Oct 13 20:57:39 np0005486557.novalocal sudo[100346]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100346]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100349]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./enable_encryption.preset Oct 13 20:57:39 np0005486557.novalocal sudo[100349]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100349]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100352]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb-server.cnf Oct 13 20:57:39 np0005486557.novalocal sudo[100352]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100352]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100355]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./spider.cnf Oct 13 20:57:39 np0005486557.novalocal sudo[100355]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100355]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100358]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mysql-clients.cnf Oct 13 20:57:39 np0005486557.novalocal sudo[100358]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100358]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100361]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./np0005486557.novalocal.pem Oct 13 20:57:39 np0005486557.novalocal sudo[100361]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100361]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100364]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./initiatorname.iscsi Oct 13 20:57:39 np0005486557.novalocal sudo[100364]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100364]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100367]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./iscsid.conf Oct 13 20:57:39 np0005486557.novalocal sudo[100367]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100367]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100370]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 644 ./default.xml Oct 13 20:57:39 np0005486557.novalocal sudo[100370]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100370]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100373]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-admin.conf Oct 13 20:57:39 np0005486557.novalocal sudo[100373]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100373]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100376]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt.conf Oct 13 20:57:39 np0005486557.novalocal sudo[100376]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100376]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100379]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlockd.conf Oct 13 20:57:39 np0005486557.novalocal sudo[100379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100379]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100382]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlogd.conf Oct 13 20:57:39 np0005486557.novalocal sudo[100382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100382]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100385]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtproxyd.conf Oct 13 20:57:39 np0005486557.novalocal sudo[100385]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:39 np0005486557.novalocal sudo[100385]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:39 np0005486557.novalocal sudo[100388]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtstoraged.conf Oct 13 20:57:39 np0005486557.novalocal sudo[100388]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100388]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100391]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirtd.conf Oct 13 20:57:40 np0005486557.novalocal sudo[100391]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100391]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100394]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtinterfaced.conf Oct 13 20:57:40 np0005486557.novalocal sudo[100394]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100394]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100397]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./network.conf Oct 13 20:57:40 np0005486557.novalocal sudo[100397]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100397]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100400]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnetworkd.conf Oct 13 20:57:40 np0005486557.novalocal sudo[100400]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100400]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100403]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnodedevd.conf Oct 13 20:57:40 np0005486557.novalocal sudo[100403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100403]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100406]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnwfilterd.conf Oct 13 20:57:40 np0005486557.novalocal sudo[100406]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100406]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100409]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-lockd.conf Oct 13 20:57:40 np0005486557.novalocal sudo[100409]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100409]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100412]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu.conf Oct 13 20:57:40 np0005486557.novalocal sudo[100412]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100412]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100415]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtqemud.conf Oct 13 20:57:40 np0005486557.novalocal sudo[100415]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100415]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100418]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtsecretd.conf Oct 13 20:57:40 np0005486557.novalocal sudo[100418]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100418]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100421]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./default.conf Oct 13 20:57:40 np0005486557.novalocal sudo[100421]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100421]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100424]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./.conf.db.~lock~ Oct 13 20:57:40 np0005486557.novalocal sudo[100424]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100424]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100427]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./conf.db Oct 13 20:57:40 np0005486557.novalocal sudo[100427]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100427]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100430]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./system-id.conf Oct 13 20:57:40 np0005486557.novalocal sudo[100430]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100430]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100433]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-req.pem Oct 13 20:57:40 np0005486557.novalocal sudo[100433]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100433]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100436]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Oct 13 20:57:40 np0005486557.novalocal sudo[100436]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100436]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100439]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-req.pem Oct 13 20:57:40 np0005486557.novalocal sudo[100439]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100439]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100442]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Oct 13 20:57:40 np0005486557.novalocal sudo[100442]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100442]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100445]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-privkey.pem Oct 13 20:57:40 np0005486557.novalocal sudo[100445]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100445]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100448]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-req.pem Oct 13 20:57:40 np0005486557.novalocal sudo[100448]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100448]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100451]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-cert.pem Oct 13 20:57:40 np0005486557.novalocal sudo[100451]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100451]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100454]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Oct 13 20:57:40 np0005486557.novalocal sudo[100454]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100454]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100457]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Oct 13 20:57:40 np0005486557.novalocal sudo[100457]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100457]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100460]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./httpd.conf Oct 13 20:57:40 np0005486557.novalocal sudo[100460]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100460]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100463]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./magic Oct 13 20:57:40 np0005486557.novalocal sudo[100463]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100463]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100466]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./ports.conf Oct 13 20:57:40 np0005486557.novalocal sudo[100466]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100466]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100469]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-cinder_wsgi.conf Oct 13 20:57:40 np0005486557.novalocal sudo[100469]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:40 np0005486557.novalocal sudo[100469]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:40 np0005486557.novalocal sudo[100472]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-glance_wsgi.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100472]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100472]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100475]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-keystone_wsgi.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100475]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100475]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100478]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-manila_wsgi.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100478]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100478]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100481]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-neutron_wsgi.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100481]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100481]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100484]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_api_wsgi.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100484]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100484]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100487]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_metadata_wsgi.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100487]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100487]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100490]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-octavia_wsgi.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100490]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100490]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100493]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-placement_wsgi.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100493]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100493]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100496]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_ssl_vhost.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100496]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100496]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100499]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_vhost.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100499]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100499]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100502]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./openstack-dashboard.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100502]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100502]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100505]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100505]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100508]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.load Oct 13 20:57:41 np0005486557.novalocal sudo[100508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100508]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100511]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_core.load Oct 13 20:57:41 np0005486557.novalocal sudo[100511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100511]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100514]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_host.load Oct 13 20:57:41 np0005486557.novalocal sudo[100514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100514]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100517]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./filter.load Oct 13 20:57:41 np0005486557.novalocal sudo[100517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100517]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100520]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./log_config.load Oct 13 20:57:41 np0005486557.novalocal sudo[100520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100520]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100523]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100523]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100523]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100526]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.load Oct 13 20:57:41 np0005486557.novalocal sudo[100526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100526]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100529]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100529]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100532]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.load Oct 13 20:57:41 np0005486557.novalocal sudo[100532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100532]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100535]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100535]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100538]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.load Oct 13 20:57:41 np0005486557.novalocal sudo[100538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100538]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100541]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./socache_shmcb.load Oct 13 20:57:41 np0005486557.novalocal sudo[100541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100541]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:41 np0005486557.novalocal sudo[100544]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.conf Oct 13 20:57:41 np0005486557.novalocal sudo[100544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:41 np0005486557.novalocal sudo[100544]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100547]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.load Oct 13 20:57:42 np0005486557.novalocal sudo[100547]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100547]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100550]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./systemd.load Oct 13 20:57:42 np0005486557.novalocal sudo[100550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100550]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100553]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./unixd.load Oct 13 20:57:42 np0005486557.novalocal sudo[100553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100553]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100556]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.conf Oct 13 20:57:42 np0005486557.novalocal sudo[100556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100556]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100559]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.load Oct 13 20:57:42 np0005486557.novalocal sudo[100559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100559]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100562]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf Oct 13 20:57:42 np0005486557.novalocal sudo[100562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100562]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100565]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf.puppet Oct 13 20:57:42 np0005486557.novalocal sudo[100565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100565]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100568]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf.puppet Oct 13 20:57:42 np0005486557.novalocal