Oct 09 23:04:03 localhost kernel: Linux version 5.14.0-621.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-11), GNU ld version 2.35.2-67.el9) #1 SMP PREEMPT_DYNAMIC Tue Sep 30 07:37:35 UTC 2025 Oct 09 23:04:03 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Oct 09 23:04:03 localhost kernel: Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-621.el9.x86_64 root=UUID=9839e2e1-98a2-4594-b609-79d514deb0a3 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Oct 09 23:04:03 localhost kernel: BIOS-provided physical RAM map: Oct 09 23:04:03 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 09 23:04:03 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 09 23:04:03 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 09 23:04:03 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Oct 09 23:04:03 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Oct 09 23:04:03 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 09 23:04:03 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 09 23:04:03 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable Oct 09 23:04:03 localhost kernel: NX (Execute Disable) protection: active Oct 09 23:04:03 localhost kernel: APIC: Static calls initialized Oct 09 23:04:03 localhost kernel: SMBIOS 2.8 present. Oct 09 23:04:03 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Oct 09 23:04:03 localhost kernel: Hypervisor detected: KVM Oct 09 23:04:03 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 09 23:04:03 localhost kernel: kvm-clock: using sched offset of 3993324005 cycles Oct 09 23:04:03 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 09 23:04:03 localhost kernel: tsc: Detected 2799.998 MHz processor Oct 09 23:04:03 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 09 23:04:03 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 09 23:04:03 localhost kernel: last_pfn = 0x240000 max_arch_pfn = 0x400000000 Oct 09 23:04:03 localhost kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Oct 09 23:04:03 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 09 23:04:03 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Oct 09 23:04:03 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Oct 09 23:04:03 localhost kernel: Using GB pages for direct mapping Oct 09 23:04:03 localhost kernel: RAMDISK: [mem 0x2d858000-0x32c23fff] Oct 09 23:04:03 localhost kernel: ACPI: Early table checksum verification disabled Oct 09 23:04:03 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Oct 09 23:04:03 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 09 23:04:03 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 09 23:04:03 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 09 23:04:03 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Oct 09 23:04:03 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 09 23:04:03 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 09 23:04:03 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Oct 09 23:04:03 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Oct 09 23:04:03 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Oct 09 23:04:03 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Oct 09 23:04:03 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Oct 09 23:04:03 localhost kernel: No NUMA configuration found Oct 09 23:04:03 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000023fffffff] Oct 09 23:04:03 localhost kernel: NODE_DATA(0) allocated [mem 0x23ffd5000-0x23fffffff] Oct 09 23:04:03 localhost kernel: crashkernel reserved: 0x00000000af000000 - 0x00000000bf000000 (256 MB) Oct 09 23:04:03 localhost kernel: Zone ranges: Oct 09 23:04:03 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 09 23:04:03 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 09 23:04:03 localhost kernel: Normal [mem 0x0000000100000000-0x000000023fffffff] Oct 09 23:04:03 localhost kernel: Device empty Oct 09 23:04:03 localhost kernel: Movable zone start for each node Oct 09 23:04:03 localhost kernel: Early memory node ranges Oct 09 23:04:03 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 09 23:04:03 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Oct 09 23:04:03 localhost kernel: node 0: [mem 0x0000000100000000-0x000000023fffffff] Oct 09 23:04:03 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000023fffffff] Oct 09 23:04:03 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 09 23:04:03 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 09 23:04:03 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Oct 09 23:04:03 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Oct 09 23:04:03 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 09 23:04:03 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 09 23:04:03 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 09 23:04:03 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 09 23:04:03 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 09 23:04:03 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 09 23:04:03 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 09 23:04:03 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 09 23:04:03 localhost kernel: TSC deadline timer available Oct 09 23:04:03 localhost kernel: CPU topo: Max. logical packages: 8 Oct 09 23:04:03 localhost kernel: CPU topo: Max. logical dies: 8 Oct 09 23:04:03 localhost kernel: CPU topo: Max. dies per package: 1 Oct 09 23:04:03 localhost kernel: CPU topo: Max. threads per core: 1 Oct 09 23:04:03 localhost kernel: CPU topo: Num. cores per package: 1 Oct 09 23:04:03 localhost kernel: CPU topo: Num. threads per package: 1 Oct 09 23:04:03 localhost kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Oct 09 23:04:03 localhost kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Oct 09 23:04:03 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Oct 09 23:04:03 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Oct 09 23:04:03 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Oct 09 23:04:03 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Oct 09 23:04:03 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Oct 09 23:04:03 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Oct 09 23:04:03 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Oct 09 23:04:03 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Oct 09 23:04:03 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Oct 09 23:04:03 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Oct 09 23:04:03 localhost kernel: Booting paravirtualized kernel on KVM Oct 09 23:04:03 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 09 23:04:03 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Oct 09 23:04:03 localhost kernel: percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 Oct 09 23:04:03 localhost kernel: pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 Oct 09 23:04:03 localhost kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Oct 09 23:04:03 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Oct 09 23:04:03 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-621.el9.x86_64 root=UUID=9839e2e1-98a2-4594-b609-79d514deb0a3 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Oct 09 23:04:03 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-621.el9.x86_64", will be passed to user space. Oct 09 23:04:03 localhost kernel: random: crng init done Oct 09 23:04:03 localhost kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Oct 09 23:04:03 localhost kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 09 23:04:03 localhost kernel: Fallback order for Node 0: 0 Oct 09 23:04:03 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 2064091 Oct 09 23:04:03 localhost kernel: Policy zone: Normal Oct 09 23:04:03 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 09 23:04:03 localhost kernel: software IO TLB: area num 8. Oct 09 23:04:03 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Oct 09 23:04:03 localhost kernel: ftrace: allocating 49162 entries in 193 pages Oct 09 23:04:03 localhost kernel: ftrace: allocated 193 pages with 3 groups Oct 09 23:04:03 localhost kernel: Dynamic Preempt: voluntary Oct 09 23:04:03 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Oct 09 23:04:03 localhost kernel: rcu: RCU event tracing is enabled. Oct 09 23:04:03 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Oct 09 23:04:03 localhost kernel: Trampoline variant of Tasks RCU enabled. Oct 09 23:04:03 localhost kernel: Rude variant of Tasks RCU enabled. Oct 09 23:04:03 localhost kernel: Tracing variant of Tasks RCU enabled. Oct 09 23:04:03 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 09 23:04:03 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Oct 09 23:04:03 localhost kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Oct 09 23:04:03 localhost kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Oct 09 23:04:03 localhost kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Oct 09 23:04:03 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Oct 09 23:04:03 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Oct 09 23:04:03 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Oct 09 23:04:03 localhost kernel: Console: colour VGA+ 80x25 Oct 09 23:04:03 localhost kernel: printk: console [ttyS0] enabled Oct 09 23:04:03 localhost kernel: ACPI: Core revision 20230331 Oct 09 23:04:03 localhost kernel: APIC: Switch to symmetric I/O mode setup Oct 09 23:04:03 localhost kernel: x2apic enabled Oct 09 23:04:03 localhost kernel: APIC: Switched APIC routing to: physical x2apic Oct 09 23:04:03 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Oct 09 23:04:03 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Oct 09 23:04:03 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 09 23:04:03 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Oct 09 23:04:03 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Oct 09 23:04:03 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 09 23:04:03 localhost kernel: Spectre V2 : Mitigation: Retpolines Oct 09 23:04:03 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Oct 09 23:04:03 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Oct 09 23:04:03 localhost kernel: RETBleed: Mitigation: untrained return thunk Oct 09 23:04:03 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 09 23:04:03 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Oct 09 23:04:03 localhost kernel: Speculative Return Stack Overflow: IBPB-extending microcode not applied! Oct 09 23:04:03 localhost kernel: Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options. Oct 09 23:04:03 localhost kernel: x86/bugs: return thunk changed Oct 09 23:04:03 localhost kernel: Speculative Return Stack Overflow: Vulnerable: Safe RET, no microcode Oct 09 23:04:03 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 09 23:04:03 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 09 23:04:03 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 09 23:04:03 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 09 23:04:03 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Oct 09 23:04:03 localhost kernel: Freeing SMP alternatives memory: 40K Oct 09 23:04:03 localhost kernel: pid_max: default: 32768 minimum: 301 Oct 09 23:04:03 localhost kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf Oct 09 23:04:03 localhost kernel: landlock: Up and running. Oct 09 23:04:03 localhost kernel: Yama: becoming mindful. Oct 09 23:04:03 localhost kernel: SELinux: Initializing. Oct 09 23:04:03 localhost kernel: LSM support for eBPF active Oct 09 23:04:03 localhost kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 09 23:04:03 localhost kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 09 23:04:03 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Oct 09 23:04:03 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Oct 09 23:04:03 localhost kernel: ... version: 0 Oct 09 23:04:03 localhost kernel: ... bit width: 48 Oct 09 23:04:03 localhost kernel: ... generic registers: 6 Oct 09 23:04:03 localhost kernel: ... value mask: 0000ffffffffffff Oct 09 23:04:03 localhost kernel: ... max period: 00007fffffffffff Oct 09 23:04:03 localhost kernel: ... fixed-purpose events: 0 Oct 09 23:04:03 localhost kernel: ... event mask: 000000000000003f Oct 09 23:04:03 localhost kernel: signal: max sigframe size: 1776 Oct 09 23:04:03 localhost kernel: rcu: Hierarchical SRCU implementation. Oct 09 23:04:03 localhost kernel: rcu: Max phase no-delay instances is 400. Oct 09 23:04:03 localhost kernel: smp: Bringing up secondary CPUs ... Oct 09 23:04:03 localhost kernel: smpboot: x86: Booting SMP configuration: Oct 09 23:04:03 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Oct 09 23:04:03 localhost kernel: smp: Brought up 1 node, 8 CPUs Oct 09 23:04:03 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Oct 09 23:04:03 localhost kernel: node 0 deferred pages initialised in 10ms Oct 09 23:04:03 localhost kernel: Memory: 7765956K/8388068K available (16384K kernel code, 5784K rwdata, 13864K rodata, 4188K init, 7196K bss, 616208K reserved, 0K cma-reserved) Oct 09 23:04:03 localhost kernel: devtmpfs: initialized Oct 09 23:04:03 localhost kernel: x86/mm: Memory block size: 128MB Oct 09 23:04:03 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 09 23:04:03 localhost kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Oct 09 23:04:03 localhost kernel: pinctrl core: initialized pinctrl subsystem Oct 09 23:04:03 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 09 23:04:03 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations Oct 09 23:04:03 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 09 23:04:03 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 09 23:04:03 localhost kernel: audit: initializing netlink subsys (disabled) Oct 09 23:04:03 localhost kernel: audit: type=2000 audit(1760065441.548:1): state=initialized audit_enabled=0 res=1 Oct 09 23:04:03 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Oct 09 23:04:03 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 09 23:04:03 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Oct 09 23:04:03 localhost kernel: cpuidle: using governor menu Oct 09 23:04:03 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 09 23:04:03 localhost kernel: PCI: Using configuration type 1 for base access Oct 09 23:04:03 localhost kernel: PCI: Using configuration type 1 for extended access Oct 09 23:04:03 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 09 23:04:03 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Oct 09 23:04:03 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Oct 09 23:04:03 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Oct 09 23:04:03 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Oct 09 23:04:03 localhost kernel: Demotion targets for Node 0: null Oct 09 23:04:03 localhost kernel: cryptd: max_cpu_qlen set to 1000 Oct 09 23:04:03 localhost kernel: ACPI: Added _OSI(Module Device) Oct 09 23:04:03 localhost kernel: ACPI: Added _OSI(Processor Device) Oct 09 23:04:03 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 09 23:04:03 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 09 23:04:03 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 09 23:04:03 localhost kernel: ACPI: _OSC evaluation for CPUs failed, trying _PDC Oct 09 23:04:03 localhost kernel: ACPI: Interpreter enabled Oct 09 23:04:03 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Oct 09 23:04:03 localhost kernel: ACPI: Using IOAPIC for interrupt routing Oct 09 23:04:03 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 09 23:04:03 localhost kernel: PCI: Using E820 reservations for host bridge windows Oct 09 23:04:03 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Oct 09 23:04:03 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 09 23:04:03 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Oct 09 23:04:03 localhost kernel: acpiphp: Slot [3] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [4] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [5] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [6] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [7] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [8] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [9] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [10] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [11] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [12] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [13] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [14] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [15] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [16] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [17] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [18] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [19] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [20] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [21] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [22] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [23] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [24] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [25] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [26] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [27] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [28] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [29] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [30] registered Oct 09 23:04:03 localhost kernel: acpiphp: Slot [31] registered Oct 09 23:04:03 localhost kernel: PCI host bridge to bus 0000:00 Oct 09 23:04:03 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 09 23:04:03 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 09 23:04:03 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 09 23:04:03 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 09 23:04:03 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x240000000-0x2bfffffff window] Oct 09 23:04:03 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 09 23:04:03 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Oct 09 23:04:03 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Oct 09 23:04:03 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Oct 09 23:04:03 localhost kernel: pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] Oct 09 23:04:03 localhost kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Oct 09 23:04:03 localhost kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Oct 09 23:04:03 localhost kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Oct 09 23:04:03 localhost kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Oct 09 23:04:03 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Oct 09 23:04:03 localhost kernel: pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] Oct 09 23:04:03 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Oct 09 23:04:03 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Oct 09 23:04:03 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Oct 09 23:04:03 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Oct 09 23:04:03 localhost kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Oct 09 23:04:03 localhost kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Oct 09 23:04:03 localhost kernel: pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] Oct 09 23:04:03 localhost kernel: pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] Oct 09 23:04:03 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 09 23:04:03 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Oct 09 23:04:03 localhost kernel: pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] Oct 09 23:04:03 localhost kernel: pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] Oct 09 23:04:03 localhost kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Oct 09 23:04:03 localhost kernel: pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] Oct 09 23:04:03 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Oct 09 23:04:03 localhost kernel: pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] Oct 09 23:04:03 localhost kernel: pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] Oct 09 23:04:03 localhost kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Oct 09 23:04:03 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Oct 09 23:04:03 localhost kernel: pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] Oct 09 23:04:03 localhost kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Oct 09 23:04:03 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint Oct 09 23:04:03 localhost kernel: pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] Oct 09 23:04:03 localhost kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Oct 09 23:04:03 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 09 23:04:03 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 09 23:04:03 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 09 23:04:03 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 09 23:04:03 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 09 23:04:03 localhost kernel: iommu: Default domain type: Translated Oct 09 23:04:03 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 09 23:04:03 localhost kernel: SCSI subsystem initialized Oct 09 23:04:03 localhost kernel: ACPI: bus type USB registered Oct 09 23:04:03 localhost kernel: usbcore: registered new interface driver usbfs Oct 09 23:04:03 localhost kernel: usbcore: registered new interface driver hub Oct 09 23:04:03 localhost kernel: usbcore: registered new device driver usb Oct 09 23:04:03 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Oct 09 23:04:03 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 09 23:04:03 localhost kernel: PTP clock support registered Oct 09 23:04:03 localhost kernel: EDAC MC: Ver: 3.0.0 Oct 09 23:04:03 localhost kernel: NetLabel: Initializing Oct 09 23:04:03 localhost kernel: NetLabel: domain hash size = 128 Oct 09 23:04:03 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Oct 09 23:04:03 localhost kernel: NetLabel: unlabeled traffic allowed by default Oct 09 23:04:03 localhost kernel: PCI: Using ACPI for IRQ routing Oct 09 23:04:03 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Oct 09 23:04:03 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 09 23:04:03 localhost kernel: e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] Oct 09 23:04:03 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Oct 09 23:04:03 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Oct 09 23:04:03 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 09 23:04:03 localhost kernel: vgaarb: loaded Oct 09 23:04:03 localhost kernel: clocksource: Switched to clocksource kvm-clock Oct 09 23:04:03 localhost kernel: VFS: Disk quotas dquot_6.6.0 Oct 09 23:04:03 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 09 23:04:03 localhost kernel: pnp: PnP ACPI init Oct 09 23:04:03 localhost kernel: pnp 00:03: [dma 2] Oct 09 23:04:03 localhost kernel: pnp: PnP ACPI: found 5 devices Oct 09 23:04:03 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 09 23:04:03 localhost kernel: NET: Registered PF_INET protocol family Oct 09 23:04:03 localhost kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 09 23:04:03 localhost kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Oct 09 23:04:03 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 09 23:04:03 localhost kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 09 23:04:03 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 09 23:04:03 localhost kernel: TCP: Hash tables configured (established 65536 bind 65536) Oct 09 23:04:03 localhost kernel: MPTCP token hash table entries: 8192 (order: 5, 196608 bytes, linear) Oct 09 23:04:03 localhost kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 09 23:04:03 localhost kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 09 23:04:03 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 09 23:04:03 localhost kernel: NET: Registered PF_XDP protocol family Oct 09 23:04:03 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 09 23:04:03 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 09 23:04:03 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 09 23:04:03 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Oct 09 23:04:03 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x240000000-0x2bfffffff window] Oct 09 23:04:03 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Oct 09 23:04:03 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 09 23:04:03 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Oct 09 23:04:03 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x160 took 93743 usecs Oct 09 23:04:03 localhost kernel: PCI: CLS 0 bytes, default 64 Oct 09 23:04:03 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 09 23:04:03 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Oct 09 23:04:03 localhost kernel: ACPI: bus type thunderbolt registered Oct 09 23:04:03 localhost kernel: Trying to unpack rootfs image as initramfs... Oct 09 23:04:03 localhost kernel: Initialise system trusted keyrings Oct 09 23:04:03 localhost kernel: Key type blacklist registered Oct 09 23:04:03 localhost kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 Oct 09 23:04:03 localhost kernel: zbud: loaded Oct 09 23:04:03 localhost kernel: integrity: Platform Keyring initialized Oct 09 23:04:03 localhost kernel: integrity: Machine keyring initialized Oct 09 23:04:03 localhost kernel: Freeing initrd memory: 85808K Oct 09 23:04:03 localhost kernel: NET: Registered PF_ALG protocol family Oct 09 23:04:03 localhost kernel: xor: automatically using best checksumming function avx Oct 09 23:04:03 localhost kernel: Key type asymmetric registered Oct 09 23:04:03 localhost kernel: Asymmetric key parser 'x509' registered Oct 09 23:04:03 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Oct 09 23:04:03 localhost kernel: io scheduler mq-deadline registered Oct 09 23:04:03 localhost kernel: io scheduler kyber registered Oct 09 23:04:03 localhost kernel: io scheduler bfq registered Oct 09 23:04:03 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Oct 09 23:04:03 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Oct 09 23:04:03 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Oct 09 23:04:03 localhost kernel: ACPI: button: Power Button [PWRF] Oct 09 23:04:03 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Oct 09 23:04:03 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Oct 09 23:04:03 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Oct 09 23:04:03 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 09 23:04:03 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 09 23:04:03 localhost kernel: Non-volatile memory driver v1.3 Oct 09 23:04:03 localhost kernel: rdac: device handler registered Oct 09 23:04:03 localhost kernel: hp_sw: device handler registered Oct 09 23:04:03 localhost kernel: emc: device handler registered Oct 09 23:04:03 localhost kernel: alua: device handler registered Oct 09 23:04:03 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Oct 09 23:04:03 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Oct 09 23:04:03 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Oct 09 23:04:03 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Oct 09 23:04:03 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Oct 09 23:04:03 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Oct 09 23:04:03 localhost kernel: usb usb1: Product: UHCI Host Controller Oct 09 23:04:03 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-621.el9.x86_64 uhci_hcd Oct 09 23:04:03 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Oct 09 23:04:03 localhost kernel: hub 1-0:1.0: USB hub found Oct 09 23:04:03 localhost kernel: hub 1-0:1.0: 2 ports detected Oct 09 23:04:03 localhost kernel: usbcore: registered new interface driver usbserial_generic Oct 09 23:04:03 localhost kernel: usbserial: USB Serial support registered for generic Oct 09 23:04:03 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 09 23:04:03 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 09 23:04:03 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 09 23:04:03 localhost kernel: mousedev: PS/2 mouse device common for all mice Oct 09 23:04:03 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Oct 09 23:04:03 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Oct 09 23:04:03 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Oct 09 23:04:03 localhost kernel: rtc_cmos 00:04: registered as rtc0 Oct 09 23:04:03 localhost kernel: rtc_cmos 00:04: setting system clock to 2025-10-10T03:04:02 UTC (1760065442) Oct 09 23:04:03 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Oct 09 23:04:03 localhost kernel: amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled Oct 09 23:04:03 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Oct 09 23:04:03 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Oct 09 23:04:03 localhost kernel: usbcore: registered new interface driver usbhid Oct 09 23:04:03 localhost kernel: usbhid: USB HID core driver Oct 09 23:04:03 localhost kernel: drop_monitor: Initializing network drop monitor service Oct 09 23:04:03 localhost kernel: Initializing XFRM netlink socket Oct 09 23:04:03 localhost kernel: NET: Registered PF_INET6 protocol family Oct 09 23:04:03 localhost kernel: Segment Routing with IPv6 Oct 09 23:04:03 localhost kernel: NET: Registered PF_PACKET protocol family Oct 09 23:04:03 localhost kernel: mpls_gso: MPLS GSO support Oct 09 23:04:03 localhost kernel: IPI shorthand broadcast: enabled Oct 09 23:04:03 localhost kernel: AVX2 version of gcm_enc/dec engaged. Oct 09 23:04:03 localhost kernel: AES CTR mode by8 optimization enabled Oct 09 23:04:03 localhost kernel: sched_clock: Marking stable (1291002248, 145367852)->(1572637141, -136267041) Oct 09 23:04:03 localhost kernel: registered taskstats version 1 Oct 09 23:04:03 localhost kernel: Loading compiled-in X.509 certificates Oct 09 23:04:03 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 72f99a463516b0dfb027e50caab189f607ef1bc9' Oct 09 23:04:03 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Oct 09 23:04:03 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Oct 09 23:04:03 localhost kernel: Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' Oct 09 23:04:03 localhost kernel: Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' Oct 09 23:04:03 localhost kernel: Demotion targets for Node 0: null Oct 09 23:04:03 localhost kernel: page_owner is disabled Oct 09 23:04:03 localhost kernel: Key type .fscrypt registered Oct 09 23:04:03 localhost kernel: Key type fscrypt-provisioning registered Oct 09 23:04:03 localhost kernel: Key type big_key registered Oct 09 23:04:03 localhost kernel: Key type encrypted registered Oct 09 23:04:03 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Oct 09 23:04:03 localhost kernel: Loading compiled-in module X.509 certificates Oct 09 23:04:03 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 72f99a463516b0dfb027e50caab189f607ef1bc9' Oct 09 23:04:03 localhost kernel: ima: Allocated hash algorithm: sha256 Oct 09 23:04:03 localhost kernel: ima: No architecture policies found Oct 09 23:04:03 localhost kernel: evm: Initialising EVM extended attributes: Oct 09 23:04:03 localhost kernel: evm: security.selinux Oct 09 23:04:03 localhost kernel: evm: security.SMACK64 (disabled) Oct 09 23:04:03 localhost kernel: evm: security.SMACK64EXEC (disabled) Oct 09 23:04:03 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Oct 09 23:04:03 localhost kernel: evm: security.SMACK64MMAP (disabled) Oct 09 23:04:03 localhost kernel: evm: security.apparmor (disabled) Oct 09 23:04:03 localhost kernel: evm: security.ima Oct 09 23:04:03 localhost kernel: evm: security.capability Oct 09 23:04:03 localhost kernel: evm: HMAC attrs: 0x1 Oct 09 23:04:03 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Oct 09 23:04:03 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Oct 09 23:04:03 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Oct 09 23:04:03 localhost kernel: usb 1-1: Product: QEMU USB Tablet Oct 09 23:04:03 localhost kernel: usb 1-1: Manufacturer: QEMU Oct 09 23:04:03 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Oct 09 23:04:03 localhost kernel: Running certificate verification RSA selftest Oct 09 23:04:03 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Oct 09 23:04:03 localhost kernel: Running certificate verification ECDSA selftest Oct 09 23:04:03 localhost kernel: Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' Oct 09 23:04:03 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Oct 09 23:04:03 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Oct 09 23:04:03 localhost kernel: clk: Disabling unused clocks Oct 09 23:04:03 localhost kernel: Freeing unused decrypted memory: 2028K Oct 09 23:04:03 localhost kernel: Freeing unused kernel image (initmem) memory: 4188K Oct 09 23:04:03 localhost kernel: Write protecting the kernel read-only data: 30720k Oct 09 23:04:03 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 472K Oct 09 23:04:03 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Oct 09 23:04:03 localhost kernel: Run /init as init process Oct 09 23:04:03 localhost kernel: with arguments: Oct 09 23:04:03 localhost kernel: /init Oct 09 23:04:03 localhost kernel: with environment: Oct 09 23:04:03 localhost kernel: HOME=/ Oct 09 23:04:03 localhost kernel: TERM=linux Oct 09 23:04:03 localhost kernel: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-621.el9.x86_64 Oct 09 23:04:03 localhost systemd[1]: systemd 252-57.