sudo[100568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100568]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100571]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf Oct 13 20:57:42 np0005486557.novalocal sudo[100571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100571]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100574]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005486557.novalocal.pem Oct 13 20:57:42 np0005486557.novalocal sudo[100574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100574]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100577]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./.secret_key_store Oct 13 20:57:42 np0005486557.novalocal sudo[100577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100577]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100580]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_policy.yaml.txt Oct 13 20:57:42 np0005486557.novalocal sudo[100580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100580]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100583]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./README.txt Oct 13 20:57:42 np0005486557.novalocal sudo[100583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100583]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100586]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.yaml Oct 13 20:57:42 np0005486557.novalocal sudo[100586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100586]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100589]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./glance.yaml Oct 13 20:57:42 np0005486557.novalocal sudo[100589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100589]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100592]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.yaml Oct 13 20:57:42 np0005486557.novalocal sudo[100592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100592]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100595]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.yaml Oct 13 20:57:42 np0005486557.novalocal sudo[100595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100595]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100598]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./nova.yaml Oct 13 20:57:42 np0005486557.novalocal sudo[100598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100598]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100601]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./manila.yaml Oct 13 20:57:42 np0005486557.novalocal sudo[100601]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100601]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100604]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./glance_policy.yaml.txt Oct 13 20:57:42 np0005486557.novalocal sudo[100604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100604]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100607]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_policy.yaml.txt Oct 13 20:57:42 np0005486557.novalocal sudo[100607]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100607]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100610]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./local_settings.txt Oct 13 20:57:42 np0005486557.novalocal sudo[100610]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100610]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100613]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_90_manila_shares.py Oct 13 20:57:42 np0005486557.novalocal sudo[100613]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100613]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100616]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_10_set_custom_theme.py.example Oct 13 20:57:42 np0005486557.novalocal sudo[100616]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100616]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:42 np0005486557.novalocal sudo[100619]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_11_toggle_angular_features.py.example Oct 13 20:57:42 np0005486557.novalocal sudo[100619]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:42 np0005486557.novalocal sudo[100619]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100622]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_2010_integration_tests_deprecated.py.example Oct 13 20:57:43 np0005486557.novalocal sudo[100622]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100622]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100625]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_20_integration_tests_scaffolds.py.example Oct 13 20:57:43 np0005486557.novalocal sudo[100625]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100625]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100628]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_9030_profiler_settings.py.example Oct 13 20:57:43 np0005486557.novalocal sudo[100628]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100628]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100631]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./manila_policy.yaml.txt Oct 13 20:57:43 np0005486557.novalocal sudo[100631]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100631]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100634]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_policy.yaml.txt Oct 13 20:57:43 np0005486557.novalocal sudo[100634]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100634]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100637]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./api-extensions.yaml Oct 13 20:57:43 np0005486557.novalocal sudo[100637]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100637]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100640]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./nova_policy.yaml.txt Oct 13 20:57:43 np0005486557.novalocal sudo[100640]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100640]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100643]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005486557.novalocal.pem Oct 13 20:57:43 np0005486557.novalocal sudo[100643]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100643]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100646]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyncd.conf Oct 13 20:57:43 np0005486557.novalocal sudo[100646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100646]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100649]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos-addons.repo Oct 13 20:57:43 np0005486557.novalocal sudo[100649]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100649]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100652]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos.repo Oct 13 20:57:43 np0005486557.novalocal sudo[100652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100652]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100655]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean-deps.repo Oct 13 20:57:43 np0005486557.novalocal sudo[100655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100655]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100658]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean.repo Oct 13 20:57:43 np0005486557.novalocal sudo[100658]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100658]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100661]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean-zuul-repo.repo Oct 13 20:57:43 np0005486557.novalocal sudo[100661]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100661]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100664]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./redhat.repo Oct 13 20:57:43 np0005486557.novalocal sudo[100664]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100664]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100667]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-Messaging-rabbitmq.repo Oct 13 20:57:43 np0005486557.novalocal sudo[100667]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100667]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100670]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./passwd Oct 13 20:57:43 np0005486557.novalocal sudo[100670]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100670]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100673]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./group Oct 13 20:57:43 np0005486557.novalocal sudo[100673]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100673]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100676]: root : PWD=/var/log/weirdo-project/logs/etc/openstack/puppet ; USER=root ; COMMAND=/bin/chmod 644 ./admin-clouds.yaml Oct 13 20:57:43 np0005486557.novalocal sudo[100676]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100676]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100679]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./fstab Oct 13 20:57:43 np0005486557.novalocal sudo[100679]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100679]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100682]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-manage.log Oct 13 20:57:43 np0005486557.novalocal sudo[100682]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100682]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100685]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-api.log Oct 13 20:57:43 np0005486557.novalocal sudo[100685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100685]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100688]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Oct 13 20:57:43 np0005486557.novalocal sudo[100688]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100688]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100691]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./volume.log Oct 13 20:57:43 np0005486557.novalocal sudo[100691]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100691]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100694]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./backup.log Oct 13 20:57:43 np0005486557.novalocal sudo[100694]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100694]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100697]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./api.log Oct 13 20:57:43 np0005486557.novalocal sudo[100697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100697]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100700]: root : PWD=/var/log/weirdo-project/logs/horizon ; USER=root ; COMMAND=/bin/chmod 644 ./horizon.log Oct 13 20:57:43 np0005486557.novalocal sudo[100700]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:43 np0005486557.novalocal sudo[100700]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:43 np0005486557.novalocal sudo[100703]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.log Oct 13 20:57:44 np0005486557.novalocal sudo[100703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100703]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100706]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone-manage.log Oct 13 20:57:44 np0005486557.novalocal sudo[100706]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100706]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100709]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-manage.log Oct 13 20:57:44 np0005486557.novalocal sudo[100709]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100709]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100712]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Oct 13 20:57:44 np0005486557.novalocal sudo[100712]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100712]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100715]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./share.log Oct 13 20:57:44 np0005486557.novalocal sudo[100715]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100715]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100718]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Oct 13 20:57:44 np0005486557.novalocal sudo[100718]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100718]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100721]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./data.log Oct 13 20:57:44 np0005486557.novalocal sudo[100721]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100721]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100724]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-api.log Oct 13 20:57:44 np0005486557.novalocal sudo[100724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100724]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100727]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./app.log Oct 13 20:57:44 np0005486557.novalocal sudo[100727]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100727]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100730]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rpc-server.log Oct 13 20:57:44 np0005486557.novalocal sudo[100730]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100730]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100733]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./periodic-workers.log Oct 13 20:57:44 np0005486557.novalocal sudo[100733]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100733]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100736]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron-ovn-agent.log Oct 13 20:57:44 np0005486557.novalocal sudo[100736]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100736]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100739]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-vpn-agent.log Oct 13 20:57:44 np0005486557.novalocal sudo[100739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100739]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100742]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-maintenance-worker.log Oct 13 20:57:44 np0005486557.novalocal sudo[100742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100742]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100745]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Oct 13 20:57:44 np0005486557.novalocal sudo[100745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100745]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100748]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-conductor.log Oct 13 20:57:44 np0005486557.novalocal sudo[100748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100748]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100751]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.log Oct 13 20:57:44 np0005486557.novalocal sudo[100751]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100751]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100754]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-scheduler.log Oct 13 20:57:44 np0005486557.novalocal sudo[100754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100754]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100757]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-api.log Oct 13 20:57:44 np0005486557.novalocal sudo[100757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100757]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100760]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-manage.log Oct 13 20:57:44 np0005486557.novalocal sudo[100760]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100760]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100763]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Oct 13 20:57:44 np0005486557.novalocal sudo[100763]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100763]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100766]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-novncproxy.log Oct 13 20:57:44 np0005486557.novalocal sudo[100766]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100766]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100769]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-metadata-api.log Oct 13 20:57:44 np0005486557.novalocal sudo[100769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100769]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100772]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./health-manager.log Oct 13 20:57:44 np0005486557.novalocal sudo[100772]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100772]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100775]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./housekeeping.log Oct 13 20:57:44 np0005486557.novalocal sudo[100775]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100775]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100778]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./driver-agent.log Oct 13 20:57:44 np0005486557.novalocal sudo[100778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100778]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:44 np0005486557.novalocal sudo[100781]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./worker.log Oct 13 20:57:44 np0005486557.novalocal sudo[100781]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:44 np0005486557.novalocal sudo[100781]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100784]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./app.log Oct 13 20:57:45 np0005486557.novalocal