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 09 23:04:03 localhost systemd[1]: Detected virtualization kvm. Oct 09 23:04:03 localhost systemd[1]: Detected architecture x86-64. Oct 09 23:04:03 localhost systemd[1]: Running in initrd. Oct 09 23:04:03 localhost systemd[1]: No hostname configured, using default hostname. Oct 09 23:04:03 localhost systemd[1]: Hostname set to . Oct 09 23:04:03 localhost systemd[1]: Initializing machine ID from VM UUID. Oct 09 23:04:03 localhost systemd[1]: Queued start job for default target Initrd Default Target. Oct 09 23:04:03 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Oct 09 23:04:03 localhost systemd[1]: Reached target Local Encrypted Volumes. Oct 09 23:04:03 localhost systemd[1]: Reached target Initrd /usr File System. Oct 09 23:04:03 localhost systemd[1]: Reached target Local File Systems. Oct 09 23:04:03 localhost systemd[1]: Reached target Path Units. Oct 09 23:04:03 localhost systemd[1]: Reached target Slice Units. Oct 09 23:04:03 localhost systemd[1]: Reached target Swaps. Oct 09 23:04:03 localhost systemd[1]: Reached target Timer Units. Oct 09 23:04:03 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Oct 09 23:04:03 localhost systemd[1]: Listening on Journal Socket (/dev/log). Oct 09 23:04:03 localhost systemd[1]: Listening on Journal Socket. Oct 09 23:04:03 localhost systemd[1]: Listening on udev Control Socket. Oct 09 23:04:03 localhost systemd[1]: Listening on udev Kernel Socket. Oct 09 23:04:03 localhost systemd[1]: Reached target Socket Units. Oct 09 23:04:03 localhost systemd[1]: Starting Create List of Static Device Nodes... Oct 09 23:04:03 localhost systemd[1]: Starting Journal Service... Oct 09 23:04:03 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Oct 09 23:04:03 localhost systemd[1]: Starting Apply Kernel Variables... Oct 09 23:04:03 localhost systemd[1]: Starting Create System Users... Oct 09 23:04:03 localhost systemd[1]: Starting Setup Virtual Console... Oct 09 23:04:03 localhost systemd[1]: Finished Create List of Static Device Nodes. Oct 09 23:04:03 localhost systemd[1]: Finished Apply Kernel Variables. Oct 09 23:04:03 localhost systemd[1]: Finished Create System Users. Oct 09 23:04:03 localhost systemd-journald[304]: Journal started Oct 09 23:04:03 localhost systemd-journald[304]: Runtime Journal (/run/log/journal/d14c57a041f2491a9fbc59c66f859242) is 8.0M, max 153.6M, 145.6M free. Oct 09 23:04:03 localhost systemd-sysusers[308]: Creating group 'users' with GID 100. Oct 09 23:04:03 localhost systemd-sysusers[308]: Creating group 'dbus' with GID 81. Oct 09 23:04:03 localhost systemd-sysusers[308]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Oct 09 23:04:03 localhost systemd[1]: Started Journal Service. Oct 09 23:04:03 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Oct 09 23:04:03 localhost systemd[1]: Starting Create Volatile Files and Directories... Oct 09 23:04:03 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Oct 09 23:04:03 localhost systemd[1]: Finished Create Volatile Files and Directories. Oct 09 23:04:03 localhost systemd[1]: Finished Setup Virtual Console. Oct 09 23:04:03 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Oct 09 23:04:03 localhost systemd[1]: Starting dracut cmdline hook... Oct 09 23:04:03 localhost dracut-cmdline[329]: dracut-9 dracut-057-102.git20250818.el9 Oct 09 23:04:03 localhost dracut-cmdline[329]: Using kernel command line parameters: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-621.el9.x86_64 root=UUID=9839e2e1-98a2-4594-b609-79d514deb0a3 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Oct 09 23:04:03 localhost systemd[1]: Finished dracut cmdline hook. Oct 09 23:04:03 localhost systemd[1]: Starting dracut pre-udev hook... Oct 09 23:04:03 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 09 23:04:03 localhost kernel: device-mapper: uevent: version 1.0.3 Oct 09 23:04:03 localhost kernel: device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev Oct 09 23:04:04 localhost kernel: RPC: Registered named UNIX socket transport module. Oct 09 23:04:04 localhost kernel: RPC: Registered udp transport module. Oct 09 23:04:04 localhost kernel: RPC: Registered tcp transport module. Oct 09 23:04:04 localhost kernel: RPC: Registered tcp-with-tls transport module. Oct 09 23:04:04 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Oct 09 23:04:04 localhost rpc.statd[446]: Version 2.5.4 starting Oct 09 23:04:04 localhost rpc.statd[446]: Initializing NSM state Oct 09 23:04:04 localhost rpc.idmapd[451]: Setting log level to 0 Oct 09 23:04:04 localhost systemd[1]: Finished dracut pre-udev hook. Oct 09 23:04:04 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Oct 09 23:04:04 localhost systemd-udevd[464]: Using default interface naming scheme 'rhel-9.0'. Oct 09 23:04:04 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Oct 09 23:04:04 localhost systemd[1]: Starting dracut pre-trigger hook... Oct 09 23:04:04 localhost systemd[1]: Finished dracut pre-trigger hook. Oct 09 23:04:04 localhost systemd[1]: Starting Coldplug All udev Devices... Oct 09 23:04:04 localhost systemd[1]: Created slice Slice /system/modprobe. Oct 09 23:04:04 localhost systemd[1]: Starting Load Kernel Module configfs... Oct 09 23:04:04 localhost systemd[1]: Finished Coldplug All udev Devices. Oct 09 23:04:04 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Oct 09 23:04:04 localhost systemd[1]: Reached target Network. Oct 09 23:04:04 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Oct 09 23:04:04 localhost systemd[1]: Starting dracut initqueue hook... Oct 09 23:04:04 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 09 23:04:04 localhost systemd[1]: Finished Load Kernel Module configfs. Oct 09 23:04:04 localhost systemd[1]: Mounting Kernel Configuration File System... Oct 09 23:04:04 localhost systemd[1]: Mounted Kernel Configuration File System. Oct 09 23:04:04 localhost systemd[1]: Reached target System Initialization. Oct 09 23:04:04 localhost systemd[1]: Reached target Basic System. Oct 09 23:04:04 localhost kernel: virtio_blk virtio2: 8/0/0 default/read/poll queues Oct 09 23:04:04 localhost kernel: virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) Oct 09 23:04:04 localhost kernel: vda: vda1 Oct 09 23:04:04 localhost systemd-udevd[483]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:04:04 localhost kernel: libata version 3.00 loaded. Oct 09 23:04:04 localhost kernel: ata_piix 0000:00:01.1: version 2.13 Oct 09 23:04:04 localhost kernel: scsi host0: ata_piix Oct 09 23:04:04 localhost kernel: scsi host1: ata_piix Oct 09 23:04:04 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 Oct 09 23:04:04 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 Oct 09 23:04:04 localhost systemd[1]: Found device /dev/disk/by-uuid/9839e2e1-98a2-4594-b609-79d514deb0a3. Oct 09 23:04:04 localhost systemd[1]: Reached target Initrd Root Device. Oct 09 23:04:04 localhost kernel: ata1: found unknown device (class 0) Oct 09 23:04:04 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Oct 09 23:04:04 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Oct 09 23:04:04 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Oct 09 23:04:04 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Oct 09 23:04:04 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 09 23:04:04 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 Oct 09 23:04:04 localhost systemd[1]: Finished dracut initqueue hook. Oct 09 23:04:04 localhost systemd[1]: Reached target Preparation for Remote File Systems. Oct 09 23:04:05 localhost systemd[1]: Reached target Remote Encrypted Volumes. Oct 09 23:04:05 localhost systemd[1]: Reached target Remote File Systems. Oct 09 23:04:05 localhost systemd[1]: Starting dracut pre-mount hook... Oct 09 23:04:05 localhost systemd[1]: Finished dracut pre-mount hook. Oct 09 23:04:05 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/9839e2e1-98a2-4594-b609-79d514deb0a3... Oct 09 23:04:05 localhost systemd-fsck[557]: /usr/sbin/fsck.xfs: XFS file system. Oct 09 23:04:05 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/9839e2e1-98a2-4594-b609-79d514deb0a3. Oct 09 23:04:05 localhost systemd[1]: Mounting /sysroot... Oct 09 23:04:05 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Oct 09 23:04:05 localhost kernel: XFS (vda1): Mounting V5 Filesystem 9839e2e1-98a2-4594-b609-79d514deb0a3 Oct 09 23:04:05 localhost kernel: XFS (vda1): Ending clean mount Oct 09 23:04:05 localhost systemd[1]: Mounted /sysroot. Oct 09 23:04:05 localhost systemd[1]: Reached target Initrd Root File System. Oct 09 23:04:05 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Oct 09 23:04:05 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Oct 09 23:04:05 localhost systemd[1]: Reached target Initrd File Systems. Oct 09 23:04:05 localhost systemd[1]: Reached target Initrd Default Target. Oct 09 23:04:05 localhost systemd[1]: Starting dracut mount hook... Oct 09 23:04:05 localhost systemd[1]: Finished dracut mount hook. Oct 09 23:04:05 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Oct 09 23:04:05 localhost rpc.idmapd[451]: exiting on signal 15 Oct 09 23:04:05 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Oct 09 23:04:05 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Oct 09 23:04:05 localhost systemd[1]: Stopped target Network. Oct 09 23:04:05 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Oct 09 23:04:05 localhost systemd[1]: Stopped target Timer Units. Oct 09 23:04:05 localhost systemd[1]: dbus.socket: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Oct 09 23:04:05 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Oct 09 23:04:05 localhost systemd[1]: Stopped target Initrd Default Target. Oct 09 23:04:05 localhost systemd[1]: Stopped target Basic System. Oct 09 23:04:05 localhost systemd[1]: Stopped target Initrd Root Device. Oct 09 23:04:05 localhost systemd[1]: Stopped target Initrd /usr File System. Oct 09 23:04:05 localhost systemd[1]: Stopped target Path Units. Oct 09 23:04:05 localhost systemd[1]: Stopped target Remote File Systems. Oct 09 23:04:05 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Oct 09 23:04:05 localhost systemd[1]: Stopped target Slice Units. Oct 09 23:04:05 localhost systemd[1]: Stopped target Socket Units. Oct 09 23:04:05 localhost systemd[1]: Stopped target System Initialization. Oct 09 23:04:05 localhost systemd[1]: Stopped target Local File Systems. Oct 09 23:04:05 localhost systemd[1]: Stopped target Swaps. Oct 09 23:04:05 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: Stopped dracut mount hook. Oct 09 23:04:05 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: Stopped dracut pre-mount hook. Oct 09 23:04:05 localhost systemd[1]: Stopped target Local Encrypted Volumes. Oct 09 23:04:05 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Oct 09 23:04:05 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: Stopped dracut initqueue hook. Oct 09 23:04:05 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: Stopped Apply Kernel Variables. Oct 09 23:04:05 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: Stopped Create Volatile Files and Directories. Oct 09 23:04:05 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: Stopped Coldplug All udev Devices. Oct 09 23:04:05 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: Stopped dracut pre-trigger hook. Oct 09 23:04:05 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Oct 09 23:04:05 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: Stopped Setup Virtual Console. Oct 09 23:04:05 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 09 23:04:05 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Oct 09 23:04:05 localhost systemd[1]: systemd-udevd.service: Consumed 1.107s CPU time. Oct 09 23:04:06 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 09 23:04:06 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Oct 09 23:04:06 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 09 23:04:06 localhost systemd[1]: Closed udev Control Socket. Oct 09 23:04:06 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 09 23:04:06 localhost systemd[1]: Closed udev Kernel Socket. Oct 09 23:04:06 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 09 23:04:06 localhost systemd[1]: Stopped dracut pre-udev hook. Oct 09 23:04:06 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 09 23:04:06 localhost systemd[1]: Stopped dracut cmdline hook. Oct 09 23:04:06 localhost systemd[1]: Starting Cleanup udev Database... Oct 09 23:04:06 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 09 23:04:06 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Oct 09 23:04:06 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 09 23:04:06 localhost systemd[1]: Stopped Create List of Static Device Nodes. Oct 09 23:04:06 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Oct 09 23:04:06 localhost systemd[1]: Stopped Create System Users. Oct 09 23:04:06 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 09 23:04:06 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Oct 09 23:04:06 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 09 23:04:06 localhost systemd[1]: Finished Cleanup udev Database. Oct 09 23:04:06 localhost systemd[1]: Reached target Switch Root. Oct 09 23:04:06 localhost systemd[1]: Starting Switch Root... Oct 09 23:04:06 localhost systemd[1]: Switching root. Oct 09 23:04:06 localhost systemd-journald[304]: Journal stopped Oct 09 23:04:07 localhost systemd-journald[304]: Received SIGTERM from PID 1 (systemd). Oct 09 23:04:07 localhost kernel: audit: type=1404 audit(1760065446.328:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Oct 09 23:04:07 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 09 23:04:07 localhost kernel: SELinux: policy capability open_perms=1 Oct 09 23:04:07 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 09 23:04:07 localhost kernel: SELinux: policy capability always_check_network=0 Oct 09 23:04:07 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 09 23:04:07 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 09 23:04:07 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 09 23:04:07 localhost kernel: audit: type=1403 audit(1760065446.514:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 09 23:04:07 localhost systemd[1]: Successfully loaded SELinux policy in 191.822ms. Oct 09 23:04:07 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 27.176ms. Oct 09 23:04:07 localhost systemd[1]: systemd 252-57.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 09 23:04:07 localhost systemd[1]: Detected virtualization kvm. Oct 09 23:04:07 localhost systemd[1]: Detected architecture x86-64. Oct 09 23:04:07 localhost systemd-rc-local-generator[640]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:04:07 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 09 23:04:07 localhost systemd[1]: Stopped Switch Root. Oct 09 23:04:07 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 09 23:04:07 localhost systemd[1]: Created slice Slice /system/getty. Oct 09 23:04:07 localhost systemd[1]: Created slice Slice /system/serial-getty. Oct 09 23:04:07 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Oct 09 23:04:07 localhost systemd[1]: Created slice User and Session Slice. Oct 09 23:04:07 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Oct 09 23:04:07 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Oct 09 23:04:07 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Oct 09 23:04:07 localhost systemd[1]: Reached target Local Encrypted Volumes. Oct 09 23:04:07 localhost systemd[1]: Stopped target Switch Root. Oct 09 23:04:07 localhost systemd[1]: Stopped target Initrd File Systems. Oct 09 23:04:07 localhost systemd[1]: Stopped target Initrd Root File System. Oct 09 23:04:07 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Oct 09 23:04:07 localhost systemd[1]: Reached target Path Units. Oct 09 23:04:07 localhost systemd[1]: Reached target rpc_pipefs.target. Oct 09 23:04:07 localhost systemd[1]: Reached target Slice Units. Oct 09 23:04:07 localhost systemd[1]: Reached target Swaps. Oct 09 23:04:07 localhost systemd[1]: Reached target Local Verity Protected Volumes. Oct 09 23:04:07 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Oct 09 23:04:07 localhost systemd[1]: Reached target RPC Port Mapper. Oct 09 23:04:07 localhost systemd[1]: Listening on Process Core Dump Socket. Oct 09 23:04:07 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Oct 09 23:04:07 localhost systemd[1]: Listening on udev Control Socket. Oct 09 23:04:07 localhost systemd[1]: Listening on udev Kernel Socket. Oct 09 23:04:07 localhost systemd[1]: Mounting Huge Pages File System... Oct 09 23:04:07 localhost systemd[1]: Mounting POSIX Message Queue File System... Oct 09 23:04:07 localhost systemd[1]: Mounting Kernel Debug File System... Oct 09 23:04:07 localhost systemd[1]: Mounting Kernel Trace File System... Oct 09 23:04:07 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Oct 09 23:04:07 localhost systemd[1]: Starting Create List of Static Device Nodes... Oct 09 23:04:07 localhost systemd[1]: Starting Load Kernel Module configfs... Oct 09 23:04:07 localhost systemd[1]: Starting Load Kernel Module drm... Oct 09 23:04:07 localhost systemd[1]: Starting Load Kernel Module efi_pstore... Oct 09 23:04:07 localhost systemd[1]: Starting Load Kernel Module fuse... Oct 09 23:04:07 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Oct 09 23:04:07 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 09 23:04:07 localhost systemd[1]: Stopped File System Check on Root Device. Oct 09 23:04:07 localhost systemd[1]: Stopped Journal Service. Oct 09 23:04:07 localhost systemd[1]: Starting Journal Service... Oct 09 23:04:07 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Oct 09 23:04:07 localhost systemd[1]: Starting Generate network units from Kernel command line... Oct 09 23:04:07 localhost systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 09 23:04:07 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Oct 09 23:04:07 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Oct 09 23:04:07 localhost systemd[1]: Starting Apply Kernel Variables... Oct 09 23:04:07 localhost systemd[1]: Starting Coldplug All udev Devices... Oct 09 23:04:07 localhost kernel: fuse: init (API version 7.37) Oct 09 23:04:07 localhost systemd[1]: Mounted Huge Pages File System. Oct 09 23:04:07 localhost systemd[1]: Mounted POSIX Message Queue File System. Oct 09 23:04:07 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Oct 09 23:04:07 localhost systemd[1]: Mounted Kernel Debug File System. Oct 09 23:04:07 localhost systemd[1]: Mounted Kernel Trace File System. Oct 09 23:04:07 localhost systemd[1]: Finished Create List of Static Device Nodes. Oct 09 23:04:07 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 09 23:04:07 localhost systemd[1]: Finished Load Kernel Module configfs. Oct 09 23:04:07 localhost systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 09 23:04:07 localhost systemd[1]: Finished Load Kernel Module efi_pstore. Oct 09 23:04:07 localhost systemd-journald[681]: Journal started Oct 09 23:04:07 localhost systemd-journald[681]: Runtime Journal (/run/log/journal/a1727ec20198bc6caf436a6e13c4ff5e) is 8.0M, max 153.6M, 145.6M free. Oct 09 23:04:07 localhost systemd[1]: Queued start job for default target Multi-User System. Oct 09 23:04:07 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Oct 09 23:04:07 localhost systemd[1]: Started Journal Service. Oct 09 23:04:07 localhost kernel: ACPI: bus type drm_connector registered Oct 09 23:04:07 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 09 23:04:07 localhost systemd[1]: Finished Load Kernel Module fuse. Oct 09 23:04:07 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 09 23:04:07 localhost systemd[1]: Finished Load Kernel Module drm. Oct 09 23:04:07 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Oct 09 23:04:07 localhost systemd[1]: Finished Generate network units from Kernel command line. Oct 09 23:04:07 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Oct 09 23:04:07 localhost systemd[1]: Finished Apply Kernel Variables. Oct 09 23:04:07 localhost systemd[1]: Mounting FUSE Control File System... Oct 09 23:04:07 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Oct 09 23:04:07 localhost systemd[1]: Starting Rebuild Hardware Database... Oct 09 23:04:07 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Oct 09 23:04:07 localhost systemd[1]: Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 09 23:04:07 localhost systemd[1]: Starting Load/Save OS Random Seed... Oct 09 23:04:07 localhost systemd[1]: Starting Create System Users... Oct 09 23:04:07 localhost systemd[1]: Finished Coldplug All udev Devices. Oct 09 23:04:07 localhost systemd[1]: Mounted FUSE Control File System. Oct 09 23:04:07 localhost systemd-journald[681]: Runtime Journal (/run/log/journal/a1727ec20198bc6caf436a6e13c4ff5e) is 8.0M, max 153.6M, 145.6M free. Oct 09 23:04:07 localhost systemd-journald[681]: Received client request to flush runtime journal. Oct 09 23:04:07 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Oct 09 23:04:07 localhost systemd[1]: Finished Load/Save OS Random Seed. Oct 09 23:04:07 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Oct 09 23:04:07 localhost systemd[1]: Finished Create System Users. Oct 09 23:04:07 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Oct 09 23:04:07 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Oct 09 23:04:07 localhost systemd[1]: Reached target Preparation for Local File Systems. Oct 09 23:04:07 localhost systemd[1]: Reached target Local File Systems. Oct 09 23:04:07 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Oct 09 23:04:07 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Oct 09 23:04:07 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Oct 09 23:04:07 localhost systemd[1]: Update Boot Loader Random Seed was skipped because no trigger condition checks were met. Oct 09 23:04:07 localhost systemd[1]: Starting Automatic Boot Loader Update... Oct 09 23:04:07 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Oct 09 23:04:07 localhost systemd[1]: Starting Create Volatile Files and Directories... Oct 09 23:04:07 localhost bootctl[699]: Couldn't find EFI system partition, skipping. Oct 09 23:04:07 localhost systemd[1]: Finished Automatic Boot Loader Update. Oct 09 23:04:07 localhost systemd[1]: Finished Create Volatile Files and Directories. Oct 09 23:04:07 localhost systemd[1]: Starting Security Auditing Service... Oct 09 23:04:07 localhost systemd[1]: Starting RPC Bind... Oct 09 23:04:07 localhost systemd[1]: Starting Rebuild Journal Catalog... Oct 09 23:04:07 localhost auditd[705]: audit dispatcher initialized with q_depth=2000 and 1 active plugins Oct 09 23:04:07 localhost auditd[705]: Init complete, auditd 3.1.5 listening for events (startup state enable) Oct 09 23:04:07 localhost systemd[1]: Started RPC Bind. Oct 09 23:04:07 localhost systemd[1]: Finished Rebuild Journal Catalog. Oct 09 23:04:07 localhost augenrules[710]: /sbin/augenrules: No change Oct 09 23:04:07 localhost augenrules[725]: No rules Oct 09 23:04:07 localhost augenrules[725]: enabled 1 Oct 09 23:04:07 localhost augenrules[725]: failure 1 Oct 09 23:04:07 localhost augenrules[725]: pid 705 Oct 09 23:04:07 localhost augenrules[725]: rate_limit 0 Oct 09 23:04:07 localhost augenrules[725]: backlog_limit 8192 Oct 09 23:04:07 localhost augenrules[725]: lost 0 Oct 09 23:04:07 localhost augenrules[725]: backlog 0 Oct 09 23:04:07 localhost augenrules[725]: backlog_wait_time 60000 Oct 09 23:04:07 localhost augenrules[725]: backlog_wait_time_actual 0 Oct 09 23:04:07 localhost augenrules[725]: enabled 1 Oct 09 23:04:07 localhost augenrules[725]: failure 1 Oct 09 23:04:07 localhost augenrules[725]: pid 705 Oct 09 23:04:07 localhost augenrules[725]: rate_limit 0 Oct 09 23:04:07 localhost augenrules[725]: backlog_limit 8192 Oct 09 23:04:07 localhost augenrules[725]: lost 0 Oct 09 23:04:07 localhost augenrules[725]: backlog 0 Oct 09 23:04:07 localhost augenrules[725]: backlog_wait_time 60000 Oct 09 23:04:07 localhost augenrules[725]: backlog_wait_time_actual 0 Oct 09 23:04:07 localhost augenrules[725]: enabled 1 Oct 09 23:04:07 localhost augenrules[725]: failure 1 Oct 09 23:04:07 localhost augenrules[725]: pid 705 Oct 09 23:04:07 localhost augenrules[725]: rate_limit 0 Oct 09 23:04:07 localhost augenrules[725]: backlog_limit 8192 Oct 09 23:04:07 localhost augenrules[725]: lost 0 Oct 09 23:04:07 localhost augenrules[725]: backlog 0 Oct 09 23:04:07 localhost augenrules[725]: backlog_wait_time 60000 Oct 09 23:04:07 localhost augenrules[725]: backlog_wait_time_actual 0 Oct 09 23:04:07 localhost systemd[1]: Started Security Auditing Service. Oct 09 23:04:07 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Oct 09 23:04:07 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Oct 09 23:04:07 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Oct 09 23:04:07 localhost systemd[1]: Finished Rebuild Hardware Database. Oct 09 23:04:07 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Oct 09 23:04:07 localhost systemd[1]: Starting Update is Completed... Oct 09 23:04:07 localhost systemd[1]: Finished Update is Completed. Oct 09 23:04:08 localhost systemd-udevd[733]: Using default interface naming scheme 'rhel-9.0'. Oct 09 23:04:08 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Oct 09 23:04:08 localhost systemd[1]: Reached target System Initialization. Oct 09 23:04:08 localhost systemd[1]: Started dnf makecache --timer. Oct 09 23:04:08 localhost systemd[1]: Started Daily rotation of log files. Oct 09 23:04:08 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Oct 09 23:04:08 localhost systemd[1]: Reached target Timer Units. Oct 09 23:04:08 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Oct 09 23:04:08 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Oct 09 23:04:08 localhost systemd[1]: Reached target Socket Units. Oct 09 23:04:08 localhost systemd[1]: Starting D-Bus System Message Bus... Oct 09 23:04:08 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 09 23:04:08 localhost systemd-udevd[736]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:04:08 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Oct 09 23:04:08 localhost systemd[1]: Starting Load Kernel Module configfs... Oct 09 23:04:08 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 09 23:04:08 localhost systemd[1]: Finished Load Kernel Module configfs. Oct 09 23:04:08 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Oct 09 23:04:08 localhost systemd[1]: Started D-Bus System Message Bus. Oct 09 23:04:08 localhost systemd[1]: Reached target Basic System. Oct 09 23:04:08 localhost dbus-broker-lau[769]: Ready Oct 09 23:04:08 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Oct 09 23:04:08 localhost systemd[1]: Starting NTP client/server... Oct 09 23:04:08 localhost systemd[1]: Starting Cloud-init: Local Stage (pre-network)... Oct 09 23:04:08 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Oct 09 23:04:08 localhost systemd[1]: Starting IPv4 firewall with iptables... Oct 09 23:04:08 localhost systemd[1]: Started irqbalance daemon. Oct 09 23:04:08 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Oct 09 23:04:08 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 09 23:04:08 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 09 23:04:08 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 09 23:04:08 localhost systemd[1]: Reached target sshd-keygen.target. Oct 09 23:04:08 localhost kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Oct 09 23:04:08 localhost kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Oct 09 23:04:08 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Oct 09 23:04:08 localhost systemd[1]: Reached target User and Group Name Lookups. Oct 09 23:04:08 localhost systemd[1]: Starting User Login Management... Oct 09 23:04:08 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Oct 09 23:04:08 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Oct 09 23:04:08 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Oct 09 23:04:08 localhost kernel: Console: switching to colour dummy device 80x25 Oct 09 23:04:08 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Oct 09 23:04:08 localhost kernel: [drm] features: -context_init Oct 09 23:04:08 localhost chronyd[805]: chronyd version 4.6.1 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Oct 09 23:04:08 localhost kernel: [drm] number of scanouts: 1 Oct 09 23:04:08 localhost kernel: [drm] number of cap sets: 0 Oct 09 23:04:08 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Oct 09 23:04:08 localhost chronyd[805]: Loaded 0 symmetric keys Oct 09 23:04:08 localhost chronyd[805]: Using right/UTC timezone to obtain leap second data Oct 09 23:04:08 localhost chronyd[805]: Loaded seccomp filter (level 2) Oct 09 23:04:08 localhost systemd[1]: Started NTP client/server. Oct 09 23:04:08 localhost kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Oct 09 23:04:08 localhost kernel: Console: switching to colour frame buffer device 128x48 Oct 09 23:04:08 localhost kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Oct 09 23:04:08 localhost systemd-logind[793]: New seat seat0. Oct 09 23:04:08 localhost systemd-logind[793]: Watching system buttons on /dev/input/event0 (Power Button) Oct 09 23:04:08 localhost systemd-logind[793]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Oct 09 23:04:08 localhost systemd[1]: Started User Login Management. Oct 09 23:04:08 localhost kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Oct 09 23:04:08 localhost kernel: Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled Oct 09 23:04:08 localhost kernel: kvm_amd: TSC scaling supported Oct 09 23:04:08 localhost kernel: kvm_amd: Nested Virtualization enabled Oct 09 23:04:08 localhost kernel: kvm_amd: Nested Paging enabled Oct 09 23:04:08 localhost kernel: kvm_amd: LBR virtualization supported Oct 09 23:04:08 localhost iptables.init[787]: iptables: Applying firewall rules: [ OK ] Oct 09 23:04:08 localhost systemd[1]: Finished IPv4 firewall with iptables. Oct 09 23:04:08 localhost cloud-init[842]: Cloud-init v. 24.4-7.el9 running 'init-local' at Fri, 10 Oct 2025 03:04:08 +0000. Up 7.64 seconds. Oct 09 23:04:09 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3 Oct 09 23:04:09 localhost kernel: ISO 9660 Extensions: RRIP_1991A Oct 09 23:04:09 localhost systemd[1]: run-cloud\x2dinit-tmp-tmp7ahq9iuh.mount: Deactivated successfully. Oct 09 23:04:09 localhost systemd[1]: Starting Hostname Service... Oct 09 23:04:09 localhost systemd[1]: Started Hostname Service. Oct 09 23:04:09 np0005479288.novalocal systemd-hostnamed[856]: Hostname set to (static) Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Finished Cloud-init: Local Stage (pre-network). Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Reached target Preparation for Network. Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Starting Network Manager... Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.6364] NetworkManager (version 1.54.1-1.el9) is starting... (boot:9ffa5906-cc53-43ba-b02b-1432bc7d8727) Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.6372] Read config: /etc/NetworkManager/NetworkManager.conf, /run/NetworkManager/conf.d/15-carrier-timeout.conf Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.6604] manager[0x562ca2365080]: monitoring kernel firmware directory '/lib/firmware'. Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.6683] hostname: hostname: using hostnamed Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.6684] hostname: static hostname changed from (none) to "np0005479288.novalocal" Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.6692] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.6880] manager[0x562ca2365080]: rfkill: Wi-Fi hardware radio set enabled Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.6882] manager[0x562ca2365080]: rfkill: WWAN hardware radio set enabled Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.6989] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.54.1-1.el9/libnm-device-plugin-team.so) Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.6989] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.6990] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.6991] manager: Networking is enabled by state file Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.6994] settings: Loaded settings plugin: keyfile (internal) Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7033] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.54.1-1.el9/libnm-settings-plugin-ifcfg-rh.so") Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7068] Warning: the ifcfg-rh plugin is deprecated, please migrate connections to the keyfile format using "nmcli connection migrate" Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7102] dhcp: init: Using DHCP client 'internal' Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7107] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7132] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7158] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', managed-type: 'external') Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7172] device (lo): Activation: starting connection 'lo' (fa9bd5a0-51e2-42cd-9185-84e896d0953a) Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7188] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7194] device (eth0): state change: unmanaged -> unavailable (reason 'managed', managed-type: 'external') Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Starting Network Manager Script Dispatcher Service... Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Started Network Manager. Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7238] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7245] device (lo): state change: disconnected -> prepare (reason 'none', managed-type: 'external') Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7249] device (lo): state change: prepare -> config (reason 'none', managed-type: 'external') Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7253] device (lo): state change: config -> ip-config (reason 'none', managed-type: 'external') Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7256] device (eth0): carrier: link connected Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Reached target Network. Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7262] device (lo): state change: ip-config -> ip-check (reason 'none', managed-type: 'external') Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7272] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', managed-type: 'full') Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7282] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7288] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7289] device (eth0): state change: disconnected -> prepare (reason 'none', managed-type: 'full') Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7293] manager: NetworkManager state is now CONNECTING Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7296] device (eth0): state change: prepare -> config (reason 'none', managed-type: 'full') Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7308] device (eth0): state change: config -> ip-config (reason 'none', managed-type: 'full') Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7312] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Starting Network Manager Wait Online... Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7381] dhcp4 (eth0): state changed new lease, address=38.102.83.68 Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7393] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7426] device (eth0): state change: ip-config -> ip-check (reason 'none', managed-type: 'full') Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Started Network Manager Script Dispatcher Service. Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7514] device (lo): state change: ip-check -> secondaries (reason 'none', managed-type: 'external') Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7517] device (eth0): state change: ip-check -> secondaries (reason 'none', managed-type: 'full') Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7519] device (lo): state change: secondaries -> activated (reason 'none', managed-type: 'external') Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7529] device (lo): Activation: successful, device activated. Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7537] device (eth0): state change: secondaries -> activated (reason 'none', managed-type: 'full') Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7543] manager: NetworkManager state is now CONNECTED_SITE Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7548] device (eth0): Activation: successful, device activated. Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7557] manager: NetworkManager state is now CONNECTED_GLOBAL Oct 09 23:04:09 np0005479288.novalocal NetworkManager[860]: [1760065449.7561] manager: startup complete Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Oct 09 23:04:09 np0005479288.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Reached target NFS client services. Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Reached target Preparation for Remote File Systems. Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Reached target Remote File Systems. Oct 09 23:04:09 np0005479288.novalocal systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Finished Network Manager Wait Online. Oct 09 23:04:09 np0005479288.novalocal systemd[1]: Starting Cloud-init: Network Stage... Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: Cloud-init v. 24.4-7.el9 running 'init' at Fri, 10 Oct 2025 03:04:10 +0000. Up 8.80 seconds. Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: ++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: +--------+------+-----------------------------+---------------+--------+-------------------+ Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: +--------+------+-----------------------------+---------------+--------+-------------------+ Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: | eth0 | True | 38.102.83.68 | 255.255.255.0 | global | fa:16:3e:8b:01:4c | Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: | eth0 | True | fe80::f816:3eff:fe8b:14c/64 | . | link | fa:16:3e:8b:01:4c | Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: | lo | True | ::1/128 | . | host | . | Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: +--------+------+-----------------------------+---------------+--------+-------------------+ Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: +-------+-------------+---------+-----------+-------+ Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: | Route | Destination | Gateway | Interface | Flags | Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: +-------+-------------+---------+-----------+-------+ Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: | 3 | multicast | :: | eth0 | U | Oct 09 23:04:10 np0005479288.novalocal cloud-init[923]: ci-info: +-------+-------------+---------+-----------+-------+ Oct 09 23:04:11 np0005479288.novalocal useradd[989]: new group: name=cloud-user, GID=1001 Oct 09 23:04:11 np0005479288.novalocal useradd[989]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Oct 09 23:04:11 np0005479288.novalocal useradd[989]: add 'cloud-user' to group 'adm' Oct 09 23:04:11 np0005479288.novalocal useradd[989]: add 'cloud-user' to group 'systemd-journal' Oct 09 23:04:11 np0005479288.novalocal useradd[989]: add 'cloud-user' to shadow group 'adm' Oct 09 23:04:11 np0005479288.novalocal useradd[989]: add 'cloud-user' to shadow group 'systemd-journal' Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: Generating public/private rsa key pair. Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: The key fingerprint is: Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: SHA256:fKpRRMqGvDQmSenpRD6zrTmvX/SHWeDZhhxF5NU5z6Q root@np0005479288.novalocal Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: The key's randomart image is: Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: +---[RSA 3072]----+ Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | .. .o+ .. . | Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | .oo o o o . + .| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | +o.* + + . * | Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | B+ + = * E o| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | o =. . S = | Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | o .. o B | Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | o o = . | Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | + . o . | Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | .=o . | Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: +----[SHA256]-----+ Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: Generating public/private ecdsa key pair. Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: The key fingerprint is: Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: SHA256:hPx28ufBns2IGkdRXUp/55afjtmjSzXwqIBxlovuX+E root@np0005479288.novalocal Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: The key's randomart image is: Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: +---[ECDSA 256]---+ Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | .....| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | . . .. ..o | Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | o..+. .. +| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | o* .. +.+| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | oSoo. . =o| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | .. =o.o ..+| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | .. oE+. ..| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | . o.=.*=. | Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | .oo. ===o.| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: +----[SHA256]-----+ Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: Generating public/private ed25519 key pair. Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: The key fingerprint is: Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: SHA256:L5f8ztBvpCJPB4/9VnGZReD97PP7NfuiL6Pxt6qLFlA root@np0005479288.novalocal Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: The key's randomart image is: Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: +--[ED25519 256]--+ Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | .o.| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | E . ..| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | . . =| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | . =o| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | .S . =| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | .o B ...| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | ..X =o +o| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | o=.B+o= *| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: | ..o=*BX==B| Oct 09 23:04:11 np0005479288.novalocal cloud-init[923]: +----[SHA256]-----+ Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Finished Cloud-init: Network Stage. Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Reached target Cloud-config availability. Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Reached target Network is Online. Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Starting Cloud-init: Config Stage... Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Starting Notify NFS peers of a restart... Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Starting System Logging Service... Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Starting OpenSSH server daemon... Oct 09 23:04:11 np0005479288.novalocal sm-notify[1004]: Version 2.5.4 starting Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Starting Permit User Sessions... Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Started Notify NFS peers of a restart. Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Finished Permit User Sessions. Oct 09 23:04:11 np0005479288.novalocal sshd[1006]: Server listening on 0.0.0.0 port 22. Oct 09 23:04:11 np0005479288.novalocal sshd[1006]: Server listening on :: port 22. Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Started Command Scheduler. Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Started Getty on tty1. Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Started Serial Getty on ttyS0. Oct 09 23:04:11 np0005479288.novalocal crond[1008]: (CRON) STARTUP (1.5.7) Oct 09 23:04:11 np0005479288.novalocal crond[1008]: (CRON) INFO (Syslog will be used instead of sendmail.) Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Reached target Login Prompts. Oct 09 23:04:11 np0005479288.novalocal crond[1008]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 11% if used.) Oct 09 23:04:11 np0005479288.novalocal crond[1008]: (CRON) INFO (running with inotify support) Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Started OpenSSH server daemon. Oct 09 23:04:11 np0005479288.novalocal rsyslogd[1005]: [origin software="rsyslogd" swVersion="8.2506.0-2.el9" x-pid="1005" x-info="https://www.rsyslog.com"] start Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Started System Logging Service. Oct 09 23:04:11 np0005479288.novalocal rsyslogd[1005]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2506.0-2.el9 try https://www.rsyslog.com/e/2040 ] Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Reached target Multi-User System. Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Starting Record Runlevel Change in UTMP... Oct 09 23:04:11 np0005479288.novalocal systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 09 23:04:11 np0005479288.novalocal systemd[1]: Finished Record Runlevel Change in UTMP. Oct 09 23:04:11 np0005479288.novalocal rsyslogd[1005]: imjournal: journal files changed, reloading... [v8.2506.0-2.el9 try https://www.rsyslog.com/e/0 ] Oct 09 23:04:11 np0005479288.novalocal sshd-session[1015]: Connection reset by 38.102.83.114 port 37644 [preauth] Oct 09 23:04:11 np0005479288.novalocal sshd-session[1017]: Unable to negotiate with 38.102.83.114 port 37650: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Oct 09 23:04:11 np0005479288.novalocal sshd-session[1023]: Unable to negotiate with 38.102.83.114 port 37662: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Oct 09 23:04:11 np0005479288.novalocal cloud-init[1026]: Cloud-init v. 24.4-7.el9 running 'modules:config' at Fri, 10 Oct 2025 03:04:11 +0000. Up 10.70 seconds. Oct 09 23:04:11 np0005479288.novalocal sshd-session[1025]: Unable to negotiate with 38.102.83.114 port 37676: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Oct 09 23:04:12 np0005479288.novalocal sshd-session[1028]: Connection reset by 38.102.83.114 port 37678 [preauth] Oct 09 23:04:12 np0005479288.novalocal sshd-session[1020]: Connection closed by 38.102.83.114 port 37654 [preauth] Oct 09 23:04:12 np0005479288.novalocal systemd[1]: Finished Cloud-init: Config Stage. Oct 09 23:04:12 np0005479288.novalocal sshd-session[1030]: Connection reset by 38.102.83.114 port 37692 [preauth] Oct 09 23:04:12 np0005479288.novalocal systemd[1]: Starting Cloud-init: Final Stage... Oct 09 23:04:12 np0005479288.novalocal sshd-session[1033]: Unable to negotiate with 38.102.83.114 port 37708: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth] Oct 09 23:04:12 np0005479288.novalocal sshd-session[1035]: Unable to negotiate with 38.102.83.114 port 37712: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Oct 09 23:04:12 np0005479288.novalocal cloud-init[1039]: Cloud-init v. 24.4-7.el9 running 'modules:final' at Fri, 10 Oct 2025 03:04:12 +0000. Up 11.10 seconds. Oct 09 23:04:12 np0005479288.novalocal cloud-init[1041]: ############################################################# Oct 09 23:04:12 np0005479288.novalocal cloud-init[1042]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Oct 09 23:04:12 np0005479288.novalocal cloud-init[1044]: 256 SHA256:hPx28ufBns2IGkdRXUp/55afjtmjSzXwqIBxlovuX+E root@np0005479288.novalocal (ECDSA) Oct 09 23:04:12 np0005479288.novalocal cloud-init[1046]: 256 SHA256:L5f8ztBvpCJPB4/9VnGZReD97PP7NfuiL6Pxt6qLFlA root@np0005479288.novalocal (ED25519) Oct 09 23:04:12 np0005479288.novalocal cloud-init[1048]: 3072 SHA256:fKpRRMqGvDQmSenpRD6zrTmvX/SHWeDZhhxF5NU5z6Q root@np0005479288.novalocal (RSA) Oct 09 23:04:12 np0005479288.novalocal cloud-init[1049]: -----END SSH HOST KEY FINGERPRINTS----- Oct 09 23:04:12 np0005479288.novalocal cloud-init[1050]: ############################################################# Oct 09 23:04:12 np0005479288.novalocal cloud-init[1039]: Cloud-init v. 24.4-7.el9 finished at Fri, 10 Oct 2025 03:04:12 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 11.33 seconds Oct 09 23:04:12 np0005479288.novalocal systemd[1]: Finished Cloud-init: Final Stage. Oct 09 23:04:12 np0005479288.novalocal systemd[1]: Reached target Cloud-init target. Oct 09 23:04:12 np0005479288.novalocal systemd[1]: Startup finished in 1.800s (kernel) + 3.258s (initrd) + 6.355s (userspace) = 11.413s. Oct 09 23:04:14 np0005479288.novalocal chronyd[805]: Selected source 45.61.49.156 (2.centos.pool.ntp.org) Oct 09 23:04:14 np0005479288.novalocal chronyd[805]: System clock TAI offset set to 37 seconds Oct 09 23:04:18 np0005479288.novalocal irqbalance[791]: Cannot change IRQ 25 affinity: Operation not permitted Oct 09 23:04:18 np0005479288.novalocal irqbalance[791]: IRQ 25 affinity is now unmanaged Oct 09 23:04:18 np0005479288.novalocal irqbalance[791]: Cannot change IRQ 31 affinity: Operation not permitted Oct 09 23:04:18 np0005479288.novalocal irqbalance[791]: IRQ 31 affinity is now unmanaged Oct 09 23:04:18 np0005479288.novalocal irqbalance[791]: Cannot change IRQ 28 affinity: Operation not permitted Oct 09 23:04:18 np0005479288.novalocal irqbalance[791]: IRQ 28 affinity is now unmanaged Oct 09 23:04:18 np0005479288.novalocal irqbalance[791]: Cannot change IRQ 32 affinity: Operation not permitted Oct 09 23:04:18 np0005479288.novalocal irqbalance[791]: IRQ 32 affinity is now unmanaged Oct 09 23:04:18 np0005479288.novalocal irqbalance[791]: Cannot change IRQ 30 affinity: Operation not permitted Oct 09 23:04:18 np0005479288.novalocal irqbalance[791]: IRQ 30 affinity is now unmanaged Oct 09 23:04:18 np0005479288.novalocal irqbalance[791]: Cannot change IRQ 29 affinity: Operation not permitted Oct 09 23:04:18 np0005479288.novalocal irqbalance[791]: IRQ 29 affinity is now unmanaged Oct 09 23:04:19 np0005479288.novalocal sshd-session[1054]: Accepted publickey for zuul-worker from 38.102.83.114 port 50896 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Oct 09 23:04:19 np0005479288.novalocal systemd[1]: Created slice User Slice of UID 1000. Oct 09 23:04:19 np0005479288.novalocal systemd[1]: Starting User Runtime Directory /run/user/1000... Oct 09 23:04:19 np0005479288.novalocal systemd-logind[793]: New session 1 of user zuul-worker. Oct 09 23:04:19 np0005479288.novalocal systemd[1]: Finished User Runtime Directory /run/user/1000. Oct 09 23:04:19 np0005479288.novalocal systemd[1]: Starting User Manager for UID 1000... Oct 09 23:04:19 np0005479288.novalocal systemd[1058]: pam_unix(systemd-user:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Oct 09 23:04:19 np0005479288.novalocal systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Oct 09 23:04:20 np0005479288.novalocal systemd[1058]: Queued start job for default target Main User Target. Oct 09 23:04:20 np0005479288.novalocal systemd[1058]: Created slice User Application Slice. Oct 09 23:04:20 np0005479288.novalocal systemd[1058]: Started Mark boot as successful after the user session has run 2 minutes. Oct 09 23:04:20 np0005479288.novalocal systemd[1058]: Started Daily Cleanup of User's Temporary Directories. Oct 09 23:04:20 np0005479288.novalocal systemd[1058]: Reached target Paths. Oct 09 23:04:20 np0005479288.novalocal systemd[1058]: Reached target Timers. Oct 09 23:04:20 np0005479288.novalocal systemd[1058]: Starting D-Bus User Message Bus Socket... Oct 09 23:04:20 np0005479288.novalocal systemd[1058]: Starting Create User's Volatile Files and Directories... Oct 09 23:04:20 np0005479288.novalocal systemd[1058]: Listening on D-Bus User Message Bus Socket. Oct 09 23:04:20 np0005479288.novalocal systemd[1058]: Reached target Sockets. Oct 09 23:04:20 np0005479288.novalocal systemd[1058]: Finished Create User's Volatile Files and Directories. Oct 09 23:04:20 np0005479288.novalocal systemd[1058]: Reached target Basic System. Oct 09 23:04:20 np0005479288.novalocal systemd[1058]: Reached target Main User Target. Oct 09 23:04:20 np0005479288.novalocal systemd[1058]: Startup finished in 176ms. Oct 09 23:04:20 np0005479288.novalocal systemd[1]: Started User Manager for UID 1000. Oct 09 23:04:20 np0005479288.novalocal systemd[1]: Started Session 1 of User zuul-worker. Oct 09 23:04:20 np0005479288.novalocal sshd-session[1054]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Oct 09 23:04:20 np0005479288.novalocal python3[1140]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 09 23:04:22 np0005479288.novalocal python3[1168]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 09 23:04:26 np0005479288.novalocal python3[1226]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 09 23:04:27 np0005479288.novalocal python3[1266]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Oct 09 23:04:28 np0005479288.novalocal python3[1292]: ansible-authorized_key Invoked with user=zuul-worker state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 09 23:04:29 np0005479288.novalocal python3[1316]: ansible-file Invoked with state=directory path=/home/zuul-worker/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:29 np0005479288.novalocal python3[1415]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 09 23:04:29 np0005479288.novalocal python3[1486]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760065469.212599-163-255396606273184/source dest=/home/zuul-worker/.ssh/id_rsa mode=384 force=False _original_basename=d777b9c27dc648639f4cfee8c1ece798_id_rsa follow=False checksum=aff55bb051e20af3c32a3ce48df657e32473f232 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:30 np0005479288.novalocal python3[1609]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 09 23:04:30 np0005479288.novalocal python3[1680]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760065470.1246712-174-219462492146727/source dest=/home/zuul-worker/.ssh/id_rsa.pub mode=420 force=False _original_basename=d777b9c27dc648639f4cfee8c1ece798_id_rsa.pub follow=False checksum=db74965baca3dd54cdb7878c5913cc749b9d8dcb backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:32 np0005479288.novalocal python3[1728]: ansible-ping Invoked with data=pong Oct 09 23:04:33 np0005479288.novalocal python3[1752]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 09 23:04:34 np0005479288.novalocal python3[1810]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Oct 09 23:04:35 np0005479288.novalocal python3[1842]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:35 np0005479288.novalocal python3[1866]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:35 np0005479288.novalocal python3[1890]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:36 np0005479288.novalocal python3[1914]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:36 np0005479288.novalocal python3[1938]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:36 np0005479288.novalocal python3[1962]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:39 np0005479288.novalocal python3[1986]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Oct 09 23:04:39 np0005479288.novalocal systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 09 23:04:39 np0005479288.novalocal sshd-session[1991]: Accepted publickey for zuul-worker from 38.102.83.114 port 57664 ssh2: RSA SHA256:PCeD3u8Wy2W/JZ48u0xPYMz34E5PrhOhgOLMaJP68zQ Oct 09 23:04:39 np0005479288.novalocal systemd-logind[793]: New session 3 of user zuul-worker. Oct 09 23:04:39 np0005479288.novalocal systemd[1]: Started Session 3 of User zuul-worker. Oct 09 23:04:39 np0005479288.novalocal sshd-session[1991]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Oct 09 23:04:42 np0005479288.novalocal sshd-session[1994]: Received disconnect from 38.102.83.114 port 57664:11: disconnected by user Oct 09 23:04:42 np0005479288.novalocal sshd-session[1994]: Disconnected from user zuul-worker 38.102.83.114 port 57664 Oct 09 23:04:42 np0005479288.novalocal sshd-session[1991]: pam_unix(sshd:session): session closed for user zuul-worker Oct 09 23:04:42 np0005479288.novalocal systemd[1]: session-3.scope: Deactivated successfully. Oct 09 23:04:42 np0005479288.novalocal systemd[1]: session-3.scope: Consumed 1.835s CPU time. Oct 09 23:04:42 np0005479288.novalocal systemd-logind[793]: Session 3 logged out. Waiting for processes to exit. Oct 09 23:04:42 np0005479288.novalocal systemd-logind[793]: Removed session 3. Oct 09 23:04:42 np0005479288.novalocal python3[2042]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:42 np0005479288.novalocal python3[2066]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:42 np0005479288.novalocal python3[2090]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:43 np0005479288.novalocal python3[2114]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:43 np0005479288.novalocal python3[2138]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:43 np0005479288.novalocal python3[2162]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:44 np0005479288.novalocal python3[2187]: ansible-ansible.legacy.command Invoked with _raw_params=sudo -n true zuul_log_id=fa163ef9-e89a-53d2-7263-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 09 23:04:44 np0005479288.novalocal sudo[2188]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/true Oct 09 23:04:44 np0005479288.novalocal sudo[2188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:04:44 np0005479288.novalocal sudo[2188]: pam_unix(sudo:session): session closed for user root Oct 09 23:04:44 np0005479288.novalocal python3[2216]: ansible-file Invoked with path=/home/zuul-worker/.pydistutils.cfg state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:45 np0005479288.novalocal sudo[2292]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-elcswnubhyikwgrkulldxlrdxseqwdwx ; /usr/bin/python3' Oct 09 23:04:45 np0005479288.novalocal sudo[2292]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:04:45 np0005479288.novalocal python3[2294]: ansible-ansible.legacy.stat Invoked with path=/etc/pip.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 09 23:04:45 np0005479288.novalocal sudo[2292]: pam_unix(sudo:session): session closed for user root Oct 09 23:04:45 np0005479288.novalocal sudo[2365]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bctrwvujctsghvqoqjbtifnfhgumseqe ; /usr/bin/python3' Oct 09 23:04:45 np0005479288.novalocal sudo[2365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:04:46 np0005479288.novalocal python3[2367]: ansible-ansible.legacy.copy Invoked with dest=/etc/pip.conf group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760065485.293321-91-201480551477086/source follow=False _original_basename=pip.conf.j2 checksum=5b65c9094402b8db60a77928be1f816342638afe backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:46 np0005479288.novalocal sudo[2365]: pam_unix(sudo:session): session closed for user root Oct 09 23:04:46 np0005479288.novalocal sudo[2467]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ehufrrymztwekwwebwfxxffttgvwsscx ; /usr/bin/python3' Oct 09 23:04:46 np0005479288.novalocal sudo[2467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:04:46 np0005479288.novalocal python3[2469]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 09 23:04:46 np0005479288.novalocal sudo[2467]: pam_unix(sudo:session): session closed for user root Oct 09 23:04:47 np0005479288.novalocal sudo[2542]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fwjikobyrkznhcfatmcqhzxasjpbaqgh ; /usr/bin/python3' Oct 09 23:04:47 np0005479288.novalocal sudo[2542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:04:47 np0005479288.novalocal python3[2544]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760065486.4803681-103-149653796043433/source follow=False _original_basename=centos.repo.j2 checksum=0268eb1686bc9b047a2096dbaf287658b0d20a19 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:47 np0005479288.novalocal sudo[2542]: pam_unix(sudo:session): session closed for user root Oct 09 23:04:47 np0005479288.novalocal sudo[2644]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-eiwbkamlqzltjwzcvhblacxrivuqxbvu ; /usr/bin/python3' Oct 09 23:04:47 np0005479288.novalocal sudo[2644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:04:47 np0005479288.novalocal python3[2646]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos-addons.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 09 23:04:47 np0005479288.novalocal sudo[2644]: pam_unix(sudo:session): session closed for user root Oct 09 23:04:48 np0005479288.novalocal sudo[2719]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mvrioygjwgcnslknldnvsrfajrpspbjw ; /usr/bin/python3' Oct 09 23:04:48 np0005479288.novalocal sudo[2719]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:04:48 np0005479288.novalocal python3[2721]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos-addons.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760065487.5765371-103-209679132975784/source follow=False _original_basename=centos-addons.repo.j2 checksum=2917e612982cadeb3009a3bf37bf30cbcd7f2044 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:48 np0005479288.novalocal sudo[2719]: pam_unix(sudo:session): session closed for user root Oct 09 23:04:48 np0005479288.novalocal sudo[2769]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-tkuawtbqiinewdzurlstclhhijzflpsd ; /usr/bin/python3' Oct 09 23:04:48 np0005479288.novalocal sudo[2769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:04:48 np0005479288.novalocal python3[2771]: ansible-ini_file Invoked with path=/etc/dnf.conf section=main option=deltarpm value=0 mode=420 backup=False state=present exclusive=True no_extra_spaces=False ignore_spaces=False allow_no_value=False create=True follow=False unsafe_writes=False values=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:04:49 np0005479288.novalocal python3[2771]: ansible-ini_file [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Oct 09 23:04:49 np0005479288.novalocal sudo[2769]: pam_unix(sudo:session): session closed for user root Oct 09 23:04:49 np0005479288.novalocal sudo[2795]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nidqgwchtjsreyfhwvpvlzljvfgyidjn ; /usr/bin/python3' Oct 09 23:04:49 np0005479288.novalocal sudo[2795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:04:49 np0005479288.novalocal python3[2797]: ansible-ansible.legacy.command Invoked with _raw_params=dnf clean all zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 09 23:04:49 np0005479288.novalocal sudo[2795]: pam_unix(sudo:session): session closed for user root Oct 09 23:04:50 np0005479288.novalocal sudo[2823]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hmhdfaujnjxlqnnzdlhyexcinrvrswdn ; /usr/bin/python3' Oct 09 23:04:50 np0005479288.novalocal sudo[2823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:04:50 np0005479288.novalocal python3[2825]: ansible-ansible.legacy.command Invoked with _raw_params=dnf makecache -v zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 09 23:05:00 np0005479288.novalocal sudo[2823]: pam_unix(sudo:session): session closed for user root Oct 09 23:05:01 np0005479288.novalocal python3[2868]: ansible-file Invoked with path=/home/zuul-worker/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:05:02 np0005479288.novalocal python3[2893]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=PYTHON2=0 PYTHON3=1 # Not all platforms install a `pip` when installing python # specific pip packages. We first check if pip$VERSION is # available and if not fallback to checking if just `pip` # is present. if [ "$PYTHON2" -eq "1" ] ; then command -v pip2 || command -v pip || exit 1 python2 -m wheel --help || exit 1 fi if [ "$PYTHON3" -eq "1" ] ; then command -v pip3 || command -v pip || exit 1 python3 -m wheel --help || exit 1 fi _uses_shell=True zuul_log_id=fa163ef9-e89a-b413-68dc-000000000089-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Oct 09 23:05:02 np0005479288.novalocal sudo[2921]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-akewnhfctdyjggkesycbffaefjqisotp ; /usr/bin/python3' Oct 09 23:05:02 np0005479288.novalocal sudo[2921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:05:02 np0005479288.novalocal python3[2923]: ansible-ansible.legacy.dnf Invoked with name=['python3-pip', 'python3-setuptools', 'python3-wheel'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 09 23:05:04 np0005479288.novalocal systemd[1]: Starting PackageKit Daemon... Oct 09 23:05:04 np0005479288.novalocal PackageKit[2929]: daemon start Oct 09 23:05:04 np0005479288.novalocal systemd[1]: Starting Authorization Manager... Oct 09 23:05:04 np0005479288.novalocal polkitd[2933]: Started polkitd version 0.117 Oct 09 23:05:04 np0005479288.novalocal polkitd[2933]: Loading rules from directory /etc/polkit-1/rules.d Oct 09 23:05:04 np0005479288.novalocal polkitd[2933]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 09 23:05:04 np0005479288.novalocal polkitd[2933]: Finished loading, compiling and executing 3 rules Oct 09 23:05:04 np0005479288.novalocal systemd[1]: Started Authorization Manager. Oct 09 23:05:04 np0005479288.novalocal polkitd[2933]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 09 23:05:04 np0005479288.novalocal systemd[1]: Started PackageKit Daemon. Oct 09 23:05:04 np0005479288.novalocal sudo[2921]: pam_unix(sudo:session): session closed for user root Oct 09 23:05:05 np0005479288.novalocal python3[2973]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v python3 _uses_shell=True zuul_log_id=fa163ef9-e89a-b413-68dc-000000000093-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Oct 09 23:05:06 np0005479288.novalocal python3[3001]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v tox /home/zuul-worker/.local/tox/bin/tox || exit 1 _uses_shell=True zuul_log_id=fa163ef9-e89a-b413-68dc-000000000021-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Oct 09 23:05:07 np0005479288.novalocal python3[3029]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/bin/python3 -m venv /home/zuul-worker/.local/tox zuul_log_id=fa163ef9-e89a-b413-68dc-000000000024-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 09 23:05:08 np0005479288.novalocal irqbalance[791]: Cannot change IRQ 27 affinity: Operation not permitted Oct 09 23:05:08 np0005479288.novalocal irqbalance[791]: IRQ 27 affinity is now unmanaged Oct 09 23:05:10 np0005479288.novalocal python3[3061]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/pip install tox zuul_log_id=fa163ef9-e89a-b413-68dc-000000000025-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 09 23:05:13 np0005479288.novalocal python3[3091]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/tox --version zuul_log_id=fa163ef9-e89a-b413-68dc-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 09 23:05:14 np0005479288.novalocal sudo[3118]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cxjfcjmkezjyyqczneekvypunjnuoobq ; /usr/bin/python3' Oct 09 23:05:14 np0005479288.novalocal sudo[3118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:05:14 np0005479288.novalocal python3[3120]: ansible-file Invoked with state=link src=/home/zuul-worker/.local/tox/bin/tox dest=/usr/local/bin/tox path=/usr/local/bin/tox recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:05:14 np0005479288.novalocal sudo[3118]: pam_unix(sudo:session): session closed for user root Oct 09 23:05:14 np0005479288.novalocal python3[3145]: ansible-ansible.legacy.command Invoked with _raw_params=export WBASE="/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo"; mkdir -p $WBASE/playbooks/roles ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-common" $WBASE/playbooks/roles/common; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-logs" $WBASE/playbooks/roles/logs; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-kolla" $WBASE/playbooks/roles/kolla; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-packstack" $WBASE/playbooks/roles/packstack; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-puppet-openstack" $WBASE/playbooks/roles/puppet-openstack; # noqa 204 ln -s "/home/zuul-worker/src/github.com/openstack-k8s-operators/ci-framework/roles/build_containers" $WBASE/playbooks/roles/build_containers; # noqa 204 _uses_shell=True zuul_log_id=fa163ef9-e89a-b413-68dc-00000000003f-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 09 23:05:15 np0005479288.novalocal sudo[3178]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kjotvunsmkuviaisgfraznoupdeageoq ; /usr/bin/python3' Oct 09 23:05:15 np0005479288.novalocal sudo[3178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:05:15 np0005479288.novalocal python3[3180]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:05:15 np0005479288.novalocal sudo[3178]: pam_unix(sudo:session): session closed for user root Oct 09 23:05:15 np0005479288.novalocal sudo[3256]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zulcvkevssbwlcbqnwsvoakbreljxsby ; /usr/bin/python3' Oct 09 23:05:15 np0005479288.novalocal sudo[3256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:05:15 np0005479288.novalocal python3[3258]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 09 23:05:15 np0005479288.novalocal sudo[3256]: pam_unix(sudo:session): session closed for user root Oct 09 23:05:16 np0005479288.novalocal sudo[3329]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-keliwewcdymygibfotvwzthvlnhvuppr ; /usr/bin/python3' Oct 09 23:05:16 np0005479288.novalocal sudo[3329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:05:16 np0005479288.novalocal python3[3331]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760065515.2632942-81-67621082614098/source follow=False _original_basename=mirror_info.sh.j2 checksum=ea5d641d750b2605d80a15d4106dfb6027081c92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 09 23:05:16 np0005479288.novalocal sudo[3329]: pam_unix(sudo:session): session closed for user root Oct 09 23:05:16 np0005479288.novalocal sudo[3380]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bxzrvwzwrodvotzglrwvlnwtuvkpdxhr ; /usr/bin/python3' Oct 09 23:05:16 np0005479288.novalocal sudo[3380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:05:16 np0005479288.novalocal python3[3382]: ansible-ansible.legacy.command Invoked with _raw_params=dnf install -y python3-pip rpmlint python3-rpm _uses_shell=True zuul_log_id=fa163ef9-e89a-b413-68dc-000000000052-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 09 23:05:17 np0005479288.novalocal sudo[3380]: pam_unix(sudo:session): session closed for user root Oct 09 23:05:17 np0005479288.novalocal python3[3409]: ansible-pip Invoked with name=['rdopkg'] virtualenv=/home/zuul-worker/rdopkg-venv virtualenv_command=/usr/bin/python3 -m venv virtualenv_site_packages=True state=present editable=False version=None requirements=None virtualenv_python=None extra_args=None chdir=None executable=None umask=None Oct 09 23:05:24 np0005479288.novalocal python3[3442]: ansible-ansible.legacy.command Invoked with _raw_params=set -e -x source '/home/zuul-worker/rdopkg-venv/bin/activate' MASTER="$(rdopkg info | grep -e "in development phase" | awk '{print $1}')" RELEASE="dalmatian" DIST_VER="9" # Find out if it is puppet or packstack and scenario if [[ "weirdo-dalmatian-promote-puppet-scenario005-centos-stream-9" == *"puppet"* ]]; then project="puppet-openstack" else project="packstack" fi scenario="scenario005" # Set version related variables if [ $RELEASE = $MASTER ]; then VERSION="master" O_RELEASE="master" else VERSION="$(rdopkg release -r "$RELEASE" | grep upstream_branch | awk '{print $2}')" O_RELEASE="$RELEASE" fi if [[ "promotion" == "promotion" ]]; then enable_puppet_modules_rpm=false dlrn_repo="puppet-ci-testing" else enable_puppet_modules_rpm=true dlrn_repo="puppet-passed-ci" fi # Prepare Ansible inventory to use localhost pushd /home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo cat <hosts localhost ansible_connection=local ansible_python_interpreter=/usr/bin/python3 [openstack_nodes] localhost log_destination=/var/log/weirdo EOF REPOS_URL="http://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/${dlrn_repo}/delorean.repo,https://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/delorean-deps.repo" # noqa 204 tox -e ansible-playbook -- -vv -b -i hosts playbooks/$project-$scenario.yml \ -e version=$VERSION \ -e openstack_release=$O_RELEASE \ -e selinux_enforcing="false" \ -e tempest_from_source=false \ -e enable_puppet_modules_rpm=${enable_puppet_modules_rpm} \ -e trunk_repositories=$REPOS_URL \ _uses_shell=True zuul_log_id=fa163ef9-e89a-b413-68dc-000000000005-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 09 23:06:26 np0005479288.novalocal chronyd[805]: Selected source 192.95.27.155 (2.centos.pool.ntp.org) Oct 09 23:06:36 np0005479288.novalocal sudo[3730]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xjoudctbjyryxrflulqyzgzbjjjzdubp ; /usr/bin/python3' Oct 09 23:06:36 np0005479288.novalocal sudo[3730]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:36 np0005479288.novalocal python3[3732]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=* fact_path=/etc/ansible/facts.d Oct 09 23:06:36 np0005479288.novalocal sudo[3730]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:37 np0005479288.novalocal sudo[3770]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vbnexchuomidipxztreyvlteyyxmtadq ; /usr/bin/python3' Oct 09 23:06:37 np0005479288.novalocal sudo[3770]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:37 np0005479288.novalocal python3[3772]: ansible-command Invoked with _raw_params=sudo dnf config-manager --enable crb _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 09 23:06:37 np0005479288.novalocal python3[3772]: ansible-command [WARNING] Consider using 'become', 'become_method', and 'become_user' rather than running sudo Oct 09 23:06:37 np0005479288.novalocal sudo[3773]: root : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/dnf config-manager --enable crb Oct 09 23:06:37 np0005479288.novalocal sudo[3773]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:06:37 np0005479288.novalocal sudo[3773]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:37 np0005479288.novalocal sudo[3770]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:37 np0005479288.novalocal sudo[3783]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wrfagprypvzwacvlpxdpgfzmetefvkuh ; /usr/bin/python3' Oct 09 23:06:37 np0005479288.novalocal sudo[3783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:38 np0005479288.novalocal python3[3785]: ansible-systemd Invoked with name=firewalld state=stopped daemon_reload=False daemon_reexec=False no_block=False enabled=None force=None masked=None user=None scope=None Oct 09 23:06:38 np0005479288.novalocal sudo[3783]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:38 np0005479288.novalocal sudo[3794]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-tuwznycmwytmobnwyehybemduvyxeswu ; /usr/bin/python3' Oct 09 23:06:38 np0005479288.novalocal sudo[3794]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:38 np0005479288.novalocal python3[3796]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 09 23:06:39 np0005479288.novalocal sudo[3794]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:39 np0005479288.novalocal sudo[3812]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nonueelonoofhdwhvhucuatanxjaksej ; /usr/bin/python3' Oct 09 23:06:39 np0005479288.novalocal sudo[3812]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:39 np0005479288.novalocal python3[3814]: ansible-dnf Invoked with name=['tuned', 'subscription-manager'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 09 23:06:42 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:06:42 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:06:42 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:06:42 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:06:42 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:06:42 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:06:43 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:06:43 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:06:43 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:06:43 np0005479288.novalocal systemd-rc-local-generator[3886]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:06:43 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:06:46 np0005479288.novalocal sudo[3812]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:46 np0005479288.novalocal sudo[5648]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ugaglsvhuccjwdqtreksmsyjqrufwefq ; /usr/bin/python3' Oct 09 23:06:46 np0005479288.novalocal sudo[5648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:46 np0005479288.novalocal python3[5681]: ansible-systemd Invoked with name=tuned enabled=True state=started daemon_reload=False daemon_reexec=False no_block=False force=None masked=None user=None scope=None Oct 09 23:06:46 np0005479288.novalocal systemd[1]: Starting Dynamic System Tuning Daemon... Oct 09 23:06:47 np0005479288.novalocal systemd[1]: Started Dynamic System Tuning Daemon. Oct 09 23:06:47 np0005479288.novalocal sudo[5648]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:47 np0005479288.novalocal sudo[6770]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mzghutsrargspmgtgvlsjdrictpibhtc ; /usr/bin/python3' Oct 09 23:06:47 np0005479288.novalocal sudo[6770]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:47 np0005479288.novalocal python3[6788]: ansible-command Invoked with _raw_params=tuned-adm active warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 09 23:06:47 np0005479288.novalocal sudo[6770]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:47 np0005479288.novalocal sudo[7130]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-izpssfcolrqyupmelwqdrparizohbgnn ; /usr/bin/python3' Oct 09 23:06:47 np0005479288.novalocal sudo[7130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:47 np0005479288.novalocal python3[7144]: ansible-command Invoked with _raw_params=tuned-adm profile throughput-performance warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 09 23:06:48 np0005479288.novalocal sudo[7130]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:49 np0005479288.novalocal sudo[8107]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bokftdqaqsjksffsxjyinnuqetxtgmzk ; /usr/bin/python3' Oct 09 23:06:49 np0005479288.novalocal sudo[8107]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:49 np0005479288.novalocal python3[8113]: ansible-file Invoked with path=/var/log/weirdo state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Oct 09 23:06:49 np0005479288.novalocal sudo[8107]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:49 np0005479288.novalocal sudo[8259]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rnaqvhavekkjsowhsiteniajuprbolpe ; /usr/bin/python3' Oct 09 23:06:49 np0005479288.novalocal sudo[8259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:49 np0005479288.novalocal python3[8278]: ansible-file Invoked with path=/var/log/weirdo-project state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Oct 09 23:06:49 np0005479288.novalocal sudo[8259]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:50 np0005479288.novalocal sudo[8737]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vizlksqvmewjovqmgvyckpapuuvkuhfg ; /usr/bin/python3' Oct 09 23:06:50 np0005479288.novalocal sudo[8737]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:50 np0005479288.novalocal python3[8751]: ansible-get_url Invoked with url=http://trunk.rdoproject.org/centos9-dalmatian/puppet-ci-testing/delorean.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Oct 09 23:06:50 np0005479288.novalocal sudo[8737]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:50 np0005479288.novalocal sudo[8962]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wyykmvnufdunkqxdqvhdseehueiqfbch ; /usr/bin/python3' Oct 09 23:06:50 np0005479288.novalocal sudo[8962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:50 np0005479288.novalocal python3[8984]: ansible-get_url Invoked with url=https://trunk.rdoproject.org/centos9-dalmatian/delorean-deps.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Oct 09 23:06:50 np0005479288.novalocal sudo[8962]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:50 np0005479288.novalocal sudo[9188]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zenzwtaycnaesdvcccjzcremosrwfdks ; /usr/bin/python3' Oct 09 23:06:50 np0005479288.novalocal sudo[9188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:50 np0005479288.novalocal python3[9208]: ansible-command Invoked with _raw_params=if [ -f /etc/ci/mirror_info.sh ]; then source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|${NODEPOOL_RDO_PROXY}|g" /etc/yum.repos.d/*.repo # For CentOS8 sed -i -e "s|http://mirror.centos.org/centos|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo # For CentOS9 sed -i -e "s|http://mirror.stream.centos.org|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo fi _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 09 23:06:51 np0005479288.novalocal sudo[9188]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:51 np0005479288.novalocal sudo[9568]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lklvrysygsmuwfgglxmajguctjkqsrqh ; /usr/bin/python3' Oct 09 23:06:51 np0005479288.novalocal sudo[9568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:51 np0005479288.novalocal python3[9585]: ansible-command Invoked with _raw_params=repoquery --disablerepo='*' --enablerepo='delorean*' -a --qf '%{sourcerpm}'|sort -u|sed 's/.src.rpm//g' >/var/log/weirdo/rdo-trunk-deps-start.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 09 23:06:54 np0005479288.novalocal sudo[9568]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:54 np0005479288.novalocal sudo[10535]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rxsfvewvrkrbmjtrtcxfpuumcoemxndn ; /usr/bin/python3' Oct 09 23:06:54 np0005479288.novalocal sudo[10535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:54 np0005479288.novalocal python3[10546]: ansible-command Invoked with _raw_params=dnf clean all _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 09 23:06:54 np0005479288.novalocal python3[10546]: ansible-command [WARNING] Consider using the dnf module rather than running 'dnf'. If you need to use command because dnf is insufficient you can add 'warn: false' to this command task or set 'command_warnings=False' in ansible.cfg to get rid of this message. Oct 09 23:06:54 np0005479288.novalocal sudo[10535]: pam_unix(sudo:session): session closed for user root Oct 09 23:06:54 np0005479288.novalocal sudo[10761]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fbdhjvtzwbbmpqokljcwizffmwhrzlfs ; /usr/bin/python3' Oct 09 23:06:54 np0005479288.novalocal sudo[10761]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:06:55 np0005479288.novalocal python3[10773]: ansible-dnf Invoked with name=['*'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 09 23:06:59 np0005479288.novalocal systemd[1058]: Starting Mark boot as successful... Oct 09 23:06:59 np0005479288.novalocal systemd[1058]: Finished Mark boot as successful. Oct 09 23:07:22 np0005479288.novalocal sudo[10761]: pam_unix(sudo:session): session closed for user root Oct 09 23:07:22 np0005479288.novalocal sudo[19043]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wxplsdpoomudrgixntnqosdzhwnkvklj ; /usr/bin/python3' Oct 09 23:07:22 np0005479288.novalocal sudo[19043]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:07:22 np0005479288.novalocal python3[19053]: ansible-dnf Invoked with name=['gettext', 'diffstat', 'doxygen', 'patch', 'patchutils', 'subversion', 'systemtap', 'git', 'wget', 'python3-libselinux', 'python3-setuptools', 'rubygem-rexml'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 09 23:07:39 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:07:39 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:07:40 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:07:40 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:07:40 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Consumed 1min 9.068s CPU time. Oct 09 23:07:40 np0005479288.novalocal systemd[1]: run-r82499e1f61fb4f4bbc74c9148bc18b28.service: Deactivated successfully. Oct 09 23:08:31 np0005479288.novalocal groupadd[41490]: group added to /etc/group: name=rtkit, GID=172 Oct 09 23:08:31 np0005479288.novalocal groupadd[41490]: group added to /etc/gshadow: name=rtkit Oct 09 23:08:31 np0005479288.novalocal groupadd[41490]: new group: name=rtkit, GID=172 Oct 09 23:08:31 np0005479288.novalocal useradd[41498]: new user: name=rtkit, UID=172, GID=172, home=/, shell=/sbin/nologin, from=none Oct 09 23:08:32 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:08:32 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:08:32 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:08:32 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:08:32 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:08:43 np0005479288.novalocal kernel: SELinux: Converting 432 SID table entries... Oct 09 23:08:43 np0005479288.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 09 23:08:43 np0005479288.novalocal kernel: SELinux: policy capability open_perms=1 Oct 09 23:08:43 np0005479288.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 09 23:08:43 np0005479288.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 09 23:08:43 np0005479288.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 09 23:08:43 np0005479288.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 09 23:08:43 np0005479288.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 09 23:08:51 np0005479288.novalocal groupadd[41563]: group added to /etc/group: name=pipewire, GID=993 Oct 09 23:08:51 np0005479288.novalocal groupadd[41563]: group added to /etc/gshadow: name=pipewire Oct 09 23:08:51 np0005479288.novalocal groupadd[41563]: new group: name=pipewire, GID=993 Oct 09 23:08:51 np0005479288.novalocal useradd[41570]: new user: name=pipewire, UID=993, GID=993, home=/run/pipewire, shell=/usr/sbin/nologin, from=none Oct 09 23:08:51 np0005479288.novalocal groupadd[41585]: group added to /etc/group: name=geoclue, GID=992 Oct 09 23:08:51 np0005479288.novalocal groupadd[41585]: group added to /etc/gshadow: name=geoclue Oct 09 23:08:51 np0005479288.novalocal groupadd[41585]: new group: name=geoclue, GID=992 Oct 09 23:08:51 np0005479288.novalocal useradd[41592]: new user: name=geoclue, UID=992, GID=992, home=/var/lib/geoclue, shell=/sbin/nologin, from=none Oct 09 23:08:52 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:08:52 np0005479288.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=2 res=1 Oct 09 23:08:52 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:08:52 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Reloading rules Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Collecting garbage unconditionally... Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Loading rules from directory /etc/polkit-1/rules.d Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Finished loading, compiling and executing 4 rules Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Reloading rules Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Collecting garbage unconditionally... Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Loading rules from directory /etc/polkit-1/rules.d Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Finished loading, compiling and executing 4 rules Oct 09 23:08:52 np0005479288.novalocal groupadd[41604]: group added to /etc/group: name=flatpak, GID=991 Oct 09 23:08:52 np0005479288.novalocal groupadd[41604]: group added to /etc/gshadow: name=flatpak Oct 09 23:08:52 np0005479288.novalocal groupadd[41604]: new group: name=flatpak, GID=991 Oct 09 23:08:52 np0005479288.novalocal useradd[41611]: new user: name=flatpak, UID=991, GID=991, home=/, shell=/usr/sbin/nologin, from=none Oct 09 23:08:52 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:08:52 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:08:52 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Reloading rules Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Collecting garbage unconditionally... Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Loading rules from directory /etc/polkit-1/rules.d Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Finished loading, compiling and executing 5 rules Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Reloading rules Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Collecting garbage unconditionally... Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Loading rules from directory /etc/polkit-1/rules.d Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 09 23:08:52 np0005479288.novalocal polkitd[2933]: Finished loading, compiling and executing 5 rules Oct 09 23:08:53 np0005479288.novalocal systemd[1]: Stopping OpenSSH server daemon... Oct 09 23:08:53 np0005479288.novalocal sshd[1006]: Received signal 15; terminating. Oct 09 23:08:53 np0005479288.novalocal systemd[1]: sshd.service: Deactivated successfully. Oct 09 23:08:53 np0005479288.novalocal systemd[1]: Stopped OpenSSH server daemon. Oct 09 23:08:53 np0005479288.novalocal systemd[1]: Stopped target sshd-keygen.target. Oct 09 23:08:53 np0005479288.novalocal systemd[1]: Stopping sshd-keygen.target... Oct 09 23:08:53 np0005479288.novalocal systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 09 23:08:53 np0005479288.novalocal systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 09 23:08:53 np0005479288.novalocal systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 09 23:08:53 np0005479288.novalocal systemd[1]: Reached target sshd-keygen.target. Oct 09 23:08:53 np0005479288.novalocal systemd[1]: Starting OpenSSH server daemon... Oct 09 23:08:53 np0005479288.novalocal sshd[41652]: Server listening on 0.0.0.0 port 22. Oct 09 23:08:53 np0005479288.novalocal sshd[41652]: Server listening on :: port 22. Oct 09 23:08:53 np0005479288.novalocal systemd[1]: Started OpenSSH server daemon. Oct 09 23:08:54 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:08:54 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:08:55 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:08:55 np0005479288.novalocal systemd-rc-local-generator[41745]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:08:55 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:08:58 np0005479288.novalocal sudo[19043]: pam_unix(sudo:session): session closed for user root Oct 09 23:08:58 np0005479288.novalocal sudo[44638]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cdduzmarotkuzjikrzgwyhnzlesbzqwn ; /usr/bin/python3' Oct 09 23:08:58 np0005479288.novalocal sudo[44638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:08:58 np0005479288.novalocal python3[44664]: ansible-dnf Invoked with name=['net-tools', 'lsof', 'sysstat', 'psmisc', 'dnf-utils'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 09 23:09:03 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:09:03 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:09:03 np0005479288.novalocal systemd-rc-local-generator[48770]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:09:03 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:09:04 np0005479288.novalocal sudo[44638]: pam_unix(sudo:session): session closed for user root Oct 09 23:09:04 np0005479288.novalocal sudo[49446]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hmnhifenzeyikcgrakzlpolfbiujnabf ; /usr/bin/python3' Oct 09 23:09:04 np0005479288.novalocal sudo[49446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:09:04 np0005479288.novalocal python3[49467]: ansible-replace Invoked with dest=/usr/lib/systemd/system/sysstat-collect.timer regexp=10 replace=1 path=/usr/lib/systemd/system/sysstat-collect.timer backup=False encoding=utf-8 follow=False unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Oct 09 23:09:04 np0005479288.novalocal sudo[49446]: pam_unix(sudo:session): session closed for user root Oct 09 23:09:04 np0005479288.novalocal sudo[49615]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cokurrtniwqybhvwmgawleekhtjxkkyq ; /usr/bin/python3' Oct 09 23:09:04 np0005479288.novalocal sudo[49615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:09:04 np0005479288.novalocal python3[49637]: ansible-systemd Invoked with name=sysstat enabled=True daemon_reload=True state=started daemon_reexec=False no_block=False force=None masked=None user=None scope=None Oct 09 23:09:04 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:09:05 np0005479288.novalocal systemd-rc-local-generator[49837]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:09:05 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:09:05 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:09:05 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Consumed 12.965s CPU time. Oct 09 23:09:05 np0005479288.novalocal systemd[1]: run-rfb3cb32f4d394acea68cf90f00740684.service: Deactivated successfully. Oct 09 23:09:05 np0005479288.novalocal systemd[1]: run-rd2bef955b00e40a4b8dad560a2cb2eba.service: Deactivated successfully. Oct 09 23:09:05 np0005479288.novalocal systemd[1]: Started Run system activity accounting tool every 1 minutes. Oct 09 23:09:05 np0005479288.novalocal systemd[1]: Started Generate summary of yesterday's process accounting. Oct 09 23:09:05 np0005479288.novalocal systemd[1]: Starting Resets System Activity Logs... Oct 09 23:09:05 np0005479288.novalocal systemd[1]: Finished Resets System Activity Logs. Oct 09 23:09:05 np0005479288.novalocal sudo[49615]: pam_unix(sudo:session): session closed for user root Oct 09 23:09:05 np0005479288.novalocal sudo[49882]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hunqsjfspynljijmeicxjbpkoozqbcwr ; /usr/bin/python3' Oct 09 23:09:05 np0005479288.novalocal sudo[49882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:09:05 np0005479288.novalocal python3[49884]: ansible-lineinfile Invoked with dest=/etc/hosts line=127.0.0.1 np0005479288 np0005479288.novalocal state=present path=/etc/hosts backrefs=False create=False backup=False firstmatch=False follow=False unsafe_writes=False regexp=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Oct 09 23:09:05 np0005479288.novalocal sudo[49882]: pam_unix(sudo:session): session closed for user root Oct 09 23:09:05 np0005479288.novalocal sudo[49891]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mqexyglholvxtkpqkfmuwmvyyruoydsi ; /usr/bin/python3' Oct 09 23:09:05 np0005479288.novalocal sudo[49891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:09:06 np0005479288.novalocal python3[49893]: ansible-dnf Invoked with name=['libxml2-devel', 'libxslt-devel', 'ruby-devel', 'rubygems', 'qemu-img'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 09 23:09:07 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:09:07 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:09:08 np0005479288.novalocal sudo[49891]: pam_unix(sudo:session): session closed for user root Oct 09 23:09:08 np0005479288.novalocal sudo[50253]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ppqokospdexclhulokdxraqeqbzovspy ; /usr/bin/python3' Oct 09 23:09:08 np0005479288.novalocal sudo[50253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:09:08 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:09:08 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:09:08 np0005479288.novalocal python3[50255]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Oct 09 23:09:08 np0005479288.novalocal python3[50255]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Oct 09 23:09:08 np0005479288.novalocal sudo[50253]: pam_unix(sudo:session): session closed for user root Oct 09 23:09:08 np0005479288.novalocal systemd[1]: run-rcb999cc49a644dc6802022b9d33fad5a.service: Deactivated successfully. Oct 09 23:09:08 np0005479288.novalocal sudo[50266]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dpyplmzmqpfwajyfvfqntqhthaupxmqp ; /usr/bin/python3' Oct 09 23:09:08 np0005479288.novalocal sudo[50266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:09:09 np0005479288.novalocal python3[50268]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Oct 09 23:09:09 np0005479288.novalocal python3[50268]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Oct 09 23:09:09 np0005479288.novalocal sudo[50266]: pam_unix(sudo:session): session closed for user root Oct 09 23:09:09 np0005479288.novalocal sudo[50278]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ahctinylalphjgpycuhpynnovspgksqp ; /usr/bin/python3' Oct 09 23:09:09 np0005479288.novalocal sudo[50278]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:09:09 np0005479288.novalocal python3[50280]: ansible-git Invoked with repo=https://review.opendev.org/openstack/puppet-openstack-integration dest=/tmp/puppet-openstack version=stable/2024.2 force=True remote=origin clone=True update=True verify_commit=False gpg_whitelist=[] accept_hostkey=False bare=False recursive=True track_submodules=False refspec=None reference=None depth=None key_file=None ssh_opts=None executable=None umask=None archive=None separate_git_dir=None Oct 09 23:09:10 np0005479288.novalocal sudo[50278]: pam_unix(sudo:session): session closed for user root Oct 09 23:09:10 np0005479288.novalocal sudo[50311]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pmquvbcxievmuvinmqrpvpidnkzabnbp ; /usr/bin/python3' Oct 09 23:09:10 np0005479288.novalocal sudo[50311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:09:10 np0005479288.novalocal python3[50313]: ansible-file Invoked with path=/tmp/puppet-openstack/.bundled_gems state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Oct 09 23:09:10 np0005479288.novalocal sudo[50311]: pam_unix(sudo:session): session closed for user root Oct 09 23:09:11 np0005479288.novalocal sudo[50335]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mahkqlyhkdsqaahjpaedikqzcampbryb ; /usr/bin/python3' Oct 09 23:09:11 np0005479288.novalocal sudo[50335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:09:11 np0005479288.novalocal python3[50337]: ansible-file Invoked with path=/usr/zuul-env/bin/zuul-cloner state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Oct 09 23:09:11 np0005479288.novalocal sudo[50335]: pam_unix(sudo:session): session closed for user root Oct 09 23:09:11 np0005479288.novalocal sudo[50344]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-horiqgdgsdeoefcdiybxynyqzojisaxj ; MANAGE_REPOS=false SCENARIO=scenario005 GEM_HOME=/tmp/puppet-openstack/.bundled_gems TEMPEST_VERSION=\'\' WORKSPACE=/var/log/weirdo-project TEMPEST_FROM_SOURCE=false PUPPETFILE_DIR=/etc/puppet/modules PUPPET_PKG=puppet PUPPET_ARGS=--modulepath=/usr/share/openstack-puppet/modules:/etc/puppet/modules SWAP_SIZE_GB=8 /usr/bin/python3' Oct 09 23:09:11 np0005479288.novalocal sudo[50344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:09:11 np0005479288.novalocal python3[50346]: ansible-command Invoked with chdir=/tmp/puppet-openstack _raw_params=./run_tests.