sudo[100784]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100784]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100787]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd.log Oct 13 20:57:45 np0005486557.novalocal sudo[100787]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100787]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100790]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-nb.log Oct 13 20:57:45 np0005486557.novalocal sudo[100790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100790]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100793]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-sb.log Oct 13 20:57:45 np0005486557.novalocal sudo[100793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100793]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100796]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller.log Oct 13 20:57:45 np0005486557.novalocal sudo[100796]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100796]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100799]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Oct 13 20:57:45 np0005486557.novalocal sudo[100799]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100799]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100802]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-connection.txt Oct 13 20:57:45 np0005486557.novalocal sudo[100802]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100802]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100805]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-ssl.txt Oct 13 20:57:45 np0005486557.novalocal sudo[100805]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100805]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100808]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Oct 13 20:57:45 np0005486557.novalocal sudo[100808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100808]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100811]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-connection.txt Oct 13 20:57:45 np0005486557.novalocal sudo[100811]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100811]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100814]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-ssl.txt Oct 13 20:57:45 np0005486557.novalocal sudo[100814]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100814]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100817]: root : PWD=/var/log/weirdo-project/logs/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.log Oct 13 20:57:45 np0005486557.novalocal sudo[100817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100817]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100820]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.conf Oct 13 20:57:45 np0005486557.novalocal sudo[100820]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100820]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100823]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./syslog.txt Oct 13 20:57:45 np0005486557.novalocal sudo[100823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100823]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100826]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6.log Oct 13 20:57:45 np0005486557.novalocal sudo[100826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100826]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100829]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6_upgrade.log Oct 13 20:57:45 np0005486557.novalocal sudo[100829]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100829]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100832]: root : PWD=/var/log/weirdo-project/logs/mariadb ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb.log Oct 13 20:57:45 np0005486557.novalocal sudo[100832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100832]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100835]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.log Oct 13 20:57:45 np0005486557.novalocal sudo[100835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100835]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100838]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testrepository.subunit Oct 13 20:57:45 np0005486557.novalocal sudo[100838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100838]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100841]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testr_results.html Oct 13 20:57:45 np0005486557.novalocal sudo[100841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100841]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100844]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./dstat.log Oct 13 20:57:45 np0005486557.novalocal sudo[100844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100844]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100847]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iostat.log Oct 13 20:57:45 np0005486557.novalocal sudo[100847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100847]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100852]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iotop.log Oct 13 20:57:45 np0005486557.novalocal sudo[100852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100852]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100855]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000008.log Oct 13 20:57:45 np0005486557.novalocal sudo[100855]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100855]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100858]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000005.log Oct 13 20:57:45 np0005486557.novalocal sudo[100858]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100858]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:45 np0005486557.novalocal sudo[100861]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000003.log Oct 13 20:57:45 np0005486557.novalocal sudo[100861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:45 np0005486557.novalocal sudo[100861]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100864]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000004.log Oct 13 20:57:46 np0005486557.novalocal sudo[100864]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100864]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100867]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000006.log Oct 13 20:57:46 np0005486557.novalocal sudo[100867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100867]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100870]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000007.log Oct 13 20:57:46 np0005486557.novalocal sudo[100870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100870]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100873]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000009.log Oct 13 20:57:46 np0005486557.novalocal sudo[100873]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100873]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100876]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000001.log Oct 13 20:57:46 np0005486557.novalocal sudo[100876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100876]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100879]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000002.log Oct 13 20:57:46 np0005486557.novalocal sudo[100879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100879]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100882]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-0000000a.log Oct 13 20:57:46 np0005486557.novalocal sudo[100882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100882]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100885]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-0000000b.log Oct 13 20:57:46 np0005486557.novalocal sudo[100885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100885]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100888]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./virsh-net-list.txt Oct 13 20:57:46 np0005486557.novalocal sudo[100888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100888]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100891]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server.log Oct 13 20:57:46 np0005486557.novalocal sudo[100891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100891]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100894]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vswitchd.log Oct 13 20:57:46 np0005486557.novalocal sudo[100894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100894]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100897]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-pki.log Oct 13 20:57:46 np0005486557.novalocal sudo[100897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100897]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100900]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./zuul Oct 13 20:57:46 np0005486557.novalocal sudo[100900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100900]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100903]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./90-cloud-init-users Oct 13 20:57:46 np0005486557.novalocal sudo[100903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100903]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100906]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Oct 13 20:57:46 np0005486557.novalocal sudo[100906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100906]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100909]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./neutron Oct 13 20:57:46 np0005486557.novalocal sudo[100909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100909]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100912]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./nova Oct 13 20:57:46 np0005486557.novalocal sudo[100912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100912]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100915]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./glance Oct 13 20:57:46 np0005486557.novalocal sudo[100915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100915]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100918]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./manila Oct 13 20:57:46 np0005486557.novalocal sudo[100918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100918]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100921]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./sudoers.txt Oct 13 20:57:46 np0005486557.novalocal sudo[100921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100921]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100924]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_error.log Oct 13 20:57:46 np0005486557.novalocal sudo[100924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100924]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100927]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_error.log Oct 13 20:57:46 np0005486557.novalocal sudo[100927]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100927]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100930]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_error_ssl.log Oct 13 20:57:46 np0005486557.novalocal sudo[100930]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100930]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100933]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_error_ssl.log Oct 13 20:57:46 np0005486557.novalocal sudo[100933]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100933]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:46 np0005486557.novalocal sudo[100936]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_error_ssl.log Oct 13 20:57:46 np0005486557.novalocal sudo[100936]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:46 np0005486557.novalocal sudo[100936]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100939]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_error_ssl.log Oct 13 20:57:47 np0005486557.novalocal sudo[100939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100939]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100942]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_wsgi_error_ssl.log Oct 13 20:57:47 np0005486557.novalocal sudo[100942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100942]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100945]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_error_ssl.log Oct 13 20:57:47 np0005486557.novalocal sudo[100945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100945]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100948]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_error_ssl.log Oct 13 20:57:47 np0005486557.novalocal sudo[100948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100948]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100951]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_error_ssl.log Oct 13 20:57:47 np0005486557.novalocal sudo[100951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100951]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100954]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_error_ssl.log Oct 13 20:57:47 np0005486557.novalocal sudo[100954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100954]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100957]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_access.log Oct 13 20:57:47 np0005486557.novalocal sudo[100957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100957]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100960]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_access.log Oct 13 20:57:47 np0005486557.novalocal sudo[100960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100960]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100963]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_access_ssl.log Oct 13 20:57:47 np0005486557.novalocal sudo[100963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100963]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100966]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_access_ssl.log Oct 13 20:57:47 np0005486557.novalocal sudo[100966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100966]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100969]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_access_ssl.log Oct 13 20:57:47 np0005486557.novalocal sudo[100969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100969]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100972]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_access_ssl.log Oct 13 20:57:47 np0005486557.novalocal sudo[100972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100972]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100975]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_wsgi_access_ssl.log Oct 13 20:57:47 np0005486557.novalocal sudo[100975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100975]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100978]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_access_ssl.log Oct 13 20:57:47 np0005486557.novalocal sudo[100978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100978]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100981]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_access_ssl.log Oct 13 20:57:47 np0005486557.novalocal sudo[100981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100981]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100984]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_access_ssl.log Oct 13 20:57:47 np0005486557.novalocal sudo[100984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100984]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100987]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_access_ssl.log Oct 13 20:57:47 np0005486557.novalocal sudo[100987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100987]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100990]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./error_log Oct 13 20:57:47 np0005486557.novalocal sudo[100990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100990]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100993]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.log Oct 13 20:57:47 np0005486557.novalocal sudo[100993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100993]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100996]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.log Oct 13 20:57:47 np0005486557.novalocal sudo[100996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100996]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[100999]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./audit.log.txt Oct 13 20:57:47 np0005486557.novalocal sudo[100999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[100999]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[101002]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./manila Oct 13 20:57:47 np0005486557.novalocal sudo[101002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[101002]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[101005]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./glance Oct 13 20:57:47 np0005486557.novalocal sudo[101005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[101005]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[101008]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Oct 13 20:57:47 np0005486557.novalocal sudo[101008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[101008]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[101011]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./keystone Oct 13 20:57:47 np0005486557.novalocal sudo[101011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[101011]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[101014]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./nova Oct 13 20:57:47 np0005486557.novalocal sudo[101014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[101014]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[101017]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf.txt Oct 13 20:57:47 np0005486557.novalocal sudo[101017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[101017]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[101020]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./rpm-qa.txt Oct 13 20:57:47 np0005486557.novalocal sudo[101020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[101020]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[101023]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./repolist.txt Oct 13 20:57:47 np0005486557.novalocal sudo[101023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[101023]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:47 np0005486557.novalocal sudo[101026]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./installed-packages.txt Oct 13 20:57:47 np0005486557.novalocal sudo[101026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:47 np0005486557.novalocal sudo[101026]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101029]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./modulelist.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101029]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101032]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.log Oct 13 20:57:48 np0005486557.novalocal sudo[101032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101032]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101035]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.rpm.log Oct 13 20:57:48 np0005486557.novalocal sudo[101035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101035]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101038]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./gem-list.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101038]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101041]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./df.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101041]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101044]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./free.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101044]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101047]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lsmod.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101047]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101050]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./cpuinfo.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101050]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101050]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101053]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ps.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101053]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101053]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101056]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ip_-d_address.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101056]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101056]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101059]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./brctl_show.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101059]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101059]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101062]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101062]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101062]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101065]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101065]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101065]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101068]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101068]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101068]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101071]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./netstat.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101071]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101071]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101074]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./systemctl.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101074]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101074]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101077]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iptables.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101077]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101077]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101080]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./mount.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101080]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101080]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101084]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./losetup_-al.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101084]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101087]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lvm.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101087]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101087]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101090]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./semanage-boolean-list.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101090]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101093]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101093]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101096]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./nova.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101096]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:48 np0005486557.novalocal sudo[101099]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./placement.txt Oct 13 20:57:48 np0005486557.novalocal sudo[101099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:48 np0005486557.novalocal sudo[101099]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101102]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.txt Oct 13 20:57:49 np0005486557.novalocal sudo[101102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101102]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101105]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./glance.txt Oct 13 20:57:49 np0005486557.novalocal sudo[101105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101105]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101108]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.txt Oct 13 20:57:49 np0005486557.novalocal sudo[101108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101108]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101111]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./manila.txt Oct 13 20:57:49 np0005486557.novalocal sudo[101111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101111]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101114]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.txt Oct 13 20:57:49 np0005486557.novalocal sudo[101114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101114]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101117]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./nova-cell_v2.txt Oct 13 20:57:49 np0005486557.novalocal sudo[101117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101117]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[99891]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101122]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chown -R 0:0 /var/log/weirdo-project/logs Oct 13 20:57:49 np0005486557.novalocal sudo[101122]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101122]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101125]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type l -execdir sudo rm -f {} ; Oct 13 20:57:49 np0005486557.novalocal sudo[101125]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101128]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Oct 13 20:57:49 np0005486557.novalocal sudo[101128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101128]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101131]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./glance_cinder_store.filters Oct 13 20:57:49 np0005486557.novalocal sudo[101131]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101131]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101134]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Oct 13 20:57:49 np0005486557.novalocal sudo[101134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101134]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101137]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./ovn.ini Oct 13 20:57:49 np0005486557.novalocal sudo[101137]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101137]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101140]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./plugin.ini Oct 13 20:57:49 np0005486557.novalocal sudo[101140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101140]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101143]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn.ini Oct 13 20:57:49 np0005486557.novalocal sudo[101143]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101143]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101146]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks/autostart ; USER=root ; COMMAND=/bin/rm -f ./default.xml Oct 13 20:57:49 np0005486557.novalocal sudo[101146]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101146]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101149]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_admin_add_share_panel_group.py Oct 13 20:57:49 np0005486557.novalocal sudo[101149]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101149]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101152]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_project_add_share_panel_group.py Oct 13 20:57:49 np0005486557.novalocal sudo[101152]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101152]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101155]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_admin_add_shares_panel_to_share_panel_group.py Oct 13 20:57:49 np0005486557.novalocal sudo[101155]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101155]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101158]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_project_add_shares_panel_to_share_panel_group.py Oct 13 20:57:49 np0005486557.novalocal sudo[101158]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101158]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101161]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_admin_add_share_snapshots_panel_to_share_panel_group.py Oct 13 20:57:49 np0005486557.novalocal sudo[101161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101161]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101164]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_project_add_share_snapshots_panel_to_share_panel_group.py Oct 13 20:57:49 np0005486557.novalocal sudo[101164]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101164]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101167]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9030_manila_admin_add_share_types_panel_to_share_panel_group.py Oct 13 20:57:49 np0005486557.novalocal sudo[101167]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101167]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:49 np0005486557.novalocal sudo[101170]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_admin_add_share_networks_panel_to_share_panel_group.py Oct 13 20:57:49 np0005486557.novalocal sudo[101170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:49 np0005486557.novalocal sudo[101170]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101173]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_project_add_share_networks_panel_to_share_panel_group.py Oct 13 20:57:50 np0005486557.novalocal sudo[101173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101173]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101176]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_admin_add_security_services_panel_to_share_panel_group.py Oct 13 20:57:50 np0005486557.novalocal sudo[101176]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101176]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101179]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_project_add_security_services_panel_to_share_panel_group.py Oct 13 20:57:50 np0005486557.novalocal sudo[101179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101179]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101182]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9060_manila_admin_add_share_servers_panel_to_share_panel_group.py Oct 13 20:57:50 np0005486557.novalocal sudo[101182]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101182]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101185]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9070_manila_admin_add_share_instances_panel_to_share_panel_group.py Oct 13 20:57:50 np0005486557.novalocal sudo[101185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101185]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101188]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_admin_add_share_groups_panel_to_share_panel_group.py Oct 13 20:57:50 np0005486557.novalocal sudo[101188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101188]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101191]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_project_add_share_groups_panel_to_share_panel_group.py Oct 13 20:57:50 np0005486557.novalocal sudo[101191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101191]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101194]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_admin_add_share_group_snapshots_panel_to_share_panel_group.py Oct 13 20:57:50 np0005486557.novalocal sudo[101194]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101194]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101197]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_project_add_share_group_snapshots_panel_to_share_panel_group.py Oct 13 20:57:50 np0005486557.novalocal sudo[101197]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101197]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101200]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9090_manila_admin_add_share_group_types_panel_to_share_panel_group.py Oct 13 20:57:50 np0005486557.novalocal sudo[101200]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101200]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101203]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_admin_add_user_messages_panel_to_share_panel_group.py Oct 13 20:57:50 np0005486557.novalocal sudo[101203]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101203]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101206]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_project_add_user_messages_panel_to_share_panel_group.py Oct 13 20:57:50 np0005486557.novalocal sudo[101206]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101206]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101125]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101210]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20251013_204037.log /var/log/weirdo-project/logs/puppet-20251013_204037.txt Oct 13 20:57:50 np0005486557.novalocal sudo[101210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101210]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101213]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20251013_204339.log /var/log/weirdo-project/logs/puppet-20251013_204339.txt Oct 13 20:57:50 np0005486557.novalocal sudo[101213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101213]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101216]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-manage.log /var/log/weirdo-project/logs/cinder/cinder-manage.txt Oct 13 20:57:50 np0005486557.novalocal sudo[101216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101216]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101219]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-api.log /var/log/weirdo-project/logs/cinder/cinder-api.txt Oct 13 20:57:50 np0005486557.novalocal sudo[101219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101219]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101222]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/scheduler.log /var/log/weirdo-project/logs/cinder/scheduler.txt Oct 13 20:57:50 np0005486557.novalocal sudo[101222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101222]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101225]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/volume.log /var/log/weirdo-project/logs/cinder/volume.txt Oct 13 20:57:50 np0005486557.novalocal sudo[101225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101225]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101228]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/backup.log /var/log/weirdo-project/logs/cinder/backup.txt Oct 13 20:57:50 np0005486557.novalocal sudo[101228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101228]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101231]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/api.log /var/log/weirdo-project/logs/glance/api.txt Oct 13 20:57:50 np0005486557.novalocal sudo[101231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101231]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101234]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/horizon/horizon.log /var/log/weirdo-project/logs/horizon/horizon.txt Oct 13 20:57:50 np0005486557.novalocal sudo[101234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101234]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101237]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone.log /var/log/weirdo-project/logs/keystone/keystone.txt Oct 13 20:57:50 np0005486557.novalocal sudo[101237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101237]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:50 np0005486557.novalocal sudo[101240]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone-manage.log /var/log/weirdo-project/logs/keystone/keystone-manage.txt Oct 13 20:57:50 np0005486557.novalocal sudo[101240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:50 np0005486557.novalocal sudo[101240]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101243]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-manage.log /var/log/weirdo-project/logs/manila/manila-manage.