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None creates=None removes=None stdin=None Oct 09 23:09:59 np0005479288.novalocal systemd[1058]: Created slice User Background Tasks Slice. Oct 09 23:09:59 np0005479288.novalocal systemd[1058]: Starting Cleanup of User's Temporary Files and Directories... Oct 09 23:10:00 np0005479288.novalocal systemd[1058]: Finished Cleanup of User's Temporary Files and Directories. Oct 09 23:10:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:10:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:10:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:10:15 np0005479288.novalocal kernel: Adding 8388604k swap on /swapfile. Priority:-2 extents:10 across:13652292k Oct 09 23:10:19 np0005479288.novalocal groupadd[50409]: group added to /etc/group: name=puppet, GID=52 Oct 09 23:10:19 np0005479288.novalocal groupadd[50409]: group added to /etc/gshadow: name=puppet Oct 09 23:10:19 np0005479288.novalocal groupadd[50409]: new group: name=puppet, GID=52 Oct 09 23:10:19 np0005479288.novalocal useradd[50416]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Oct 09 23:10:20 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:10:20 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:10:20 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:10:20 np0005479288.novalocal systemd-rc-local-generator[50455]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:10:20 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:10:21 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:10:21 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:10:21 np0005479288.novalocal systemd[1]: run-rba09ccfd560d49d1bbb92648c8fa3406.service: Deactivated successfully. Oct 09 23:10:44 np0005479288.novalocal kernel: SELinux: Converting 464 SID table entries... Oct 09 23:10:44 np0005479288.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 09 23:10:44 np0005479288.novalocal kernel: SELinux: policy capability open_perms=1 Oct 09 23:10:44 np0005479288.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 09 23:10:44 np0005479288.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 09 23:10:44 np0005479288.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 09 23:10:44 np0005479288.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 09 23:10:44 np0005479288.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 09 23:10:46 np0005479288.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=3 res=1 Oct 09 23:10:46 np0005479288.novalocal systemd[1]: Starting PCP Reboot Initialization Helper Service... Oct 09 23:10:46 np0005479288.novalocal systemd[1]: Finished PCP Reboot Initialization Helper Service. Oct 09 23:10:46 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:10:46 np0005479288.novalocal systemd-rc-local-generator[51282]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:10:54 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:10:54 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:10:56 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:10:56 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:10:57 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:10:57 np0005479288.novalocal systemd-rc-local-generator[51541]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:10:57 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:11:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:11:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:11:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:11:02 np0005479288.novalocal dbus-broker-launch[778]: avc: op=setenforce lsm=selinux enforcing=0 res=1 Oct 09 23:11:02 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:11:02 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:11:02 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.660s CPU time. Oct 09 23:11:02 np0005479288.novalocal systemd[1]: run-r414eb5e78dcb4ff399f1be461e4e7d1d.service: Deactivated successfully. Oct 09 23:12:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:12:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:12:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:12:05 np0005479288.novalocal setsebool[57436]: The virt_use_nfs policy boolean was changed to 1 by root Oct 09 23:12:05 np0005479288.novalocal setsebool[57436]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Oct 09 23:12:15 np0005479288.novalocal kernel: SELinux: Converting 500 SID table entries... Oct 09 23:12:15 np0005479288.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 09 23:12:15 np0005479288.novalocal kernel: SELinux: policy capability open_perms=1 Oct 09 23:12:15 np0005479288.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 09 23:12:15 np0005479288.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 09 23:12:15 np0005479288.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 09 23:12:15 np0005479288.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 09 23:12:15 np0005479288.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 09 23:13:19 np0005479288.novalocal kernel: SELinux: Converting 2731 SID table entries... Oct 09 23:13:19 np0005479288.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=6 res=1 Oct 09 23:13:19 np0005479288.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 09 23:13:19 np0005479288.novalocal kernel: SELinux: policy capability open_perms=1 Oct 09 23:13:19 np0005479288.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 09 23:13:19 np0005479288.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 09 23:13:19 np0005479288.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 09 23:13:19 np0005479288.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 09 23:13:19 np0005479288.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 09 23:13:19 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:13:19 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:13:19 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:13:55 np0005479288.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=7 res=1 Oct 09 23:13:55 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:13:55 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:13:56 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:13:56 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:13:56 np0005479288.novalocal systemd[1]: run-r0070e182e8b64851a1cbbeea637d12e1.service: Deactivated successfully. Oct 09 23:14:08 np0005479288.novalocal kernel: SELinux: Converting 2731 SID table entries... Oct 09 23:14:08 np0005479288.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 09 23:14:08 np0005479288.novalocal kernel: SELinux: policy capability open_perms=1 Oct 09 23:14:08 np0005479288.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 09 23:14:08 np0005479288.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 09 23:14:08 np0005479288.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 09 23:14:08 np0005479288.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 09 23:14:08 np0005479288.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 09 23:14:08 np0005479288.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=8 res=1 Oct 09 23:14:08 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:14:08 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:14:08 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:14:08 np0005479288.novalocal groupadd[58500]: group added to /etc/group: name=memcached, GID=989 Oct 09 23:14:08 np0005479288.novalocal groupadd[58500]: group added to /etc/gshadow: name=memcached Oct 09 23:14:08 np0005479288.novalocal groupadd[58500]: new group: name=memcached, GID=989 Oct 09 23:14:08 np0005479288.novalocal useradd[58507]: new user: name=memcached, UID=989, GID=989, home=/, shell=/sbin/nologin, from=none Oct 09 23:14:09 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:14:09 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:14:09 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:14:09 np0005479288.novalocal systemd-rc-local-generator[58941]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:14:09 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:14:10 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:14:10 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:14:10 np0005479288.novalocal systemd[1]: run-r0fd1c0c6ddb946cf8fbc113178cf6878.service: Deactivated successfully. Oct 09 23:14:10 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:14:10 np0005479288.novalocal systemd-rc-local-generator[59109]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:14:10 np0005479288.novalocal systemd[1]: Started memcached daemon. Oct 09 23:14:11 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:14:11 np0005479288.novalocal systemd-rc-local-generator[59156]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:14:11 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:14:11 np0005479288.novalocal systemd-rc-local-generator[59183]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:14:11 np0005479288.novalocal systemd[1]: Starting dnf makecache... Oct 09 23:14:11 np0005479288.novalocal dnf[59194]: Updating Subscription Management repositories. Oct 09 23:14:11 np0005479288.novalocal dnf[59194]: Unable to read consumer identity Oct 09 23:14:11 np0005479288.novalocal dnf[59194]: This system is not registered with an entitlement server. You can use subscription-manager to register. Oct 09 23:14:11 np0005479288.novalocal dnf[59194]: Failed determining last makecache time. Oct 09 23:14:11 np0005479288.novalocal dnf[59194]: delorean-ansible-role-thales-hsm-0661a3a0a0e79e 106 kB/s | 3.0 kB 00:00 Oct 09 23:14:11 np0005479288.novalocal dnf[59194]: delorean-openstack-ironic-e9ee094fc3d37cf273bd6 187 kB/s | 3.0 kB 00:00 Oct 09 23:14:11 np0005479288.novalocal dnf[59194]: delorean-openstack-cinder-e96dcc4e9744833ccea26 226 kB/s | 3.0 kB 00:00 Oct 09 23:14:11 np0005479288.novalocal dnf[59194]: delorean-python-openstackclient-f42ade4305d9745 209 kB/s | 3.0 kB 00:00 Oct 09 23:14:11 np0005479288.novalocal dnf[59194]: delorean-python-observabilityclient-2f31846d73c 167 kB/s | 3.0 kB 00:00 Oct 09 23:14:11 np0005479288.novalocal dnf[59194]: delorean-openstack-selinux-f19cf2529160f9bf6e83 201 kB/s | 3.0 kB 00:00 Oct 09 23:14:11 np0005479288.novalocal dnf[59194]: delorean-openstack-nova-40cfbd646bf6d1e1a6789d9 329 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: delorean-openstack-designate-5bfc35864c28a97ded 175 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: delorean-openstack-glance-097f38158189efc5c7d52 319 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: delorean-openstack-keystone-daaf698ba6d39872901 192 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: delorean-openstack-manila-1dff1a22a96a0877d97d3 171 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: delorean-openstack-neutron-2ce5e3b27734931cc60c 161 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: delorean-openstack-octavia-ccafae01828bef0d6f66 153 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: delorean-openstack-watcher-456f42e1b9d9abf0f620 176 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: delorean-python-tcib-856f39827a406fb012556fd740 176 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: delorean-puppet-ceph-91ba84bc002c318a7f961d084e 187 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: delorean-openstack-swift-9439a6257b1acce192d9a6 235 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: delorean-python-tempestconf-8515371b7cceebd4282 195 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: delorean-python-django-horizon-f83e6f86cbdd0bd1 176 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: CentOS Stream 9 - BaseOS 1.1 MB/s | 3.9 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: CentOS Stream 9 - AppStream 1.1 MB/s | 4.4 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: CentOS Stream 9 - CRB 1.2 MB/s | 4.3 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: CentOS Stream 9 - Extras packages 776 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: dlrn-dalmatian-testing 246 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: dlrn-dalmatian-build-deps 171 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: centos9-rabbitmq 900 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: centos9-storage 1.0 MB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: centos9-opstools 932 kB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: NFV SIG OpenvSwitch 1.0 MB/s | 3.0 kB 00:00 Oct 09 23:14:12 np0005479288.novalocal dnf[59194]: Extra Packages for Enterprise Linux 9 - x86_64 200 kB/s | 31 kB 00:00 Oct 09 23:14:13 np0005479288.novalocal dnf[59194]: Extra Packages for Enterprise Linux 9 - x86_64 33 MB/s | 20 MB 00:00 Oct 09 23:14:21 np0005479288.novalocal dnf[59194]: Metadata cache created. Oct 09 23:14:21 np0005479288.novalocal systemd[1]: dnf-makecache.service: Deactivated successfully. Oct 09 23:14:21 np0005479288.novalocal systemd[1]: Finished dnf makecache. Oct 09 23:14:21 np0005479288.novalocal systemd[1]: dnf-makecache.service: Consumed 9.068s CPU time. Oct 09 23:14:23 np0005479288.novalocal groupadd[59239]: group added to /etc/group: name=epmd, GID=988 Oct 09 23:14:23 np0005479288.novalocal groupadd[59239]: group added to /etc/gshadow: name=epmd Oct 09 23:14:23 np0005479288.novalocal groupadd[59239]: new group: name=epmd, GID=988 Oct 09 23:14:23 np0005479288.novalocal useradd[59246]: new user: name=epmd, UID=988, GID=988, home=/dev/null, shell=/sbin/nologin, from=none Oct 09 23:14:24 np0005479288.novalocal groupadd[59255]: group added to /etc/group: name=rabbitmq, GID=987 Oct 09 23:14:24 np0005479288.novalocal groupadd[59255]: group added to /etc/gshadow: name=rabbitmq Oct 09 23:14:24 np0005479288.novalocal groupadd[59255]: new group: name=rabbitmq, GID=987 Oct 09 23:14:24 np0005479288.novalocal useradd[59262]: new user: name=rabbitmq, UID=987, GID=987, home=/var/lib/rabbitmq, shell=/sbin/nologin, from=none Oct 09 23:14:25 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:14:25 np0005479288.novalocal systemd-rc-local-generator[59293]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:14:26 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:14:26 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:14:26 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:14:26 np0005479288.novalocal systemd-rc-local-generator[59329]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:14:26 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:14:27 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:14:27 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:14:27 np0005479288.novalocal systemd[1]: run-r8de3f01cc5194928b210088ca65b2cf9.service: Deactivated successfully. Oct 09 23:14:30 np0005479288.novalocal runuser[60441]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:14:30 np0005479288.novalocal runuser[60441]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:14:46 np0005479288.novalocal kernel: SELinux: Converting 2738 SID table entries... Oct 09 23:14:46 np0005479288.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 09 23:14:46 np0005479288.novalocal kernel: SELinux: policy capability open_perms=1 Oct 09 23:14:46 np0005479288.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 09 23:14:46 np0005479288.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 09 23:14:46 np0005479288.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 09 23:14:46 np0005479288.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 09 23:14:46 np0005479288.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 09 23:14:46 np0005479288.novalocal groupadd[60952]: group added to /etc/group: name=mysql, GID=27 Oct 09 23:14:46 np0005479288.novalocal groupadd[60952]: group added to /etc/gshadow: name=mysql Oct 09 23:14:46 np0005479288.novalocal groupadd[60952]: new group: name=mysql, GID=27 Oct 09 23:14:46 np0005479288.novalocal useradd[60958]: new user: name=mysql, UID=27, GID=27, home=/var/lib/mysql, shell=/sbin/nologin, from=none Oct 09 23:14:48 np0005479288.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=9 res=1 Oct 09 23:14:48 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:14:48 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:14:48 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:14:48 np0005479288.novalocal systemd-rc-local-generator[61435]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:14:49 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:14:52 np0005479288.novalocal groupadd[63789]: group added to /etc/group: name=redis, GID=986 Oct 09 23:14:52 np0005479288.novalocal groupadd[63789]: group added to /etc/gshadow: name=redis Oct 09 23:14:52 np0005479288.novalocal groupadd[63789]: new group: name=redis, GID=986 Oct 09 23:14:52 np0005479288.novalocal useradd[63846]: new user: name=redis, UID=986, GID=986, home=/var/lib/redis, shell=/sbin/nologin, from=none Oct 09 23:14:53 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:14:53 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:14:53 np0005479288.novalocal systemd-rc-local-generator[64263]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:14:53 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:14:54 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:14:54 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:14:54 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.275s CPU time. Oct 09 23:14:54 np0005479288.novalocal systemd[1]: run-r9db4324a9da3478dbcce862a1937fecb.service: Deactivated successfully. Oct 09 23:14:54 np0005479288.novalocal systemd[1]: run-r43dc71b8bb5b425c8ed1923c97c04ddf.service: Deactivated successfully. Oct 09 23:15:04 np0005479288.novalocal kernel: SELinux: Converting 2741 SID table entries... Oct 09 23:15:04 np0005479288.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 09 23:15:04 np0005479288.novalocal kernel: SELinux: policy capability open_perms=1 Oct 09 23:15:04 np0005479288.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 09 23:15:04 np0005479288.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 09 23:15:04 np0005479288.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 09 23:15:04 np0005479288.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 09 23:15:04 np0005479288.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 09 23:15:04 np0005479288.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=10 res=1 Oct 09 23:15:04 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:15:04 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:15:04 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:15:04 np0005479288.novalocal groupadd[64906]: group added to /etc/group: name=unbound, GID=985 Oct 09 23:15:04 np0005479288.novalocal groupadd[64906]: group added to /etc/gshadow: name=unbound Oct 09 23:15:04 np0005479288.novalocal groupadd[64906]: new group: name=unbound, GID=985 Oct 09 23:15:05 np0005479288.novalocal useradd[64913]: new user: name=unbound, UID=985, GID=985, home=/var/lib/unbound, shell=/sbin/nologin, from=none Oct 09 23:15:05 np0005479288.novalocal systemd[1]: Started daily update of the root trust anchor for DNSSEC. Oct 09 23:15:05 np0005479288.novalocal groupadd[64926]: group added to /etc/group: name=openvswitch, GID=984 Oct 09 23:15:05 np0005479288.novalocal groupadd[64926]: group added to /etc/gshadow: name=openvswitch Oct 09 23:15:05 np0005479288.novalocal groupadd[64926]: new group: name=openvswitch, GID=984 Oct 09 23:15:05 np0005479288.novalocal useradd[64933]: new user: name=openvswitch, UID=984, GID=984, home=/, shell=/sbin/nologin, from=none Oct 09 23:15:05 np0005479288.novalocal groupadd[64941]: group added to /etc/group: name=hugetlbfs, GID=983 Oct 09 23:15:05 np0005479288.novalocal groupadd[64941]: group added to /etc/gshadow: name=hugetlbfs Oct 09 23:15:05 np0005479288.novalocal groupadd[64941]: new group: name=hugetlbfs, GID=983 Oct 09 23:15:05 np0005479288.novalocal usermod[64949]: add 'openvswitch' to group 'hugetlbfs' Oct 09 23:15:05 np0005479288.novalocal usermod[64949]: add 'openvswitch' to shadow group 'hugetlbfs' Oct 09 23:15:07 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:15:07 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:15:07 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:07 np0005479288.novalocal systemd-sysv-generator[65431]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:07 np0005479288.novalocal systemd-rc-local-generator[65427]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:07 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:15:08 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:15:08 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:15:08 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.262s CPU time. Oct 09 23:15:08 np0005479288.novalocal systemd[1]: run-r492e87ddbb19419db49087e7eb010689.service: Deactivated successfully. Oct 09 23:15:08 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:08 np0005479288.novalocal systemd-sysv-generator[66050]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:08 np0005479288.novalocal systemd-rc-local-generator[66047]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:08 np0005479288.novalocal systemd[1]: Starting Open vSwitch Database Unit... Oct 09 23:15:09 np0005479288.novalocal chown[66058]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Oct 09 23:15:09 np0005479288.novalocal ovs-ctl[66063]: /etc/openvswitch/conf.db does not exist ... (warning). Oct 09 23:15:09 np0005479288.novalocal ovs-ctl[66063]: Creating empty database /etc/openvswitch/conf.db [ OK ] Oct 09 23:15:09 np0005479288.novalocal ovs-ctl[66063]: Starting ovsdb-server [ OK ] Oct 09 23:15:09 np0005479288.novalocal ovs-vsctl[66112]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Oct 09 23:15:09 np0005479288.novalocal ovs-vsctl[66131]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.5-115.el9s "external-ids:system-id=\"69d9457a-fe56-439f-b981-60ebd8e4100e\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"centos\"" "system-version=\"9\"" Oct 09 23:15:09 np0005479288.novalocal ovs-ctl[66063]: Configuring Open vSwitch system IDs [ OK ] Oct 09 23:15:09 np0005479288.novalocal ovs-vsctl[66136]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005479288 Oct 09 23:15:09 np0005479288.novalocal ovs-ctl[66063]: Enabling remote OVSDB managers [ OK ] Oct 09 23:15:09 np0005479288.novalocal systemd[1]: Started Open vSwitch Database Unit. Oct 09 23:15:09 np0005479288.novalocal systemd[1]: Starting Open vSwitch Delete Transient Ports... Oct 09 23:15:09 np0005479288.novalocal systemd[1]: Finished Open vSwitch Delete Transient Ports. Oct 09 23:15:09 np0005479288.novalocal systemd[1]: Starting Open vSwitch Forwarding Unit... Oct 09 23:15:09 np0005479288.novalocal kernel: openvswitch: Open vSwitch switching datapath Oct 09 23:15:09 np0005479288.novalocal ovs-ctl[66181]: Inserting openvswitch module [ OK ] Oct 09 23:15:09 np0005479288.novalocal ovs-ctl[66150]: Starting ovs-vswitchd [ OK ] Oct 09 23:15:09 np0005479288.novalocal ovs-vsctl[66198]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005479288 Oct 09 23:15:09 np0005479288.novalocal ovs-ctl[66150]: Enabling remote OVSDB managers [ OK ] Oct 09 23:15:09 np0005479288.novalocal systemd[1]: Started Open vSwitch Forwarding Unit. Oct 09 23:15:09 np0005479288.novalocal systemd[1]: Starting Open vSwitch... Oct 09 23:15:09 np0005479288.novalocal systemd[1]: Finished Open vSwitch. Oct 09 23:15:09 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:10 np0005479288.novalocal systemd-rc-local-generator[66223]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:10 np0005479288.novalocal systemd-sysv-generator[66226]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:10 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:10 np0005479288.novalocal systemd-sysv-generator[66255]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:10 np0005479288.novalocal systemd-rc-local-generator[66252]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:12 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:15:12 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:15:12 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:12 np0005479288.novalocal systemd-rc-local-generator[66308]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:12 np0005479288.novalocal systemd-sysv-generator[66312]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:12 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:15:13 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:15:13 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:15:13 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.103s CPU time. Oct 09 23:15:13 np0005479288.novalocal systemd[1]: run-r40c2861b4ddf4f64a142e9291a328819.service: Deactivated successfully. Oct 09 23:15:15 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:15:15 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:15:15 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:16 np0005479288.novalocal systemd-sysv-generator[66742]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:16 np0005479288.novalocal systemd-rc-local-generator[66737]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:16 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:15:16 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:15:16 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:15:16 np0005479288.novalocal systemd[1]: run-r96dcee13fd324f9aa97c8df1d3e3723f.service: Deactivated successfully. Oct 09 23:15:17 np0005479288.novalocal ovs-vsctl[66816]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:[::1]:6642 Oct 09 23:15:17 np0005479288.novalocal ovs-vsctl[66818]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Oct 09 23:15:17 np0005479288.novalocal ovs-vsctl[66820]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=::1 Oct 09 23:15:17 np0005479288.novalocal ovs-vsctl[66823]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005479288.novalocal Oct 09 23:15:17 np0005479288.novalocal ovs-vsctl[66825]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Oct 09 23:15:17 np0005479288.novalocal ovs-vsctl[66827]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Oct 09 23:15:17 np0005479288.novalocal ovs-vsctl[66829]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-openflow-probe-interval=60 Oct 09 23:15:17 np0005479288.novalocal ovs-vsctl[66831]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=false Oct 09 23:15:17 np0005479288.novalocal ovs-vsctl[66833]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Oct 09 23:15:17 np0005479288.novalocal ovs-vsctl[66835]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-cms-options=enable-chassis-as-gw Oct 09 23:15:18 np0005479288.novalocal ovs-vsctl[66839]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=external:br-ex Oct 09 23:15:18 np0005479288.novalocal ovs-vsctl[66843]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Oct 09 23:15:27 np0005479288.novalocal groupadd[66863]: group added to /etc/group: name=keystone, GID=163 Oct 09 23:15:27 np0005479288.novalocal groupadd[66863]: group added to /etc/gshadow: name=keystone Oct 09 23:15:27 np0005479288.novalocal groupadd[66863]: new group: name=keystone, GID=163 Oct 09 23:15:27 np0005479288.novalocal useradd[66870]: new user: name=keystone, UID=163, GID=163, home=/var/lib/keystone, shell=/sbin/nologin, from=none Oct 09 23:15:28 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:15:28 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:15:29 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:15:29 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:15:29 np0005479288.novalocal systemd[1]: run-r9ec3fd5eaacf42bcbe2535457729bfc9.service: Deactivated successfully. Oct 09 23:15:34 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:15:34 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:15:35 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:15:35 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:15:35 np0005479288.novalocal systemd[1]: run-r4233afb472204f4fbd979f64f14cb6f3.service: Deactivated successfully. Oct 09 23:15:42 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:42 np0005479288.novalocal systemd-rc-local-generator[67412]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:42 np0005479288.novalocal systemd-sysv-generator[67417]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:42 np0005479288.novalocal systemd[1]: Listening on Device-mapper event daemon FIFOs. Oct 09 23:15:43 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:43 np0005479288.novalocal systemd-rc-local-generator[67442]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:43 np0005479288.novalocal systemd-sysv-generator[67447]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:43 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:43 np0005479288.novalocal systemd-sysv-generator[67476]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:43 np0005479288.novalocal systemd-rc-local-generator[67471]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:43 np0005479288.novalocal systemd-logind[793]: Watching system buttons on /dev/input/event0 (Power Button) Oct 09 23:15:43 np0005479288.novalocal systemd-logind[793]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Oct 09 23:15:45 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:45 np0005479288.novalocal systemd-sysv-generator[67574]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:45 np0005479288.novalocal systemd-rc-local-generator[67571]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:45 np0005479288.novalocal systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Oct 09 23:15:46 np0005479288.novalocal systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Oct 09 23:15:46 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:46 np0005479288.novalocal systemd-rc-local-generator[67604]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:46 np0005479288.novalocal systemd-sysv-generator[67609]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:46 np0005479288.novalocal systemd[1]: Listening on LVM2 poll daemon socket. Oct 09 23:15:48 np0005479288.novalocal groupadd[67619]: group added to /etc/group: name=cinder, GID=165 Oct 09 23:15:48 np0005479288.novalocal groupadd[67619]: group added to /etc/gshadow: name=cinder Oct 09 23:15:48 np0005479288.novalocal groupadd[67619]: new group: name=cinder, GID=165 Oct 09 23:15:48 np0005479288.novalocal useradd[67626]: new user: name=cinder, UID=165, GID=165, home=/var/lib/cinder, shell=/sbin/nologin, from=none Oct 09 23:15:48 np0005479288.novalocal useradd[67626]: add 'cinder' to group 'nobody' Oct 09 23:15:48 np0005479288.novalocal useradd[67626]: add 'cinder' to group 'cinder' Oct 09 23:15:48 np0005479288.novalocal useradd[67626]: add 'cinder' to shadow group 'nobody' Oct 09 23:15:48 np0005479288.novalocal useradd[67626]: add 'cinder' to shadow group 'cinder' Oct 09 23:15:49 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:15:49 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:15:49 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:49 np0005479288.novalocal systemd-rc-local-generator[67674]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:49 np0005479288.novalocal systemd-sysv-generator[67678]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:49 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:15:51 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:51 np0005479288.novalocal systemd-rc-local-generator[69300]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:51 np0005479288.novalocal systemd-sysv-generator[69306]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:51 np0005479288.novalocal systemd[1]: One time configuration for iscsi.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/iscsi/initiatorname.iscsi). Oct 09 23:15:51 np0005479288.novalocal systemd[1]: Starting Open-iSCSI... Oct 09 23:15:51 np0005479288.novalocal kernel: Loading iSCSI transport class v2.0-870. Oct 09 23:15:51 np0005479288.novalocal systemd[1]: Started Open-iSCSI. Oct 09 23:15:51 np0005479288.novalocal systemd[1]: Starting Logout off all iSCSI sessions on shutdown... Oct 09 23:15:51 np0005479288.novalocal systemd[1]: Finished Logout off all iSCSI sessions on shutdown. Oct 09 23:15:51 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:51 np0005479288.novalocal systemd-sysv-generator[69648]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:51 np0005479288.novalocal systemd-rc-local-generator[69644]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:52 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:52 np0005479288.novalocal systemd-sysv-generator[69687]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:52 np0005479288.novalocal systemd-rc-local-generator[69683]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:52 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:15:52 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:15:52 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Consumed 3.463s CPU time. Oct 09 23:15:52 np0005479288.novalocal systemd[1]: run-r0ccb18da0cff46af8cd6aac888403230.service: Deactivated successfully. Oct 09 23:15:54 np0005479288.novalocal groupadd[69704]: group added to /etc/group: name=glance, GID=161 Oct 09 23:15:54 np0005479288.novalocal groupadd[69704]: group added to /etc/gshadow: name=glance Oct 09 23:15:54 np0005479288.novalocal groupadd[69704]: new group: name=glance, GID=161 Oct 09 23:15:54 np0005479288.novalocal useradd[69711]: new user: name=glance, UID=161, GID=161, home=/var/lib/glance, shell=/sbin/nologin, from=none Oct 09 23:15:55 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:15:55 np0005479288.novalocal systemd-rc-local-generator[69746]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:15:55 np0005479288.novalocal systemd-sysv-generator[69749]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:15:55 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:15:58 np0005479288.novalocal kernel: SELinux: Converting 2762 SID table entries... Oct 09 23:15:58 np0005479288.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 09 23:15:58 np0005479288.novalocal kernel: SELinux: policy capability open_perms=1 Oct 09 23:15:58 np0005479288.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 09 23:15:58 np0005479288.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 09 23:15:58 np0005479288.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 09 23:15:58 np0005479288.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 09 23:15:58 np0005479288.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 09 23:15:58 np0005479288.novalocal setsebool[69759]: The os_neutron_dac_override policy boolean was changed to on by root Oct 09 23:15:58 np0005479288.novalocal ovs-vsctl[69766]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl add-br br-ex Oct 09 23:15:58 np0005479288.novalocal kernel: ovs-system: entered promiscuous mode Oct 09 23:15:58 np0005479288.novalocal NetworkManager[860]: [1760066158.4174] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Oct 09 23:15:58 np0005479288.novalocal NetworkManager[860]: [1760066158.4199] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/3) Oct 09 23:15:58 np0005479288.novalocal kernel: Timeout policy base is empty Oct 09 23:15:58 np0005479288.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=12 res=1 Oct 09 23:15:58 np0005479288.novalocal NetworkManager[860]: [1760066158.4638] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Oct 09 23:15:58 np0005479288.novalocal kernel: br-ex: entered promiscuous mode Oct 09 23:15:58 np0005479288.novalocal NetworkManager[860]: [1760066158.4658] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Oct 09 23:15:58 np0005479288.novalocal systemd-udevd[69782]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:15:58 np0005479288.novalocal systemd-udevd[69784]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:15:58 np0005479288.novalocal NetworkManager[860]: [1760066158.4991] device (br-ex): carrier: link connected Oct 09 23:15:58 np0005479288.novalocal NetworkManager[860]: [1760066158.5417] manager: (loop1): new Dummy device (/org/freedesktop/NetworkManager/Devices/5) Oct 09 23:15:58 np0005479288.novalocal NetworkManager[860]: [1760066158.7784] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=69803 uid=0 result="success" Oct 09 23:15:58 np0005479288.novalocal ifdown[69804]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Oct 09 23:15:58 np0005479288.novalocal ifdown[69805]: 'network-scripts' will be removed from distribution in near future. Oct 09 23:15:58 np0005479288.novalocal ifdown[69806]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 09 23:15:58 np0005479288.novalocal NetworkManager[860]: [1760066158.8245] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=69812 uid=0 result="success" Oct 09 23:15:58 np0005479288.novalocal NetworkManager[860]: [1760066158.8754] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=69820 uid=0 result="success" Oct 09 23:15:58 np0005479288.novalocal NetworkManager[860]: [1760066158.9123] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=69829 uid=0 result="success" Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.0151] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=69852 uid=0 result="success" Oct 09 23:15:59 np0005479288.novalocal ovs-vsctl[69857]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-br br-ex Oct 09 23:15:59 np0005479288.novalocal kernel: br-ex: left promiscuous mode Oct 09 23:15:59 np0005479288.novalocal kernel: ovs-system: left promiscuous mode Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.1290] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=69875 uid=0 result="success" Oct 09 23:15:59 np0005479288.novalocal ifdown[69879]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Oct 09 23:15:59 np0005479288.novalocal ifdown[69880]: 'network-scripts' will be removed from distribution in near future. Oct 09 23:15:59 np0005479288.novalocal ifdown[69881]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.1828] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=69887 uid=0 result="success" Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.2368] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=69898 uid=0 result="success" Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.2809] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=69910 uid=0 result="success" Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.3787] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=69936 uid=0 result="success" Oct 09 23:15:59 np0005479288.novalocal ovs-vsctl[69944]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.5109] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=69951 uid=0 result="success" Oct 09 23:15:59 np0005479288.novalocal ifup[69955]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 09 23:15:59 np0005479288.novalocal ifup[69956]: 'network-scripts' will be removed from distribution in near future. Oct 09 23:15:59 np0005479288.novalocal ifup[69957]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.5659] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=69963 uid=0 result="success" Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.6309] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=69975 uid=0 result="success" Oct 09 23:15:59 np0005479288.novalocal ifup[69976]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 09 23:15:59 np0005479288.novalocal ifup[69977]: 'network-scripts' will be removed from distribution in near future. Oct 09 23:15:59 np0005479288.novalocal ifup[69978]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.6763] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=69984 uid=0 result="success" Oct 09 23:15:59 np0005479288.novalocal ovs-vsctl[69986]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.7033] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Oct 09 23:15:59 np0005479288.novalocal kernel: ovs-system: entered promiscuous mode Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.7045] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Oct 09 23:15:59 np0005479288.novalocal kernel: No such timeout policy "ovs_test_tp" Oct 09 23:15:59 np0005479288.novalocal kernel: br-ex: entered promiscuous mode Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.7113] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.7126] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.7427] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70007 uid=0 result="success" Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.7837] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70018 uid=0 result="success" Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.8407] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70036 uid=0 result="success" Oct 09 23:15:59 np0005479288.novalocal ovs-vsctl[70056]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 -- add-port br-ex loop1 Oct 09 23:15:59 np0005479288.novalocal kernel: loop1: entered promiscuous mode Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.9062] device (loop1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.9072] device (loop1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.9427] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70063 uid=0 result="success" Oct 09 23:15:59 np0005479288.novalocal ifup[70064]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 09 23:15:59 np0005479288.novalocal ifup[70065]: 'network-scripts' will be removed from distribution in near future. Oct 09 23:15:59 np0005479288.novalocal ifup[70066]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 09 23:15:59 np0005479288.novalocal NetworkManager[860]: [1760066159.9850] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70072 uid=0 result="success" Oct 09 23:16:00 np0005479288.novalocal ovs-vsctl[70076]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Oct 09 23:16:00 np0005479288.novalocal NetworkManager[860]: [1760066160.0665] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70083 uid=0 result="success" Oct 09 23:16:00 np0005479288.novalocal ifup[70084]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 09 23:16:00 np0005479288.novalocal ifup[70085]: 'network-scripts' will be removed from distribution in near future. Oct 09 23:16:00 np0005479288.novalocal ifup[70086]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 09 23:16:00 np0005479288.novalocal NetworkManager[860]: [1760066160.1092] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70092 uid=0 result="success" Oct 09 23:16:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:16:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:16:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:16:00 np0005479288.novalocal ovs-vsctl[70097]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Oct 09 23:16:00 np0005479288.novalocal NetworkManager[860]: [1760066160.1964] device (br-ex): carrier: link connected Oct 09 23:16:05 np0005479288.novalocal groupadd[70125]: group added to /etc/group: name=radvd, GID=75 Oct 09 23:16:05 np0005479288.novalocal groupadd[70125]: group added to /etc/gshadow: name=radvd Oct 09 23:16:05 np0005479288.novalocal groupadd[70125]: new group: name=radvd, GID=75 Oct 09 23:16:05 np0005479288.novalocal useradd[70134]: new user: name=radvd, UID=75, GID=75, home=/, shell=/sbin/nologin, from=none Oct 09 23:16:05 np0005479288.novalocal groupadd[70149]: group added to /etc/group: name=haproxy, GID=982 Oct 09 23:16:05 np0005479288.novalocal groupadd[70149]: group added to /etc/gshadow: name=haproxy Oct 09 23:16:05 np0005479288.novalocal groupadd[70149]: new group: name=haproxy, GID=982 Oct 09 23:16:05 np0005479288.novalocal useradd[70156]: new user: name=haproxy, UID=983, GID=982, home=/var/lib/haproxy, shell=/usr/sbin/nologin, from=none Oct 09 23:16:06 np0005479288.novalocal groupadd[70168]: group added to /etc/group: name=dnsmasq, GID=981 Oct 09 23:16:06 np0005479288.novalocal groupadd[70168]: group added to /etc/gshadow: name=dnsmasq Oct 09 23:16:06 np0005479288.novalocal groupadd[70168]: new group: name=dnsmasq, GID=981 Oct 09 23:16:06 np0005479288.novalocal useradd[70175]: new user: name=dnsmasq, UID=982, GID=981, home=/var/lib/dnsmasq, shell=/usr/sbin/nologin, from=none Oct 09 23:16:06 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:16:06 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:16:08 np0005479288.novalocal groupadd[70187]: group added to /etc/group: name=neutron, GID=980 Oct 09 23:16:08 np0005479288.novalocal groupadd[70187]: group added to /etc/gshadow: name=neutron Oct 09 23:16:08 np0005479288.novalocal groupadd[70187]: new group: name=neutron, GID=980 Oct 09 23:16:08 np0005479288.novalocal useradd[70194]: new user: name=neutron, UID=981, GID=980, home=/var/lib/neutron, shell=/sbin/nologin, from=none Oct 09 23:16:09 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:16:09 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:16:09 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:16:09 np0005479288.novalocal systemd-sysv-generator[70251]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:16:09 np0005479288.novalocal systemd-rc-local-generator[70245]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:16:09 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:16:10 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:16:10 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:16:10 np0005479288.novalocal systemd[1]: run-raa80d7b4a6844d20be47fcfac9b69b7d.service: Deactivated successfully. Oct 09 23:16:14 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:16:14 np0005479288.novalocal systemd-sysv-generator[70825]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:16:14 np0005479288.novalocal systemd-rc-local-generator[70820]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:16:14 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:16:15 np0005479288.novalocal ovs-vsctl[70836]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set-manager ptcp:6640:127.0.0.1 Oct 09 23:16:18 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:16:18 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:16:18 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:16:18 np0005479288.novalocal systemd-rc-local-generator[70878]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:16:18 np0005479288.novalocal systemd-sysv-generator[70882]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:16:18 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:16:19 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:16:19 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:16:19 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.024s CPU time. Oct 09 23:16:19 np0005479288.novalocal systemd[1]: run-r952436409f4b4788bff46a5a8af0bfdc.service: Deactivated successfully. Oct 09 23:16:21 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:16:21 np0005479288.novalocal systemd-rc-local-generator[71308]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:16:21 np0005479288.novalocal systemd-sysv-generator[71312]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:16:21 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:16:28 np0005479288.novalocal groupadd[71335]: group added to /etc/group: name=placement, GID=979 Oct 09 23:16:28 np0005479288.novalocal groupadd[71335]: group added to /etc/gshadow: name=placement Oct 09 23:16:28 np0005479288.novalocal groupadd[71335]: new group: name=placement, GID=979 Oct 09 23:16:28 np0005479288.novalocal useradd[71342]: new user: name=placement, UID=980, GID=979, home=/, shell=/bin/bash, from=none Oct 09 23:16:34 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:16:34 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:16:35 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:16:35 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:16:35 np0005479288.novalocal systemd[1]: run-rbfd8c87162c048c7be5997fd0b4aada5.service: Deactivated successfully. Oct 09 23:16:36 np0005479288.novalocal groupadd[71513]: group added to /etc/group: name=nova, GID=162 Oct 09 23:16:36 np0005479288.novalocal groupadd[71513]: group added to /etc/gshadow: name=nova Oct 09 23:16:36 np0005479288.novalocal groupadd[71513]: new group: name=nova, GID=162 Oct 09 23:16:36 np0005479288.novalocal useradd[71520]: new user: name=nova, UID=162, GID=162, home=/var/lib/nova, shell=/sbin/nologin, from=none Oct 09 23:16:36 np0005479288.novalocal useradd[71520]: add 'nova' to group 'nobody' Oct 09 23:16:36 np0005479288.novalocal useradd[71520]: add 'nova' to group 'nova' Oct 09 23:16:36 np0005479288.novalocal useradd[71520]: add 'nova' to shadow group 'nobody' Oct 09 23:16:36 np0005479288.novalocal useradd[71520]: add 'nova' to shadow group 'nova' Oct 09 23:16:55 np0005479288.novalocal kernel: SELinux: Converting 2769 SID table entries... Oct 09 23:16:55 np0005479288.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 09 23:16:55 np0005479288.novalocal kernel: SELinux: policy capability open_perms=1 Oct 09 23:16:55 np0005479288.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 09 23:16:55 np0005479288.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 09 23:16:55 np0005479288.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 09 23:16:55 np0005479288.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 09 23:16:55 np0005479288.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 09 23:17:05 np0005479288.novalocal kernel: SELinux: Converting 2769 SID table entries... Oct 09 23:17:05 np0005479288.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 09 23:17:05 np0005479288.novalocal kernel: SELinux: policy capability open_perms=1 Oct 09 23:17:05 np0005479288.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 09 23:17:05 np0005479288.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 09 23:17:05 np0005479288.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 09 23:17:05 np0005479288.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 09 23:17:05 np0005479288.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 09 23:17:07 np0005479288.novalocal sshd-session[71640]: banner exchange: Connection from 67.205.184.7 port 58384: invalid format Oct 09 23:17:14 np0005479288.novalocal kernel: SELinux: Converting 2769 SID table entries... Oct 09 23:17:14 np0005479288.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 09 23:17:14 np0005479288.novalocal kernel: SELinux: policy capability open_perms=1 Oct 09 23:17:14 np0005479288.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 09 23:17:14 np0005479288.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 09 23:17:14 np0005479288.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 09 23:17:14 np0005479288.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 09 23:17:14 np0005479288.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 09 23:17:23 np0005479288.novalocal kernel: SELinux: Converting 2769 SID table entries... Oct 09 23:17:23 np0005479288.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 09 23:17:23 np0005479288.novalocal kernel: SELinux: policy capability open_perms=1 Oct 09 23:17:23 np0005479288.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 09 23:17:23 np0005479288.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 09 23:17:23 np0005479288.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 09 23:17:23 np0005479288.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 09 23:17:23 np0005479288.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 09 23:17:32 np0005479288.novalocal kernel: SELinux: Converting 2769 SID table entries... Oct 09 23:17:32 np0005479288.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 09 23:17:32 np0005479288.novalocal kernel: SELinux: policy capability open_perms=1 Oct 09 23:17:32 np0005479288.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 09 23:17:32 np0005479288.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 09 23:17:32 np0005479288.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 09 23:17:32 np0005479288.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 09 23:17:32 np0005479288.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 09 23:17:42 np0005479288.novalocal kernel: SELinux: Converting 2770 SID table entries... Oct 09 23:17:42 np0005479288.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=17 res=1 Oct 09 23:17:42 np0005479288.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 09 23:17:42 np0005479288.novalocal kernel: SELinux: policy capability open_perms=1 Oct 09 23:17:42 np0005479288.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 09 23:17:42 np0005479288.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 09 23:17:42 np0005479288.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 09 23:17:42 np0005479288.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 09 23:17:42 np0005479288.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 09 23:17:42 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:17:42 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:17:42 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:17:42 np0005479288.novalocal groupadd[71684]: group added to /etc/group: name=qemu, GID=107 Oct 09 23:17:42 np0005479288.novalocal groupadd[71684]: group added to /etc/gshadow: name=qemu Oct 09 23:17:42 np0005479288.novalocal groupadd[71684]: new group: name=qemu, GID=107 Oct 09 23:17:42 np0005479288.novalocal useradd[71691]: new user: name=qemu, UID=107, GID=107, home=/, shell=/sbin/nologin, from=none Oct 09 23:17:42 np0005479288.novalocal useradd[71691]: add 'qemu' to group 'kvm' Oct 09 23:17:42 np0005479288.novalocal useradd[71691]: add 'qemu' to shadow group 'kvm' Oct 09 23:17:43 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:17:43 np0005479288.novalocal dbus-broker-launch[778]: avc: op=load_policy lsm=selinux seqno=18 res=1 Oct 09 23:17:43 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:17:43 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:17:43 np0005479288.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Oct 09 23:17:44 np0005479288.novalocal groupadd[71729]: group added to /etc/group: name=libvirt, GID=978 Oct 09 23:17:44 np0005479288.novalocal groupadd[71729]: group added to /etc/gshadow: name=libvirt Oct 09 23:17:44 np0005479288.novalocal groupadd[71729]: new group: name=libvirt, GID=978 Oct 09 23:17:44 np0005479288.novalocal polkitd[2933]: Reloading rules Oct 09 23:17:44 np0005479288.novalocal polkitd[2933]: Collecting garbage unconditionally... Oct 09 23:17:44 np0005479288.novalocal polkitd[2933]: Loading rules from directory /etc/polkit-1/rules.d Oct 09 23:17:44 np0005479288.novalocal polkitd[2933]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 09 23:17:44 np0005479288.novalocal polkitd[2933]: Finished loading, compiling and executing 6 rules Oct 09 23:17:44 np0005479288.novalocal polkitd[2933]: Reloading rules Oct 09 23:17:44 np0005479288.novalocal polkitd[2933]: Collecting garbage unconditionally... Oct 09 23:17:44 np0005479288.novalocal polkitd[2933]: Loading rules from directory /etc/polkit-1/rules.d Oct 09 23:17:44 np0005479288.novalocal polkitd[2933]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 09 23:17:44 np0005479288.novalocal polkitd[2933]: Finished loading, compiling and executing 6 rules Oct 09 23:17:48 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:17:48 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:17:48 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:17:48 np0005479288.novalocal systemd-sysv-generator[72441]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:17:48 np0005479288.novalocal systemd-rc-local-generator[72435]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:17:49 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:17:52 np0005479288.novalocal groupadd[74925]: group added to /etc/group: name=octavia, GID=977 Oct 09 23:17:52 np0005479288.novalocal groupadd[74925]: group added to /etc/gshadow: name=octavia Oct 09 23:17:52 np0005479288.novalocal groupadd[74925]: new group: name=octavia, GID=977 Oct 09 23:17:52 np0005479288.novalocal useradd[74967]: new user: name=octavia, UID=979, GID=977, home=/var/lib/octavia, shell=/sbin/nologin, from=none Oct 09 23:17:54 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:17:54 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:17:54 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.766s CPU time. Oct 09 23:17:54 np0005479288.novalocal systemd[1]: run-rf1557a4b023e437e9e691f89ed9cd517.service: Deactivated successfully. Oct 09 23:17:57 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:17:57 np0005479288.novalocal systemd-sysv-generator[75908]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:17:57 np0005479288.novalocal systemd-rc-local-generator[75905]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:17:58 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:18:02 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:18:02 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:18:02 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:18:02 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:18:02 np0005479288.novalocal systemd-sysv-generator[75957]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:18:02 np0005479288.novalocal systemd-rc-local-generator[75951]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:18:02 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:18:05 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:18:05 np0005479288.novalocal systemd-rc-local-generator[75994]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:18:05 np0005479288.novalocal systemd-sysv-generator[75998]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:18:05 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:18:07 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:18:07 np0005479288.novalocal systemd-rc-local-generator[76034]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:18:07 np0005479288.novalocal systemd-sysv-generator[76037]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:18:07 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:18:10 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:18:10 np0005479288.novalocal systemd-sysv-generator[76077]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:18:10 np0005479288.novalocal systemd-rc-local-generator[76074]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:18:10 np0005479288.novalocal sshd-session[76081]: Connection closed by 47.121.195.84 port 41388 Oct 09 23:18:10 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:18:20 np0005479288.novalocal groupadd[76106]: group added to /etc/group: name=apache, GID=48 Oct 09 23:18:20 np0005479288.novalocal groupadd[76106]: group added to /etc/gshadow: name=apache Oct 09 23:18:20 np0005479288.novalocal groupadd[76106]: new group: name=apache, GID=48 Oct 09 23:18:20 np0005479288.novalocal useradd[76115]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Oct 09 23:18:25 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:18:25 np0005479288.novalocal systemd-rc-local-generator[76150]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:18:25 np0005479288.novalocal systemd-sysv-generator[76153]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:18:26 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:18:26 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:18:26 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:18:26 np0005479288.novalocal systemd-rc-local-generator[76271]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:18:26 np0005479288.novalocal systemd-sysv-generator[76274]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:18:26 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:18:27 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:18:27 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:18:27 np0005479288.novalocal systemd[1]: run-r7c797d57a480457e9709fcb58cebecdd.service: Deactivated successfully. Oct 09 23:18:33 np0005479288.novalocal groupadd[76527]: group added to /etc/group: name=manila, GID=976 Oct 09 23:18:33 np0005479288.novalocal groupadd[76527]: group added to /etc/gshadow: name=manila Oct 09 23:18:33 np0005479288.novalocal groupadd[76527]: new group: name=manila, GID=976 Oct 09 23:18:33 np0005479288.novalocal useradd[76534]: new user: name=manila, UID=978, GID=976, home=/var/lib/manila, shell=/sbin/nologin, from=none Oct 09 23:18:33 np0005479288.novalocal useradd[76534]: add 'manila' to group 'nobody' Oct 09 23:18:33 np0005479288.novalocal useradd[76534]: add 'manila' to group 'manila' Oct 09 23:18:33 np0005479288.novalocal useradd[76534]: add 'manila' to shadow group 'nobody' Oct 09 23:18:33 np0005479288.novalocal useradd[76534]: add 'manila' to shadow group 'manila' Oct 09 23:18:34 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:18:34 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:18:34 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:18:35 np0005479288.novalocal systemd-sysv-generator[76580]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:18:35 np0005479288.novalocal systemd-rc-local-generator[76573]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:18:35 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:18:35 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:18:35 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:18:35 np0005479288.novalocal systemd[1]: run-re3e3a1077ecf4b198c55da3c92fcc926.service: Deactivated successfully. Oct 09 23:18:38 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:18:38 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:18:38 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:18:38 np0005479288.novalocal systemd-rc-local-generator[76786]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:18:38 np0005479288.novalocal systemd-sysv-generator[76789]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:18:39 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:18:39 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:18:39 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:18:39 np0005479288.novalocal systemd[1]: run-r01b6c4cd123540b393478e4a253f9403.service: Deactivated successfully. Oct 09 23:18:40 np0005479288.novalocal kernel: loop: module loaded Oct 09 23:18:40 np0005479288.novalocal kernel: loop3: detected capacity change from 0 to 31457280 Oct 09 23:18:40 np0005479288.novalocal lvm[77228]: PV /dev/loop3 not used. Oct 09 23:18:40 np0005479288.novalocal lvm[77231]: PV /dev/loop3 online, VG lvm-shares is complete. Oct 09 23:18:41 np0005479288.