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101243]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101246]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/scheduler.log /var/log/weirdo-project/logs/manila/scheduler.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101246]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101251]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/share.log /var/log/weirdo-project/logs/manila/share.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101251]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101251]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101254]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/privsep-helper.log /var/log/weirdo-project/logs/manila/privsep-helper.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101254]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101254]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101257]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/data.log /var/log/weirdo-project/logs/manila/data.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101257]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101257]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101260]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-api.log /var/log/weirdo-project/logs/manila/manila-api.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101260]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101260]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101263]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/app.log /var/log/weirdo-project/logs/neutron/app.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101263]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101263]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101266]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/rpc-server.log /var/log/weirdo-project/logs/neutron/rpc-server.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101266]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101269]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/periodic-workers.log /var/log/weirdo-project/logs/neutron/periodic-workers.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101269]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101269]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101272]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.log /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101272]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101275]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.log /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101275]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101275]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101278]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-maintenance-worker.log /var/log/weirdo-project/logs/neutron/ovn-maintenance-worker.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101278]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101278]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101281]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/privsep-helper.log /var/log/weirdo-project/logs/neutron/privsep-helper.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101281]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101281]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101284]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-conductor.log /var/log/weirdo-project/logs/nova/nova-conductor.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101284]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101284]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101287]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-compute.log /var/log/weirdo-project/logs/nova/nova-compute.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101287]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101287]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101290]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-scheduler.log /var/log/weirdo-project/logs/nova/nova-scheduler.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101290]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101293]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-api.log /var/log/weirdo-project/logs/nova/nova-api.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101293]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101296]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-manage.log /var/log/weirdo-project/logs/nova/nova-manage.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101296]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101299]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/privsep-helper.log /var/log/weirdo-project/logs/nova/privsep-helper.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101299]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101302]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-novncproxy.log /var/log/weirdo-project/logs/nova/nova-novncproxy.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101302]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101305]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-metadata-api.log /var/log/weirdo-project/logs/nova/nova-metadata-api.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101305]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101308]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/health-manager.log /var/log/weirdo-project/logs/octavia/health-manager.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101308]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101308]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:51 np0005486557.novalocal sudo[101311]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/housekeeping.log /var/log/weirdo-project/logs/octavia/housekeeping.txt Oct 13 20:57:51 np0005486557.novalocal sudo[101311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:51 np0005486557.novalocal sudo[101311]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101314]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/driver-agent.log /var/log/weirdo-project/logs/octavia/driver-agent.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101314]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101317]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/worker.log /var/log/weirdo-project/logs/octavia/worker.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101317]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101320]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/app.log /var/log/weirdo-project/logs/octavia/app.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101320]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101323]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-northd.log /var/log/weirdo-project/logs/ovn/ovn-northd.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101323]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101326]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101326]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101329]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101329]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101332]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-controller.log /var/log/weirdo-project/logs/ovn/ovn-controller.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101332]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101335]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/placement/placement.log /var/log/weirdo-project/logs/placement/placement.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101335]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101338]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101338]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101341]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101341]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101344]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/mariadb/mariadb.log /var/log/weirdo-project/logs/mariadb/mariadb.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101344]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101347]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/tempest.log /var/log/weirdo-project/logs/tempest.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101347]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101350]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dstat.log /var/log/weirdo-project/logs/dstat.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101350]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101353]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iostat.log /var/log/weirdo-project/logs/iostat.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101353]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101356]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iotop.log /var/log/weirdo-project/logs/iotop.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101356]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101359]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101359]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101362]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101362]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101365]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101365]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101368]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101368]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101371]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101371]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101374]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101374]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101377]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101377]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101380]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101380]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101383]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.txt Oct 13 20:57:52 np0005486557.novalocal sudo[101383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:52 np0005486557.novalocal sudo[101383]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:52 np0005486557.novalocal sudo[101386]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.log /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101386]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101389]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000b.log /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000b.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101389]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101392]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovsdb-server.log /var/log/weirdo-project/logs/openvswitch/ovsdb-server.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101392]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101395]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.log /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101395]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101398]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-pki.log /var/log/weirdo-project/logs/openvswitch/ovs-pki.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101398]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101401]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_error.log /var/log/weirdo-project/logs/apache/horizon_error.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101401]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101404]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_error.log /var/log/weirdo-project/logs/apache/horizon_ssl_error.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101404]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101407]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101407]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101410]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101410]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101413]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101413]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101416]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101416]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101419]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/neutron_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/neutron_wsgi_error_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101419]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101422]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101422]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101425]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101425]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101428]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101428]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101431]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101431]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101434]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_access.log /var/log/weirdo-project/logs/apache/horizon_access.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101434]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101437]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_access.log /var/log/weirdo-project/logs/apache/horizon_ssl_access.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101437]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101440]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101440]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101443]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101443]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101446]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101446]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101449]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101449]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101452]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/neutron_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/neutron_wsgi_access_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101452]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101455]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101455]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101458]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101458]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101458]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:53 np0005486557.novalocal sudo[101461]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.txt Oct 13 20:57:53 np0005486557.novalocal sudo[101461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:53 np0005486557.novalocal sudo[101461]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101464]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101464]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101464]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101467]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/redis.log /var/log/weirdo-project/logs/redis/redis.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101467]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101470]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/sentinel.log /var/log/weirdo-project/logs/redis/sentinel.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101470]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101473]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.log /var/log/weirdo-project/logs/dnf/dnf.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101473]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101476]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.rpm.log /var/log/weirdo-project/logs/dnf/dnf.rpm.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101476]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101480]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/zuul /var/log/weirdo-project/logs/sudoers.d/zuul.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101480]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101483]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101483]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101486]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/cinder /var/log/weirdo-project/logs/sudoers.d/cinder.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101486]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101489]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/neutron /var/log/weirdo-project/logs/sudoers.d/neutron.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101489]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101492]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/nova /var/log/weirdo-project/logs/sudoers.d/nova.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101492]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101495]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/glance /var/log/weirdo-project/logs/sudoers.d/glance.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101495]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101498]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/manila /var/log/weirdo-project/logs/sudoers.d/manila.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101498]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101501]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101501]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101504]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101504]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101507]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101507]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101510]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101510]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101510]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101513]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101513]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101513]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101516]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101516]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101516]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101519]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101519]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101522]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101522]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101525]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101525]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101528]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101528]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101531]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101531]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101534]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101534]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101537]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101537]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:54 np0005486557.novalocal sudo[101540]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6.txt Oct 13 20:57:54 np0005486557.novalocal sudo[101540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:54 np0005486557.novalocal sudo[101540]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101543]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101543]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101546]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101546]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101549]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101549]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101552]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101552]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101555]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101555]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101555]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101558]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101558]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101558]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101561]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101561]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101564]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101564]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101564]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101567]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101567]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101567]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101570]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101570]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101570]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101573]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101573]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101573]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101576]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101576]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101576]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101579]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/api-paste.ini /var/log/weirdo-project/logs/etc/cinder/api-paste.ini.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101579]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101579]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101582]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/cinder.conf /var/log/weirdo-project/logs/etc/cinder/cinder.conf.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101582]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101582]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101585]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/resource_filters.json /var/log/weirdo-project/logs/etc/cinder/resource_filters.json.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101585]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101585]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101588]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101588]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101588]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101591]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/policy.yaml /var/log/weirdo-project/logs/etc/cinder/policy.yaml.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101591]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101591]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101594]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005486557.novalocal.pem /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005486557.novalocal.pem.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101594]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101594]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101597]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005486557.novalocal.pem /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005486557.novalocal.pem.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101597]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101597]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101600]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101600]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101600]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101603]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api.conf /var/log/weirdo-project/logs/etc/glance/glance-api.conf.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101603]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101603]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101606]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-cache.conf /var/log/weirdo-project/logs/etc/glance/glance-cache.conf.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101606]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101609]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101609]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101612]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101612]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101612]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101617]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-swift.conf /var/log/weirdo-project/logs/etc/glance/glance-swift.conf.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101617]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101620]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/rootwrap.conf /var/log/weirdo-project/logs/etc/glance/rootwrap.conf.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101620]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101623]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/schema-image.json /var/log/weirdo-project/logs/etc/glance/schema-image.json.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101623]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101626]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/policy.yaml /var/log/weirdo-project/logs/etc/glance/policy.yaml.txt Oct 13 20:57:55 np0005486557.novalocal sudo[101626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:55 np0005486557.novalocal sudo[101626]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:55 np0005486557.novalocal sudo[101629]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101629]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101632]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101632]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101635]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101635]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101638]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101638]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101641]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101641]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101644]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101644]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101647]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101647]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101650]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101650]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101653]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101653]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101656]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101656]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101659]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101659]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101662]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101662]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101665]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101665]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101668]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101668]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101671]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101671]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101674]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101674]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101678]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101678]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101678]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101681]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101681]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101681]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101684]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101684]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101684]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101687]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101687]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101687]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101690]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101690]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101693]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101693]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101696]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:56 np0005486557.novalocal sudo[101696]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:56 np0005486557.novalocal sudo[101699]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json.txt Oct 13 20:57:56 np0005486557.novalocal sudo[101699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101699]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101702]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101702]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101705]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101705]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101708]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101708]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101711]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101711]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101714]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101714]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101717]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101717]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101720]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101720]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101723]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101723]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101726]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101726]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101729]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101729]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101732]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101732]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101735]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/keystone.conf /var/log/weirdo-project/logs/etc/keystone/keystone.conf.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101735]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101738]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/logging.conf /var/log/weirdo-project/logs/etc/keystone/logging.conf.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101738]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101741]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101741]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101744]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/1 /var/log/weirdo-project/logs/etc/keystone/credential-keys/1.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101744]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101744]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101747]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/0 /var/log/weirdo-project/logs/etc/keystone/credential-keys/0.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101747]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101747]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101750]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.yaml /var/log/weirdo-project/logs/etc/keystone/policy.yaml.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101750]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101750]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101753]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005486557.novalocal.pem /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005486557.novalocal.pem.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101753]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101756]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005486557.novalocal.pem /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005486557.novalocal.pem.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101756]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101759]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/api-paste.ini /var/log/weirdo-project/logs/etc/manila/api-paste.ini.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101759]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101762]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/manila.conf /var/log/weirdo-project/logs/etc/manila/manila.conf.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101762]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101765]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/rootwrap.conf /var/log/weirdo-project/logs/etc/manila/rootwrap.conf.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101765]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101768]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/policy.yaml /var/log/weirdo-project/logs/etc/manila/policy.yaml.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101768]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:57 np0005486557.novalocal sudo[101771]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron.conf /var/log/weirdo-project/logs/etc/neutron/neutron.conf.txt Oct 13 20:57:57 np0005486557.novalocal sudo[101771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:57 np0005486557.novalocal sudo[101771]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101774]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101774]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101777]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/api-paste.ini /var/log/weirdo-project/logs/etc/neutron/api-paste.ini.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101777]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101780]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101780]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101783]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101783]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101786]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101786]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101789]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101789]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101792]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101792]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101795]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101795]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101798]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101798]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101801]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101801]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101804]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101804]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101807]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101807]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101810]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101810]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101813]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/policy.yaml /var/log/weirdo-project/logs/etc/neutron/policy.yaml.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101813]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101816]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/conf.d/README /var/log/weirdo-project/logs/etc/neutron/conf.d/README.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101816]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101819]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005486557.novalocal.pem /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005486557.novalocal.pem.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101819]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101822]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101822]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101825]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101825]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101825]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101828]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101828]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101831]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005486557.novalocal.pem /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005486557.novalocal.pem.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101831]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101834]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/api-paste.ini /var/log/weirdo-project/logs/etc/nova/api-paste.ini.txt Oct 13 20:57:58 np0005486557.novalocal sudo[101834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:58 np0005486557.novalocal sudo[101834]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:58 np0005486557.novalocal sudo[101837]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova.conf /var/log/weirdo-project/logs/etc/nova/nova.conf.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101837]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101840]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/release /var/log/weirdo-project/logs/etc/nova/release.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101840]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101843]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/rootwrap.conf /var/log/weirdo-project/logs/etc/nova/rootwrap.conf.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101843]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101846]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova-compute.conf /var/log/weirdo-project/logs/etc/nova/nova-compute.conf.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101846]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101849]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.yaml /var/log/weirdo-project/logs/etc/nova/policy.yaml.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101849]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101849]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101852]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101852]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101855]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101855]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101855]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101858]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101858]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101858]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101861]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101861]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101864]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101864]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101864]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101867]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/octavia.conf /var/log/weirdo-project/logs/etc/octavia/octavia.conf.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101867]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101870]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/policy.yaml /var/log/weirdo-project/logs/etc/octavia/policy.yaml.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101870]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101873]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101873]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101873]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101876]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101876]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101879]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101879]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101882]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101882]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101885]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005486557.novalocal.pem /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005486557.novalocal.pem.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101885]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101888]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005486557.novalocal.pem /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005486557.novalocal.pem.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101888]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101891]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/placement.conf /var/log/weirdo-project/logs/etc/placement/placement.conf.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101891]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101894]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.yaml /var/log/weirdo-project/logs/etc/placement/policy.yaml.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101894]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101897]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101897]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101900]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101900]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101903]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101903]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101906]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:57:59 np0005486557.novalocal sudo[101906]: pam_unix(sudo:session): session closed for user root Oct 13 20:57:59 np0005486557.novalocal sudo[101909]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/tempest.conf /var/log/weirdo-project/logs/etc/tempest/tempest.conf.txt Oct 13 20:57:59 np0005486557.novalocal sudo[101909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101909]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal systemd[1]: Starting system activity accounting tool... Oct 13 20:58:00 np0005486557.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 13 20:58:00 np0005486557.novalocal systemd[1]: Finished system activity accounting tool. Oct 13 20:58:00 np0005486557.novalocal sudo[101912]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101912]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101916]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.conf /var/log/weirdo-project/logs/etc/rsyslog.conf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101916]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101916]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101920]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101920]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101923]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101923]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101926]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101926]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101929]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/inetrc /var/log/weirdo-project/logs/etc/rabbitmq/inetrc.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101929]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101932]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101932]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101935]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101935]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101938]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005486557.novalocal.pem /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005486557.novalocal.pem.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101938]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101941]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf /var/log/weirdo-project/logs/etc/my.cnf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101941]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101944]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101944]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101947]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101947]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101950]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101950]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101953]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101953]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101956]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101956]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101959]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101959]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101962]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101962]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101965]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/np0005486557.novalocal.pem /var/log/weirdo-project/logs/etc/my.cnf.d/np0005486557.novalocal.pem.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101965]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101968]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101968]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101971]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101971]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101974]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101974]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101977]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101977]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101980]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101980]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:00 np0005486557.novalocal sudo[101983]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf.txt Oct 13 20:58:00 np0005486557.novalocal sudo[101983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:00 np0005486557.novalocal sudo[101983]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[101986]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[101986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[101986]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[101989]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[101989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[101989]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[101992]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[101992]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[101992]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[101995]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[101995]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[101995]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[101998]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[101998]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[101998]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102001]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/network.conf /var/log/weirdo-project/logs/etc/libvirt/network.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102001]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102004]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102004]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102004]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102007]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102007]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102010]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102010]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102013]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102013]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102013]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102016]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu.conf /var/log/weirdo-project/logs/etc/libvirt/qemu.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102016]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102019]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102019]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102022]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102022]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102025]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/default.conf /var/log/weirdo-project/logs/etc/openvswitch/default.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102025]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102028]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~ /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102028]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102028]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102031]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/conf.db /var/log/weirdo-project/logs/etc/openvswitch/conf.db.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102031]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102031]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102034]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102034]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102034]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102037]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102037]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102037]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102040]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102040]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102043]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102043]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102043]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102046]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102046]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102046]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102049]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102049]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102049]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102052]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102052]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102055]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102055]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102055]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102058]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102058]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102058]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102061]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102061]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102061]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102064]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102064]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102064]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102067]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/magic /var/log/weirdo-project/logs/etc/httpd/conf/magic.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102067]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102067]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102070]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102070]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:01 np0005486557.novalocal sudo[102073]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf.txt Oct 13 20:58:01 np0005486557.novalocal sudo[102073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:01 np0005486557.novalocal sudo[102073]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102076]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102076]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102079]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102079]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102082]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102082]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102085]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-neutron_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-neutron_wsgi.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102085]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102088]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102088]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102091]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102091]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102094]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102094]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102097]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102097]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102100]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102100]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102103]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102103]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102106]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102106]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102109]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102109]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102112]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102112]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102115]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102115]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102118]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102118]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102121]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102121]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102124]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102124]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102127]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102127]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102130]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102130]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102133]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102133]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102136]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102136]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102139]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102139]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102142]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102142]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102145]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102145]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:02 np0005486557.novalocal sudo[102148]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf.txt Oct 13 20:58:02 np0005486557.novalocal sudo[102148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:02 np0005486557.novalocal sudo[102148]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102151]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102151]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102154]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102154]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102157]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102157]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102160]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102160]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102163]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102163]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102166]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf /var/log/weirdo-project/logs/etc/redis/redis.conf.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102166]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102169]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102169]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102172]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102172]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102175]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf /var/log/weirdo-project/logs/etc/redis/sentinel.conf.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102175]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102178]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005486557.novalocal.pem /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005486557.novalocal.pem.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102178]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102181]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102181]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102184]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102184]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102187]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102187]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102190]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102190]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102193]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102193]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102196]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102196]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102199]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102199]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102202]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102202]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102205]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102205]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102208]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102208]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102211]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102211]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102214]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102214]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102217]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102217]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102220]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102220]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102223]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102223]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102226]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:03 np0005486557.novalocal sudo[102226]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:03 np0005486557.novalocal sudo[102229]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example.txt Oct 13 20:58:03 np0005486557.novalocal sudo[102229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102229]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102232]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102232]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102235]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102235]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102238]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102238]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102241]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102241]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102244]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102244]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102247]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005486557.novalocal.pem /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005486557.novalocal.pem.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102247]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102250]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102250]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102253]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102253]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102256]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102256]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102259]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102259]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102262]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102262]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102265]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-zuul-repo.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-zuul-repo.repo.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102265]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102268]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102268]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102271]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102271]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102274]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/passwd /var/log/weirdo-project/logs/etc/passwd.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102274]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102277]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/group /var/log/weirdo-project/logs/etc/group.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102277]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102280]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102280]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102283]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/fstab /var/log/weirdo-project/logs/etc/fstab.txt Oct 13 20:58:04 np0005486557.novalocal sudo[102283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 13 20:58:04 np0005486557.novalocal sudo[102283]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[98959]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:04 np0005486557.novalocal sudo[102395]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-keotibqzdfouhsktmttdarazkkoiegur ; /usr/bin/python3' Oct 13 20:58:04 np0005486557.novalocal sudo[102395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:58:05 np0005486557.novalocal python3[102397]: ansible-command Invoked with creates=/var/log/weirdo/cpuinfo.txt _raw_params=cat /proc/cpuinfo >/var/log/weirdo/cpuinfo.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 13 20:58:05 np0005486557.novalocal sudo[102395]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:05 np0005486557.novalocal sudo[102403]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qeztdwogbzxdusfgwpxutqrsnuwpqoil ; /usr/bin/python3' Oct 13 20:58:05 np0005486557.novalocal sudo[102403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:58:05 np0005486557.novalocal python3[102405]: ansible-command Invoked with creates=/var/log/weirdo/df.txt _raw_params=df -h >/var/log/weirdo/df.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 13 20:58:05 np0005486557.novalocal sudo[102403]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:05 np0005486557.novalocal sudo[102410]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jqfisnuqbuawcnhvorgkjscospqnxsya ; /usr/bin/python3' Oct 13 20:58:05 np0005486557.novalocal sudo[102410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:58:05 np0005486557.novalocal python3[102412]: ansible-command Invoked with creates=/var/log/weirdo/dmesg.txt _raw_params=dmesg -T >/var/log/weirdo/dmesg.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 13 20:58:05 np0005486557.novalocal sudo[102410]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:05 np0005486557.novalocal sudo[102417]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-erklbnyvihkytiggbrdfmbigloiudhmp ; /usr/bin/python3' Oct 13 20:58:05 np0005486557.novalocal sudo[102417]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:58:05 np0005486557.novalocal python3[102419]: ansible-command Invoked with creates=/var/log/weirdo/fdisk.txt _raw_params=fdisk -l >/var/log/weirdo/fdisk.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 13 20:58:05 np0005486557.novalocal sudo[102417]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:05 np0005486557.novalocal sudo[102427]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lsnivcqsqzbnjgiybclxvrbepajndkhl ; /usr/bin/python3' Oct 13 20:58:05 np0005486557.novalocal sudo[102427]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:58:05 np0005486557.novalocal python3[102429]: ansible-command Invoked with creates=/var/log/weirdo/getenforce.txt _raw_params=getenforce >/var/log/weirdo/getenforce.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 13 20:58:06 np0005486557.novalocal sudo[102427]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:06 np0005486557.novalocal sudo[102434]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nnlnvmnmqvevepxyofetbldovpotkgnu ; /usr/bin/python3' Oct 13 20:58:06 np0005486557.novalocal sudo[102434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:58:06 np0005486557.novalocal python3[102436]: ansible-command Invoked with creates=/var/log/weirdo/hosts.txt _raw_params=cat /etc/hosts >/var/log/weirdo/hosts.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 13 20:58:06 np0005486557.novalocal sudo[102434]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:06 np0005486557.novalocal sudo[102441]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-liagsqhrtzbmgjqwtutnsmynafkhkduw ; /usr/bin/python3' Oct 13 20:58:06 np0005486557.novalocal sudo[102441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:58:06 np0005486557.novalocal python3[102443]: ansible-command Invoked with creates=/var/log/weirdo/ip.txt _raw_params=ip a >/var/log/weirdo/ip.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 13 20:58:06 np0005486557.novalocal sudo[102441]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:06 np0005486557.novalocal sudo[102448]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ncyaglkbnhjdyxmcbpcsayfuysozxdhn ; /usr/bin/python3' Oct 13 20:58:06 np0005486557.novalocal sudo[102448]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:58:06 np0005486557.novalocal python3[102450]: ansible-command Invoked with creates=/var/log/weirdo/iptables.txt _raw_params=iptables -vnL >/var/log/weirdo/iptables.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 13 20:58:06 np0005486557.novalocal sudo[102448]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:06 np0005486557.novalocal sudo[102455]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lkjxsobpdflcfrzhsmlvdevmpbytojzc ; /usr/bin/python3' Oct 13 20:58:06 np0005486557.novalocal sudo[102455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:58:06 np0005486557.novalocal python3[102457]: ansible-command Invoked with creates=/var/log/weirdo/iptables_nat.txt _raw_params=iptables -vnL -t nat >/var/log/weirdo/iptables_nat.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 13 20:58:07 np0005486557.novalocal sudo[102455]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:07 np0005486557.novalocal sudo[102462]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-iwizsqeqrxbvsmwxbelqkojtmwzeprok ; /usr/bin/python3' Oct 13 20:58:07 np0005486557.novalocal sudo[102462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:58:07 np0005486557.novalocal python3[102464]: ansible-command Invoked with creates=/var/log/weirdo/iptables_mangle.txt _raw_params=iptables -vnL -t mangle >/var/log/weirdo/iptables_mangle.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 13 20:58:07 np0005486557.novalocal sudo[102462]: pam_unix(sudo:session): session closed for user root Oct 13 20:58:07 np0005486557.novalocal sudo[102469]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pmwyjwrslxqjgywkcnxjluxxupmxtsxo ; /usr/bin/python3' Oct 13 20:58:07 np0005486557.novalocal sudo[102469]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 13 20:58:07 np0005486557.novalocal python3[102471]: ansible-command Invoked with creates=/var/log/weirdo/journalctl.txt _raw_params=journalctl --no-pager >/var/log/weirdo/journalctl.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None