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event lvm-shares. Oct 09 23:18:41 np0005479288.novalocal lvm[77233]: 0 logical volume(s) in volume group "lvm-shares" now active Oct 09 23:18:41 np0005479288.novalocal systemd[1]: lvm-activate-lvm-shares.service: Deactivated successfully. Oct 09 23:18:55 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:18:55 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:18:56 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:18:56 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:18:56 np0005479288.novalocal systemd[1]: run-ra8e2a40f07d94b7b93db06760e37c670.service: Deactivated successfully. Oct 09 23:19:04 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:19:04 np0005479288.novalocal systemd[1]: Starting Cleanup of Temporary Directories... Oct 09 23:19:04 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:19:04 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:19:04 np0005479288.novalocal systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Oct 09 23:19:04 np0005479288.novalocal systemd[1]: Finished Cleanup of Temporary Directories. Oct 09 23:19:04 np0005479288.novalocal systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Oct 09 23:19:04 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:04 np0005479288.novalocal systemd-rc-local-generator[77531]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:04 np0005479288.novalocal systemd-sysv-generator[77537]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:04 np0005479288.novalocal systemd[1]: Starting MariaDB 10.5 database server... Oct 09 23:19:04 np0005479288.novalocal mariadb-prepare-db-dir[77566]: Database MariaDB is probably initialized in /var/lib/mysql already, nothing is done. Oct 09 23:19:04 np0005479288.novalocal mariadb-prepare-db-dir[77566]: If this is not the case, make sure the /var/lib/mysql is empty before running mariadb-prepare-db-dir. Oct 09 23:19:05 np0005479288.novalocal systemd[1]: Started MariaDB 10.5 database server. Oct 09 23:19:05 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:05 np0005479288.novalocal systemd-sysv-generator[77682]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:05 np0005479288.novalocal systemd-rc-local-generator[77679]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:05 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:05 np0005479288.novalocal systemd-sysv-generator[77710]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:05 np0005479288.novalocal systemd-rc-local-generator[77705]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:05 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:06 np0005479288.novalocal systemd-rc-local-generator[77740]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:06 np0005479288.novalocal systemd-sysv-generator[77745]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:06 np0005479288.novalocal systemd[1]: Starting Redis persistent key-value database... Oct 09 23:19:06 np0005479288.novalocal systemd[1]: Started Redis persistent key-value database. Oct 09 23:19:06 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:06 np0005479288.novalocal systemd-rc-local-generator[77779]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:06 np0005479288.novalocal systemd-sysv-generator[77782]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:06 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:06 np0005479288.novalocal systemd-rc-local-generator[77808]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:06 np0005479288.novalocal systemd-sysv-generator[77812]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:07 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:07 np0005479288.novalocal systemd-sysv-generator[77842]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:07 np0005479288.novalocal systemd-rc-local-generator[77837]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:07 np0005479288.novalocal systemd[1]: Starting Redis Sentinel... Oct 09 23:19:07 np0005479288.novalocal systemd[1]: Started Redis Sentinel. Oct 09 23:19:07 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:07 np0005479288.novalocal systemd-rc-local-generator[77876]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:07 np0005479288.novalocal systemd-sysv-generator[77879]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:07 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:08 np0005479288.novalocal systemd-sysv-generator[77908]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:08 np0005479288.novalocal systemd-rc-local-generator[77904]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:08 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:08 np0005479288.novalocal systemd-sysv-generator[77988]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:08 np0005479288.novalocal systemd-rc-local-generator[77984]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:09 np0005479288.novalocal systemd[1]: Starting OVN northd management daemon... Oct 09 23:19:09 np0005479288.novalocal chown[77994]: /usr/bin/chown: cannot access '/var/lib/ovn': No such file or directory Oct 09 23:19:09 np0005479288.novalocal ovn-ctl[77995]: /var/lib/ovn/ovnnb_db.db does not exist ... (warning). Oct 09 23:19:09 np0005479288.novalocal ovn-ctl[77995]: Creating empty database /var/lib/ovn/ovnnb_db.db [ OK ] Oct 09 23:19:09 np0005479288.novalocal ovsdb-server[78097]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Oct 09 23:19:09 np0005479288.novalocal ovsdb-server[78099]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Oct 09 23:19:09 np0005479288.novalocal ovsdb-server[78098]: ovs|00002|vlog(monitor)|INFO|closing log file Oct 09 23:19:09 np0005479288.novalocal ovsdb-server[78098]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Oct 09 23:19:09 np0005479288.novalocal ovn-ctl[77995]: Starting ovsdb-nb [ OK ] Oct 09 23:19:09 np0005479288.novalocal ovn-nbctl[78103]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl --no-leader-only --db=unix:/run/ovn/ovnnb_db.sock init Oct 09 23:19:09 np0005479288.novalocal ovn-ctl[77995]: /var/lib/ovn/ovnsb_db.db does not exist ... (warning). Oct 09 23:19:09 np0005479288.novalocal ovn-ctl[77995]: Creating empty database /var/lib/ovn/ovnsb_db.db [ OK ] Oct 09 23:19:09 np0005479288.novalocal ovsdb-server[78123]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Oct 09 23:19:09 np0005479288.novalocal ovsdb-server[78125]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Oct 09 23:19:09 np0005479288.novalocal ovsdb-server[78124]: ovs|00002|vlog(monitor)|INFO|closing log file Oct 09 23:19:09 np0005479288.novalocal ovsdb-server[78124]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Oct 09 23:19:09 np0005479288.novalocal ovn-ctl[77995]: Starting ovsdb-sb [ OK ] Oct 09 23:19:09 np0005479288.novalocal ovn-sbctl[78129]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl --no-leader-only --db=unix:/run/ovn/ovnsb_db.sock init Oct 09 23:19:09 np0005479288.novalocal ovn-ctl[77995]: Starting ovn-northd [ OK ] Oct 09 23:19:09 np0005479288.novalocal systemd[1]: Finished OVN northd management daemon. Oct 09 23:19:09 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:10 np0005479288.novalocal systemd-rc-local-generator[78166]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:10 np0005479288.novalocal systemd-sysv-generator[78171]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:10 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:10 np0005479288.novalocal systemd-sysv-generator[78201]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:10 np0005479288.novalocal systemd-rc-local-generator[78197]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:10 np0005479288.novalocal ovn-nbctl[78207]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set-connection pssl:6641:[::1] Oct 09 23:19:10 np0005479288.novalocal ovn-sbctl[78211]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set-connection pssl:6642:[::1] Oct 09 23:19:10 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:19:11 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:19:11 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:19:11 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:11 np0005479288.novalocal systemd-rc-local-generator[78260]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:11 np0005479288.novalocal systemd-sysv-generator[78263]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:11 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:19:11 np0005479288.novalocal systemd[1]: Starting OVN controller daemon... Oct 09 23:19:11 np0005479288.novalocal ovn-ctl[78269]: Starting ovn-controller [ OK ] Oct 09 23:19:11 np0005479288.novalocal systemd[1]: Started OVN controller daemon. Oct 09 23:19:11 np0005479288.novalocal kernel: br-int: entered promiscuous mode Oct 09 23:19:11 np0005479288.novalocal NetworkManager[860]: [1760066351.5723] manager: (br-int): 'openvswitch' plugin not available; creating generic device Oct 09 23:19:11 np0005479288.novalocal NetworkManager[860]: [1760066351.5745] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Oct 09 23:19:11 np0005479288.novalocal systemd-udevd[78325]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:19:11 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:11 np0005479288.novalocal systemd-sysv-generator[78351]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:11 np0005479288.novalocal systemd-rc-local-generator[78347]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:11 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:19:11 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:12 np0005479288.novalocal systemd-rc-local-generator[78376]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:12 np0005479288.novalocal systemd-sysv-generator[78380]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:12 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:19:14 np0005479288.novalocal kernel: loop2: detected capacity change from 0 to 31457280 Oct 09 23:19:14 np0005479288.novalocal lvm[78401]: PV /dev/loop2 not used. Oct 09 23:19:14 np0005479288.novalocal lvm[78403]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:19:14 np0005479288.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Oct 09 23:19:14 np0005479288.novalocal lvm[78405]: 0 logical volume(s) in volume group "cinder-volumes" now active Oct 09 23:19:14 np0005479288.novalocal systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Oct 09 23:19:19 np0005479288.novalocal ovsdb-server[78099]: ovs|00003|memory|INFO|10404 kB peak resident set size after 10.0 seconds Oct 09 23:19:19 np0005479288.novalocal ovsdb-server[78099]: ovs|00004|memory|INFO|atoms:43 cells:43 json-caches:1 monitors:2 n-weak-refs:0 sessions:1 Oct 09 23:19:19 np0005479288.novalocal ovsdb-server[78125]: ovs|00003|memory|INFO|11016 kB peak resident set size after 10.1 seconds Oct 09 23:19:19 np0005479288.novalocal ovsdb-server[78125]: ovs|00004|memory|INFO|atoms:447 cells:355 json-caches:1 monitors:3 n-weak-refs:11 sessions:2 Oct 09 23:19:24 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:24 np0005479288.novalocal systemd-rc-local-generator[78442]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:24 np0005479288.novalocal systemd-sysv-generator[78446]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:24 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:19:24 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:19:27 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:27 np0005479288.novalocal systemd-rc-local-generator[78482]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:27 np0005479288.novalocal systemd-sysv-generator[78486]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:27 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:19:27 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:19:32 np0005479288.novalocal groupadd[78552]: group added to /etc/group: name=clevis, GID=975 Oct 09 23:19:32 np0005479288.novalocal groupadd[78552]: group added to /etc/gshadow: name=clevis Oct 09 23:19:32 np0005479288.novalocal groupadd[78552]: new group: name=clevis, GID=975 Oct 09 23:19:32 np0005479288.novalocal useradd[78559]: new user: name=clevis, UID=977, GID=975, home=/var/cache/clevis, shell=/usr/sbin/nologin, from=none Oct 09 23:19:32 np0005479288.novalocal usermod[78569]: add 'clevis' to group 'tss' Oct 09 23:19:32 np0005479288.novalocal usermod[78569]: add 'clevis' to shadow group 'tss' Oct 09 23:19:33 np0005479288.novalocal usermod[78582]: add 'nova' to group 'qemu' Oct 09 23:19:33 np0005479288.novalocal usermod[78582]: add 'nova' to shadow group 'qemu' Oct 09 23:19:33 np0005479288.novalocal usermod[78589]: add 'nova' to group 'libvirt' Oct 09 23:19:33 np0005479288.novalocal usermod[78589]: add 'nova' to shadow group 'libvirt' Oct 09 23:19:34 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:19:34 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:19:34 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:34 np0005479288.novalocal systemd-sysv-generator[78671]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:34 np0005479288.novalocal systemd-rc-local-generator[78666]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:34 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:19:34 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:19:37 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:37 np0005479288.novalocal systemd-sysv-generator[80520]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:37 np0005479288.novalocal systemd-rc-local-generator[80517]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:37 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:19:37 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:19:40 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:40 np0005479288.novalocal systemd-sysv-generator[82573]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:40 np0005479288.novalocal systemd-rc-local-generator[82566]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:40 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:19:40 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:19:40 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:19:40 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:19:40 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Consumed 7.721s CPU time. Oct 09 23:19:40 np0005479288.novalocal systemd[1]: run-re2cf5cfa04c14d7986746e2e4105fa78.service: Deactivated successfully. Oct 09 23:19:43 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:19:43 np0005479288.novalocal systemd-rc-local-generator[82606]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:19:43 np0005479288.novalocal systemd-sysv-generator[82610]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:19:43 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:20:01 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:20:01 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:20:01 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:20:05 np0005479288.novalocal crontab[82657]: (root) LIST (root) Oct 09 23:20:05 np0005479288.novalocal crontab[82658]: (root) LIST (keystone) Oct 09 23:20:05 np0005479288.novalocal crontab[82659]: (root) LIST (cinder) Oct 09 23:20:05 np0005479288.novalocal crontab[82660]: (root) LIST (glance) Oct 09 23:20:05 np0005479288.novalocal crontab[82661]: (root) LIST (nova) Oct 09 23:20:05 np0005479288.novalocal crontab[82662]: (root) LIST (manila) Oct 09 23:20:05 np0005479288.novalocal crontab[82663]: (root) REPLACE (cinder) Oct 09 23:20:05 np0005479288.novalocal crontab[82664]: (root) REPLACE (glance) Oct 09 23:20:05 np0005479288.novalocal crontab[82665]: (root) REPLACE (glance) Oct 09 23:20:11 np0005479288.novalocal crontab[82677]: (root) REPLACE (glance) Oct 09 23:20:44 np0005479288.novalocal crontab[82723]: (root) REPLACE (nova) Oct 09 23:20:52 np0005479288.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 09 23:20:53 np0005479288.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 09 23:20:53 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:20:53 np0005479288.novalocal systemd-rc-local-generator[82765]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:20:53 np0005479288.novalocal systemd-sysv-generator[82768]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:20:53 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:20:53 np0005479288.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 09 23:20:53 np0005479288.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 09 23:20:53 np0005479288.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 09 23:20:53 np0005479288.novalocal systemd[1]: run-rb5727193522b47d09d1de6c7e875e365.service: Deactivated successfully. Oct 09 23:21:02 np0005479288.novalocal crontab[82870]: (root) REPLACE (manila) Oct 09 23:21:02 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:21:02 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:02 np0005479288.novalocal systemd-sysv-generator[82896]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:02 np0005479288.novalocal systemd-rc-local-generator[82893]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:03 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:03 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:21:03 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:21:03 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:03 np0005479288.novalocal systemd-rc-local-generator[82921]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:03 np0005479288.novalocal systemd-sysv-generator[82927]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:03 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:04 np0005479288.novalocal systemd[82934]: epmd.socket: Failed to create listening socket ([::]:4369): Address already in use Oct 09 23:21:04 np0005479288.novalocal systemd[1]: epmd.socket: Failed to receive listening socket ([::]:4369): Input/output error Oct 09 23:21:04 np0005479288.novalocal systemd[1]: epmd.socket: Failed to listen on sockets: Input/output error Oct 09 23:21:04 np0005479288.novalocal systemd[1]: epmd.socket: Failed with result 'resources'. Oct 09 23:21:04 np0005479288.novalocal systemd[1]: Failed to listen on Erlang Port Mapper Daemon Activation Socket. Oct 09 23:21:04 np0005479288.novalocal systemd[1]: Starting RabbitMQ broker... Oct 09 23:21:04 np0005479288.novalocal rabbitmq-server[82935]: 2025-10-09 23:21:04.598711-04:00 [warning] <0.129.0> Both old (.config) and new (.conf) format config files exist. Oct 09 23:21:04 np0005479288.novalocal rabbitmq-server[82935]: 2025-10-09 23:21:04.611022-04:00 [warning] <0.129.0> Using the old format config file: /etc/rabbitmq/rabbitmq.config Oct 09 23:21:04 np0005479288.novalocal rabbitmq-server[82935]: 2025-10-09 23:21:04.611052-04:00 [warning] <0.129.0> Please update your config files to the new format and remove the old file. Oct 09 23:21:06 np0005479288.novalocal rabbitmq-server[82935]: 2025-10-09 23:21:06.457872-04:00 [info] <0.229.0> Feature flags: list of feature flags found: Oct 09 23:21:06 np0005479288.novalocal rabbitmq-server[82935]: 2025-10-09 23:21:06.457944-04:00 [info] <0.229.0> Feature flags: [ ] implicit_default_bindings Oct 09 23:21:06 np0005479288.novalocal rabbitmq-server[82935]: 2025-10-09 23:21:06.457966-04:00 [info] <0.229.0> Feature flags: [ ] maintenance_mode_status Oct 09 23:21:06 np0005479288.novalocal rabbitmq-server[82935]: 2025-10-09 23:21:06.457997-04:00 [info] <0.229.0> Feature flags: [ ] quorum_queue Oct 09 23:21:06 np0005479288.novalocal rabbitmq-server[82935]: 2025-10-09 23:21:06.458064-04:00 [info] <0.229.0> Feature flags: [ ] stream_queue Oct 09 23:21:06 np0005479288.novalocal rabbitmq-server[82935]: 2025-10-09 23:21:06.458088-04:00 [info] <0.229.0> Feature flags: [ ] user_limits Oct 09 23:21:06 np0005479288.novalocal rabbitmq-server[82935]: 2025-10-09 23:21:06.458108-04:00 [info] <0.229.0> Feature flags: [ ] virtual_host_metadata Oct 09 23:21:06 np0005479288.novalocal rabbitmq-server[82935]: 2025-10-09 23:21:06.458162-04:00 [info] <0.229.0> Feature flags: feature flag states written to disk: yes Oct 09 23:21:06 np0005479288.novalocal rabbitmq-server[82935]: 2025-10-09 23:21:06.755110-04:00 [notice] <0.44.0> Application syslog exited with reason: stopped Oct 09 23:21:06 np0005479288.novalocal rabbitmq-server[82935]: 2025-10-09 23:21:06.755238-04:00 [notice] <0.229.0> Logging: switching to configured handler(s); following messages may not be visible in this log output Oct 09 23:21:07 np0005479288.novalocal rabbitmq-server[82935]: ## ## RabbitMQ 3.9.21 Oct 09 23:21:07 np0005479288.novalocal rabbitmq-server[82935]: ## ## Oct 09 23:21:07 np0005479288.novalocal rabbitmq-server[82935]: ########## Copyright (c) 2007-2022 VMware, Inc. or its affiliates. Oct 09 23:21:07 np0005479288.novalocal rabbitmq-server[82935]: ###### ## Oct 09 23:21:07 np0005479288.novalocal rabbitmq-server[82935]: ########## Licensed under the MPL 2.0. Website: https://rabbitmq.com Oct 09 23:21:07 np0005479288.novalocal rabbitmq-server[82935]: Erlang: 24.3.4.2 [jit] Oct 09 23:21:07 np0005479288.novalocal rabbitmq-server[82935]: TLS Library: OpenSSL - OpenSSL 3.5.1 1 Jul 2025 Oct 09 23:21:07 np0005479288.novalocal rabbitmq-server[82935]: Doc guides: https://rabbitmq.com/documentation.html Oct 09 23:21:07 np0005479288.novalocal rabbitmq-server[82935]: Support: https://rabbitmq.com/contact.html Oct 09 23:21:07 np0005479288.novalocal rabbitmq-server[82935]: Tutorials: https://rabbitmq.com/getstarted.html Oct 09 23:21:07 np0005479288.novalocal rabbitmq-server[82935]: Monitoring: https://rabbitmq.com/monitoring.html Oct 09 23:21:07 np0005479288.novalocal rabbitmq-server[82935]: Logs: /var/log/rabbitmq/rabbit@localhost6.log Oct 09 23:21:07 np0005479288.novalocal rabbitmq-server[82935]: /var/log/rabbitmq/rabbit@localhost6_upgrade.log Oct 09 23:21:07 np0005479288.novalocal rabbitmq-server[82935]: Oct 09 23:21:07 np0005479288.novalocal rabbitmq-server[82935]: Config file(s): /etc/rabbitmq/rabbitmq.config Oct 09 23:21:10 np0005479288.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 09 23:21:10 np0005479288.novalocal rabbitmq-server[82935]: Starting broker... completed with 3 plugins. Oct 09 23:21:10 np0005479288.novalocal systemd[1]: Started RabbitMQ broker. Oct 09 23:21:10 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:10 np0005479288.novalocal systemd-rc-local-generator[83040]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:10 np0005479288.novalocal systemd-sysv-generator[83045]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:10 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:10 np0005479288.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 09 23:21:10 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:10 np0005479288.novalocal systemd-sysv-generator[83075]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:10 np0005479288.novalocal systemd-rc-local-generator[83072]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:10 np0005479288.novalocal setroubleshoot[83018]: failed to retrieve rpm info for path '/proc/net/if_inet6': Oct 09 23:21:11 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:11 np0005479288.novalocal systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Oct 09 23:21:11 np0005479288.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Oct 09 23:21:11 np0005479288.novalocal runuser[83088]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:11 np0005479288.novalocal runuser[83088]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:12 np0005479288.novalocal runuser[83144]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:12 np0005479288.novalocal setroubleshoot[83018]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. For complete SELinux messages run: sealert -l a27db6e9-2448-441b-9d5a-4e2b1f9fd3c7 Oct 09 23:21:12 np0005479288.novalocal setroubleshoot[83018]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that inet_gethost should be allowed read access on the if_inet6 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'inet_gethost' --raw | audit2allow -M my-inetgethost # semodule -X 300 -i my-inetgethost.pp Oct 09 23:21:12 np0005479288.novalocal runuser[83144]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:12 np0005479288.novalocal runuser[83197]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:13 np0005479288.novalocal runuser[83197]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:13 np0005479288.novalocal runuser[83251]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:14 np0005479288.novalocal runuser[83251]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:14 np0005479288.novalocal runuser[83305]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:15 np0005479288.novalocal runuser[83305]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:15 np0005479288.novalocal runuser[83357]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:16 np0005479288.novalocal runuser[83357]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:16 np0005479288.novalocal runuser[83409]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:16 np0005479288.novalocal runuser[83409]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:16 np0005479288.novalocal runuser[83461]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:17 np0005479288.novalocal runuser[83461]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:17 np0005479288.novalocal runuser[83513]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:18 np0005479288.novalocal runuser[83513]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:18 np0005479288.novalocal runuser[83567]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:19 np0005479288.novalocal runuser[83567]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:19 np0005479288.novalocal runuser[83619]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:19 np0005479288.novalocal runuser[83619]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:19 np0005479288.novalocal runuser[83673]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:20 np0005479288.novalocal runuser[83673]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:20 np0005479288.novalocal runuser[83725]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:21 np0005479288.novalocal runuser[83725]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:21 np0005479288.novalocal runuser[83777]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:21 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Oct 09 23:21:21 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.150s CPU time. Oct 09 23:21:21 np0005479288.novalocal runuser[83777]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:21 np0005479288.novalocal runuser[83829]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:22 np0005479288.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 09 23:21:22 np0005479288.novalocal runuser[83829]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:23 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:23 np0005479288.novalocal systemd-sysv-generator[83910]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:23 np0005479288.novalocal systemd-rc-local-generator[83907]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:23 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:23 np0005479288.novalocal systemd[1]: Started OpenStack Cinder Scheduler Server. Oct 09 23:21:23 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:23 np0005479288.novalocal systemd-rc-local-generator[83939]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:23 np0005479288.novalocal systemd-sysv-generator[83943]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:23 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:24 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:24 np0005479288.novalocal systemd-rc-local-generator[83968]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:24 np0005479288.novalocal systemd-sysv-generator[83971]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:24 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:24 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:24 np0005479288.novalocal systemd-rc-local-generator[83999]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:24 np0005479288.novalocal systemd-sysv-generator[84004]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:24 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:25 np0005479288.novalocal systemd[1]: Started OpenStack Cinder Volume Server. Oct 09 23:21:25 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:25 np0005479288.novalocal systemd-rc-local-generator[84034]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:25 np0005479288.novalocal systemd-sysv-generator[84037]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:25 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:25 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:25 np0005479288.novalocal systemd-sysv-generator[84067]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:25 np0005479288.novalocal systemd-rc-local-generator[84064]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:25 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:26 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:26 np0005479288.novalocal systemd-rc-local-generator[84093]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:26 np0005479288.novalocal systemd-sysv-generator[84097]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:26 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:26 np0005479288.novalocal systemd[1]: Started OpenStack Cinder Backup Server. Oct 09 23:21:27 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:27 np0005479288.novalocal systemd-sysv-generator[84137]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:27 np0005479288.novalocal systemd-rc-local-generator[84131]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:27 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:27 np0005479288.novalocal sudo[84143]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings -o name cinder-volumes Oct 09 23:21:27 np0005479288.novalocal systemd[1]: Created slice User Slice of UID 0. Oct 09 23:21:27 np0005479288.novalocal systemd[1]: Starting User Runtime Directory /run/user/0... Oct 09 23:21:27 np0005479288.novalocal systemd[1]: Finished User Runtime Directory /run/user/0. Oct 09 23:21:27 np0005479288.novalocal systemd[1]: Starting User Manager for UID 0... Oct 09 23:21:27 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:27 np0005479288.novalocal systemd-sysv-generator[84172]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:27 np0005479288.novalocal systemd-rc-local-generator[84168]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:27 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: pam_unix(systemd-user:session): session opened for user root(uid=0) by root(uid=0) Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: Queued start job for default target Main User Target. Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: Created slice User Application Slice. Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: Started Daily Cleanup of User's Temporary Directories. Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: Reached target Paths. Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: Reached target Timers. Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: Starting D-Bus User Message Bus Socket... Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: PipeWire PulseAudio was skipped because of an unmet condition check (ConditionUser=!root). Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: Listening on PipeWire Multimedia System Sockets. Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: Starting Create User's Volatile Files and Directories... Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: Listening on D-Bus User Message Bus Socket. Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: Reached target Sockets. Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: Finished Create User's Volatile Files and Directories. Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: Reached target Basic System. Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: Reached target Main User Target. Oct 09 23:21:27 np0005479288.novalocal systemd[84147]: Startup finished in 272ms. Oct 09 23:21:27 np0005479288.novalocal systemd[1]: Started User Manager for UID 0. Oct 09 23:21:27 np0005479288.novalocal systemd[1]: Started Session c1 of User root. Oct 09 23:21:27 np0005479288.novalocal sudo[84143]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:28 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:28 np0005479288.novalocal systemd-rc-local-generator[84212]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:28 np0005479288.novalocal systemd-sysv-generator[84215]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:28 np0005479288.novalocal sudo[84143]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:28 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:28 np0005479288.novalocal systemd[1]: session-c1.scope: Deactivated successfully. Oct 09 23:21:28 np0005479288.novalocal sudo[84220]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Oct 09 23:21:28 np0005479288.novalocal systemd[1]: Started Session c2 of User root. Oct 09 23:21:28 np0005479288.novalocal sudo[84220]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:28 np0005479288.novalocal systemd[1]: Starting Restore LIO kernel target configuration... Oct 09 23:21:28 np0005479288.novalocal kernel: Rounding down aligned max_sectors from 4294967295 to 4294967288 Oct 09 23:21:28 np0005479288.novalocal target[84224]: No saved config file at /etc/target/saveconfig.json, ok, exiting Oct 09 23:21:28 np0005479288.novalocal systemd[1]: Finished Restore LIO kernel target configuration. Oct 09 23:21:28 np0005479288.novalocal sudo[84220]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:28 np0005479288.novalocal systemd[1]: session-c2.scope: Deactivated successfully. Oct 09 23:21:28 np0005479288.novalocal sudo[84233]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:21:28 np0005479288.novalocal systemd[1]: Started Session c3 of User root. Oct 09 23:21:28 np0005479288.novalocal sudo[84233]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:28 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:28 np0005479288.novalocal systemd-sysv-generator[84261]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:28 np0005479288.novalocal systemd-rc-local-generator[84256]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:29 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:29 np0005479288.novalocal sudo[84233]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:29 np0005479288.novalocal systemd[1]: session-c3.scope: Deactivated successfully. Oct 09 23:21:29 np0005479288.novalocal sudo[84268]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -L 14.25g cinder-volumes/cinder-volumes-pool Oct 09 23:21:29 np0005479288.novalocal systemd[1]: Started Session c4 of User root. Oct 09 23:21:29 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:29 np0005479288.novalocal systemd-sysv-generator[84293]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:29 np0005479288.novalocal systemd-rc-local-generator[84290]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:29 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:29 np0005479288.novalocal sudo[84268]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:29 np0005479288.novalocal runuser[84301]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:30 np0005479288.novalocal systemd[1]: Started Device-mapper event daemon. Oct 09 23:21:30 np0005479288.novalocal dmeventd[84378]: dmeventd ready for processing. Oct 09 23:21:30 np0005479288.novalocal dmeventd[84378]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Oct 09 23:21:30 np0005479288.novalocal lvm[84384]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:21:30 np0005479288.novalocal lvm[84384]: VG cinder-volumes finished Oct 09 23:21:30 np0005479288.novalocal sudo[84268]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:30 np0005479288.novalocal systemd[1]: session-c4.scope: Deactivated successfully. Oct 09 23:21:30 np0005479288.novalocal sudo[84386]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/cinder-volumes-pool Oct 09 23:21:30 np0005479288.novalocal systemd[1]: Started Session c5 of User root. Oct 09 23:21:30 np0005479288.novalocal sudo[84386]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:30 np0005479288.novalocal runuser[84301]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:30 np0005479288.novalocal runuser[84396]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:30 np0005479288.novalocal sudo[84386]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:30 np0005479288.novalocal systemd[1]: session-c5.scope: Deactivated successfully. Oct 09 23:21:30 np0005479288.novalocal sudo[84443]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C pvs --noheadings --unit=g -o vg_name,name,size,free --separator | --nosuffix --ignoreskippedcluster Oct 09 23:21:30 np0005479288.novalocal systemd[1]: Started Session c6 of User root. Oct 09 23:21:30 np0005479288.novalocal sudo[84443]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:31 np0005479288.novalocal sudo[84443]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:31 np0005479288.novalocal systemd[1]: session-c6.scope: Deactivated successfully. Oct 09 23:21:31 np0005479288.novalocal sudo[84448]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:21:31 np0005479288.novalocal systemd[1]: Started Session c7 of User root. Oct 09 23:21:31 np0005479288.novalocal sudo[84448]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:31 np0005479288.novalocal runuser[84396]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:31 np0005479288.novalocal runuser[84458]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:31 np0005479288.novalocal sudo[84448]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:31 np0005479288.novalocal systemd[1]: session-c7.scope: Deactivated successfully. Oct 09 23:21:31 np0005479288.novalocal sudo[84504]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:21:31 np0005479288.novalocal systemd[1]: Started Session c8 of User root. Oct 09 23:21:31 np0005479288.novalocal sudo[84504]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:31 np0005479288.novalocal sudo[84504]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:31 np0005479288.novalocal systemd[1]: session-c8.scope: Deactivated successfully. Oct 09 23:21:31 np0005479288.novalocal sudo[84512]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:21:31 np0005479288.novalocal systemd[1]: Started Session c9 of User root. Oct 09 23:21:31 np0005479288.novalocal sudo[84512]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:31 np0005479288.novalocal runuser[84458]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:32 np0005479288.novalocal runuser[84518]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:32 np0005479288.novalocal sudo[84512]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:32 np0005479288.novalocal systemd[1]: session-c9.scope: Deactivated successfully. Oct 09 23:21:32 np0005479288.novalocal sudo[84564]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:21:32 np0005479288.novalocal systemd[1]: Started Session c10 of User root. Oct 09 23:21:32 np0005479288.novalocal sudo[84564]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:32 np0005479288.novalocal sudo[84564]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:32 np0005479288.novalocal systemd[1]: session-c10.scope: Deactivated successfully. Oct 09 23:21:32 np0005479288.novalocal sudo[84569]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Oct 09 23:21:32 np0005479288.novalocal systemd[1]: Started Session c11 of User root. Oct 09 23:21:32 np0005479288.novalocal sudo[84569]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:32 np0005479288.novalocal runuser[84518]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:33 np0005479288.novalocal sudo[84569]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:33 np0005479288.novalocal systemd[1]: session-c11.scope: Deactivated successfully. Oct 09 23:21:33 np0005479288.novalocal sudo[84584]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Oct 09 23:21:33 np0005479288.novalocal systemd[1]: Started Session c12 of User root. Oct 09 23:21:33 np0005479288.novalocal sudo[84584]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:33 np0005479288.novalocal runuser[84586]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:33 np0005479288.novalocal sudo[84584]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:33 np0005479288.novalocal systemd[1]: session-c12.scope: Deactivated successfully. Oct 09 23:21:33 np0005479288.novalocal sudo[84633]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:21:33 np0005479288.novalocal systemd[1]: Started Session c13 of User root. Oct 09 23:21:33 np0005479288.novalocal sudo[84633]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:33 np0005479288.novalocal sudo[84633]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:33 np0005479288.novalocal systemd[1]: session-c13.scope: Deactivated successfully. Oct 09 23:21:33 np0005479288.novalocal runuser[84586]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:33 np0005479288.novalocal sudo[84644]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:21:33 np0005479288.novalocal systemd[1]: Started Session c14 of User root. Oct 09 23:21:33 np0005479288.novalocal sudo[84644]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:34 np0005479288.novalocal runuser[84646]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:34 np0005479288.novalocal sudo[84644]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:34 np0005479288.novalocal systemd[1]: session-c14.scope: Deactivated successfully. Oct 09 23:21:34 np0005479288.novalocal sudo[84693]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:21:34 np0005479288.novalocal systemd[1]: Started Session c15 of User root. Oct 09 23:21:34 np0005479288.novalocal sudo[84693]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:34 np0005479288.novalocal sudo[84693]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:34 np0005479288.novalocal systemd[1]: session-c15.scope: Deactivated successfully. Oct 09 23:21:34 np0005479288.novalocal sudo[84697]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:21:34 np0005479288.novalocal systemd[1]: Started Session c16 of User root. Oct 09 23:21:34 np0005479288.novalocal sudo[84697]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:34 np0005479288.novalocal runuser[84646]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:34 np0005479288.novalocal runuser[84707]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:34 np0005479288.novalocal sudo[84697]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:34 np0005479288.novalocal systemd[1]: session-c16.scope: Deactivated successfully. Oct 09 23:21:35 np0005479288.novalocal sudo[84754]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:21:35 np0005479288.novalocal systemd[1]: Started Session c17 of User root. Oct 09 23:21:35 np0005479288.novalocal sudo[84754]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:35 np0005479288.novalocal sudo[84754]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:35 np0005479288.novalocal systemd[1]: session-c17.scope: Deactivated successfully. Oct 09 23:21:35 np0005479288.novalocal runuser[84707]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:35 np0005479288.novalocal sudo[84765]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:21:35 np0005479288.novalocal systemd[1]: Started Session c18 of User root. Oct 09 23:21:35 np0005479288.novalocal sudo[84765]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:35 np0005479288.novalocal runuser[84767]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:35 np0005479288.novalocal sudo[84765]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:35 np0005479288.novalocal systemd[1]: session-c18.scope: Deactivated successfully. Oct 09 23:21:35 np0005479288.novalocal sudo[84814]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:21:35 np0005479288.novalocal systemd[1]: Started Session c19 of User root. Oct 09 23:21:35 np0005479288.novalocal sudo[84814]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:36 np0005479288.novalocal runuser[84767]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:36 np0005479288.novalocal sudo[84814]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:36 np0005479288.novalocal systemd[1]: session-c19.scope: Deactivated successfully. Oct 09 23:21:36 np0005479288.novalocal sudo[84825]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:21:36 np0005479288.novalocal systemd[1]: Started Session c20 of User root. Oct 09 23:21:36 np0005479288.novalocal sudo[84825]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:36 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:36 np0005479288.novalocal sudo[84825]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:36 np0005479288.novalocal systemd-sysv-generator[84858]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:36 np0005479288.novalocal systemd-rc-local-generator[84854]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:36 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:36 np0005479288.novalocal systemd[1]: session-c20.scope: Deactivated successfully. Oct 09 23:21:36 np0005479288.novalocal sudo[84863]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:21:36 np0005479288.novalocal systemd[1]: Started Session c21 of User root. Oct 09 23:21:36 np0005479288.novalocal sudo[84863]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:36 np0005479288.novalocal systemd[1]: Starting OpenStack Neutron Server... Oct 09 23:21:37 np0005479288.novalocal sudo[84863]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:37 np0005479288.novalocal systemd[1]: session-c21.scope: Deactivated successfully. Oct 09 23:21:37 np0005479288.novalocal sudo[84871]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:21:37 np0005479288.novalocal systemd[1]: Started Session c22 of User root. Oct 09 23:21:37 np0005479288.novalocal sudo[84871]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:37 np0005479288.novalocal sudo[84871]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:37 np0005479288.novalocal systemd[1]: session-c22.scope: Deactivated successfully. Oct 09 23:21:37 np0005479288.novalocal sudo[84875]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:21:37 np0005479288.novalocal systemd[1]: Started Session c23 of User root. Oct 09 23:21:37 np0005479288.novalocal sudo[84875]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:38 np0005479288.novalocal sudo[84875]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:38 np0005479288.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 09 23:21:38 np0005479288.novalocal systemd[1]: session-c23.scope: Deactivated successfully. Oct 09 23:21:38 np0005479288.novalocal sudo[84880]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:21:38 np0005479288.novalocal systemd[1]: Started Session c24 of User root. Oct 09 23:21:38 np0005479288.novalocal sudo[84880]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:21:38 np0005479288.novalocal sudo[84880]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:38 np0005479288.novalocal systemd[1]: session-c24.scope: Deactivated successfully. Oct 09 23:21:38 np0005479288.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 09 23:21:38 np0005479288.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service. Oct 09 23:21:40 np0005479288.novalocal setroubleshoot[84879]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l cc2b91e0-5e79-4d9a-bd53-ce8c0a59c745 Oct 09 23:21:40 np0005479288.novalocal setroubleshoot[84879]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Oct 09 23:21:40 np0005479288.novalocal systemd[1]: Started OpenStack Neutron Server. Oct 09 23:21:40 np0005479288.novalocal setroubleshoot[84879]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l cc2b91e0-5e79-4d9a-bd53-ce8c0a59c745 Oct 09 23:21:40 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:40 np0005479288.novalocal setroubleshoot[84879]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Oct 09 23:21:40 np0005479288.novalocal systemd-rc-local-generator[84932]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:40 np0005479288.novalocal systemd-sysv-generator[84935]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:40 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:41 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:41 np0005479288.novalocal systemd-rc-local-generator[84960]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:41 np0005479288.novalocal systemd-sysv-generator[84966]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:41 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:41 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:41 np0005479288.novalocal systemd-sysv-generator[84997]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:41 np0005479288.novalocal systemd-rc-local-generator[84994]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:41 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:42 np0005479288.novalocal systemd[1]: Started OpenStack Neutron OVN Agent. Oct 09 23:21:42 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:42 np0005479288.novalocal systemd-rc-local-generator[85025]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:42 np0005479288.novalocal systemd-sysv-generator[85029]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:42 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:42 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:42 np0005479288.novalocal systemd-rc-local-generator[85052]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:42 np0005479288.novalocal systemd-sysv-generator[85059]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:42 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:43 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:43 np0005479288.novalocal systemd-sysv-generator[85088]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:43 np0005479288.novalocal systemd-rc-local-generator[85085]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:43 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:43 np0005479288.novalocal systemd[1]: Started OpenStack Neutron VPNaaS support for OVN. Oct 09 23:21:44 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:44 np0005479288.novalocal systemd-rc-local-generator[85119]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:44 np0005479288.novalocal systemd-sysv-generator[85122]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:44 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:44 np0005479288.novalocal sudo[85101]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmp3v8xtzbi/privsep.sock Oct 09 23:21:44 np0005479288.novalocal systemd[1]: Started Session c25 of User root. Oct 09 23:21:44 np0005479288.novalocal sudo[85101]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:21:44 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:44 np0005479288.novalocal systemd-sysv-generator[85160]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:44 np0005479288.novalocal systemd-rc-local-generator[85157]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:44 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:44 np0005479288.novalocal runuser[85165]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:44 np0005479288.novalocal kernel: capability: warning: `privsep-helper' uses deprecated v2 capabilities in a way that may be insecure Oct 09 23:21:45 np0005479288.novalocal sudo[85101]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:45 np0005479288.novalocal runuser[85165]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:45 np0005479288.novalocal runuser[85221]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:46 np0005479288.novalocal runuser[85221]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:46 np0005479288.novalocal runuser[85275]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:46 np0005479288.novalocal sudo[85291]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmp0i194s_f/privsep.sock Oct 09 23:21:46 np0005479288.novalocal systemd[1]: Started Session c26 of User root. Oct 09 23:21:46 np0005479288.novalocal sudo[85291]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:21:46 np0005479288.novalocal runuser[85275]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:47 np0005479288.novalocal runuser[85331]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:21:47 np0005479288.novalocal sudo[85291]: pam_unix(sudo:session): session closed for user root Oct 09 23:21:47 np0005479288.novalocal runuser[85331]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:21:48 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:48 np0005479288.novalocal systemd-rc-local-generator[85415]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:48 np0005479288.novalocal systemd-sysv-generator[85418]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:48 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:48 np0005479288.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Oct 09 23:21:48 np0005479288.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Oct 09 23:21:49 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:49 np0005479288.novalocal systemd-rc-local-generator[85448]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:49 np0005479288.novalocal systemd-sysv-generator[85451]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:49 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:49 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:49 np0005479288.novalocal systemd-rc-local-generator[85477]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:49 np0005479288.novalocal systemd-sysv-generator[85481]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:49 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:50 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:50 np0005479288.novalocal systemd-rc-local-generator[85512]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:50 np0005479288.novalocal systemd-sysv-generator[85516]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:50 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:50 np0005479288.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 09 23:21:50 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Oct 09 23:21:50 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Consumed 1.110s CPU time. Oct 09 23:21:50 np0005479288.novalocal systemd[1]: Listening on libvirt locking daemon socket. Oct 09 23:21:50 np0005479288.novalocal systemd[1]: Listening on libvirt locking daemon admin socket. Oct 09 23:21:50 np0005479288.novalocal systemd[1]: Starting libvirt locking daemon... Oct 09 23:21:51 np0005479288.novalocal systemd[1]: Started libvirt locking daemon. Oct 09 23:21:51 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:51 np0005479288.novalocal systemd-sysv-generator[85551]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:51 np0005479288.novalocal systemd-rc-local-generator[85547]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:51 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:51 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:51 np0005479288.novalocal systemd-sysv-generator[85578]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:51 np0005479288.novalocal systemd-rc-local-generator[85572]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:51 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:52 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:52 np0005479288.novalocal systemd-sysv-generator[85610]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:52 np0005479288.novalocal systemd-rc-local-generator[85607]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:52 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:52 np0005479288.novalocal systemd[1]: Listening on libvirt logging daemon socket. Oct 09 23:21:52 np0005479288.novalocal systemd[1]: Listening on libvirt logging daemon admin socket. Oct 09 23:21:52 np0005479288.novalocal systemd[1]: Starting libvirt logging daemon... Oct 09 23:21:52 np0005479288.novalocal systemd[1]: Started libvirt logging daemon. Oct 09 23:21:53 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:53 np0005479288.novalocal systemd-rc-local-generator[85640]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:53 np0005479288.novalocal systemd-sysv-generator[85643]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:53 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:53 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:53 np0005479288.novalocal systemd-rc-local-generator[85668]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:53 np0005479288.novalocal systemd-sysv-generator[85672]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:53 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:54 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:54 np0005479288.novalocal systemd-sysv-generator[85704]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:54 np0005479288.novalocal systemd-rc-local-generator[85699]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:54 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:54 np0005479288.novalocal systemd[1]: Listening on libvirt secret daemon socket. Oct 09 23:21:55 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:55 np0005479288.novalocal systemd-rc-local-generator[85738]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:55 np0005479288.novalocal systemd-sysv-generator[85741]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:55 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:55 np0005479288.novalocal systemd[1]: Listening on libvirt nodedev daemon socket. Oct 09 23:21:56 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:56 np0005479288.novalocal systemd-rc-local-generator[85773]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:56 np0005479288.novalocal systemd-sysv-generator[85776]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:56 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:56 np0005479288.novalocal systemd[1]: Listening on libvirt QEMU daemon socket. Oct 09 23:21:56 np0005479288.novalocal systemd[1]: virtproxyd-tcp.socket: Deactivated successfully. Oct 09 23:21:56 np0005479288.novalocal systemd[1]: Closed libvirt proxy daemon non-TLS IP socket. Oct 09 23:21:56 np0005479288.novalocal systemd[1]: Stopping libvirt proxy daemon non-TLS IP socket... Oct 09 23:21:56 np0005479288.novalocal systemd[1]: virtproxyd.socket: Deactivated successfully. Oct 09 23:21:56 np0005479288.novalocal systemd[1]: Closed libvirt proxy daemon socket. Oct 09 23:21:56 np0005479288.novalocal systemd[1]: Stopping libvirt proxy daemon socket... Oct 09 23:21:56 np0005479288.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Oct 09 23:21:56 np0005479288.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Oct 09 23:21:57 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:57 np0005479288.novalocal systemd-sysv-generator[85819]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:57 np0005479288.novalocal systemd-rc-local-generator[85814]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:57 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:57 np0005479288.novalocal systemd[1]: Listening on libvirt storage daemon socket. Oct 09 23:21:58 np0005479288.novalocal systemd[1]: Created slice Virtual Machine and Container Slice. Oct 09 23:21:58 np0005479288.novalocal systemd[1]: Listening on libvirt QEMU daemon admin socket. Oct 09 23:21:58 np0005479288.novalocal systemd[1]: Listening on libvirt QEMU daemon read-only socket. Oct 09 23:21:58 np0005479288.novalocal systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 09 23:21:58 np0005479288.novalocal systemd[1]: Starting Virtual Machine and Container Registration Service... Oct 09 23:21:58 np0005479288.novalocal systemd[1]: Started Virtual Machine and Container Registration Service. Oct 09 23:21:58 np0005479288.novalocal systemd[1]: Starting libvirt QEMU daemon... Oct 09 23:21:58 np0005479288.novalocal systemd[1]: Started libvirt QEMU daemon. Oct 09 23:21:58 np0005479288.novalocal virtqemud[85829]: libvirt version: 10.10.0, package: 15.el9 (builder@centos.org, 2025-08-18-13:22:20, ) Oct 09 23:21:58 np0005479288.novalocal virtqemud[85829]: hostname: np0005479288.novalocal Oct 09 23:21:58 np0005479288.novalocal virtqemud[85829]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Oct 09 23:21:58 np0005479288.novalocal virtqemud[85829]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Oct 09 23:21:58 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:58 np0005479288.novalocal systemd-rc-local-generator[85874]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:58 np0005479288.novalocal systemd-sysv-generator[85877]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:59 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:59 np0005479288.novalocal systemd[1]: Reached target libvirt guests shutdown target. Oct 09 23:21:59 np0005479288.novalocal systemd[1]: Starting libvirt guests suspend/resume service... Oct 09 23:21:59 np0005479288.novalocal systemd[1]: Finished libvirt guests suspend/resume service. Oct 09 23:21:59 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:59 np0005479288.novalocal systemd-rc-local-generator[85912]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:21:59 np0005479288.novalocal systemd-sysv-generator[85916]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:59 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:21:59 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:21:59 np0005479288.novalocal systemd-sysv-generator[85948]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:21:59 np0005479288.novalocal systemd-rc-local-generator[85945]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:00 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:22:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:22:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:22:00 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:00 np0005479288.novalocal systemd-rc-local-generator[85980]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:00 np0005479288.novalocal systemd-sysv-generator[85983]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:01 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:01 np0005479288.novalocal systemd[1]: Started OpenStack Nova NoVNC Proxy Server. Oct 09 23:22:01 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:01 np0005479288.novalocal systemd-sysv-generator[86014]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:01 np0005479288.novalocal systemd-rc-local-generator[86011]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:01 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:01 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:02 np0005479288.novalocal systemd-rc-local-generator[86037]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:02 np0005479288.novalocal systemd-sysv-generator[86042]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:02 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:02 np0005479288.novalocal runuser[86049]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:22:02 np0005479288.novalocal runuser[86049]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:22:03 np0005479288.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 09 23:22:03 np0005479288.novalocal runuser[86101]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:22:03 np0005479288.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 09 23:22:03 np0005479288.novalocal runuser[86101]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:22:03 np0005479288.novalocal runuser[86155]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:22:04 np0005479288.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service. Oct 09 23:22:04 np0005479288.novalocal runuser[86155]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:22:04 np0005479288.novalocal runuser[86216]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l ba55aba6-1870-42bc-8561-384a030404b7 Oct 09 23:22:05 np0005479288.novalocal runuser[86216]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l ba55aba6-1870-42bc-8561-384a030404b7 Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 58c96777-e6e6-4488-a3e6-1c2c16af6490 Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l d497a013-e70f-43f9-b11c-41f62c852ad9 Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 809ade01-f6a6-46dc-9ba2-e2cc34b33d90 Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l a396c46e-a867-4499-b470-cefa5c4cf57d Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 48d260ab-ef12-46a9-9f00-1708dbd23c28 Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 95386d10-55b7-4795-86d5-4ce1b29fa200 Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 57ee6f95-7606-4a9d-83dc-6f9ab9fbe191 Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 3483a307-1c8a-4381-a017-c08e3aefafa4 Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 930f28bf-5bac-40d5-acb5-6babdc1cacd5 Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 0782796b-ffb0-47ae-b678-eca8e3f82c83 Oct 09 23:22:05 np0005479288.novalocal setroubleshoot[86109]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 09 23:22:05 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:05 np0005479288.novalocal systemd-rc-local-generator[86308]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:06 np0005479288.novalocal systemd-sysv-generator[86311]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:06 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:06 np0005479288.novalocal systemd[1]: Started OpenStack Octavia Health-Manager service. Oct 09 23:22:06 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:06 np0005479288.novalocal systemd-rc-local-generator[86337]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:06 np0005479288.novalocal systemd-sysv-generator[86340]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:06 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:06 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:06 np0005479288.novalocal systemd-sysv-generator[86370]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:06 np0005479288.novalocal systemd-rc-local-generator[86366]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:06 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:07 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:07 np0005479288.novalocal systemd-rc-local-generator[86397]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:07 np0005479288.novalocal systemd-sysv-generator[86400]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:07 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:07 np0005479288.novalocal systemd[1]: Started OpenStack Octavia Housekeeping service. Oct 09 23:22:08 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:08 np0005479288.novalocal systemd-sysv-generator[86435]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:08 np0005479288.novalocal systemd-rc-local-generator[86432]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:08 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:08 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:08 np0005479288.novalocal systemd-sysv-generator[86465]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:08 np0005479288.novalocal systemd-rc-local-generator[86461]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:08 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:09 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:09 np0005479288.novalocal systemd-rc-local-generator[86493]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:09 np0005479288.novalocal systemd-sysv-generator[86496]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:09 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:09 np0005479288.novalocal systemd[1]: Started OpenStack Octavia Driver Agent service. Oct 09 23:22:09 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:09 np0005479288.novalocal systemd-rc-local-generator[86525]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:09 np0005479288.novalocal systemd-sysv-generator[86530]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:09 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:10 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:10 np0005479288.novalocal systemd-sysv-generator[86597]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:10 np0005479288.novalocal systemd-rc-local-generator[86594]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:10 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:10 np0005479288.novalocal runuser[86603]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:22:11 np0005479288.novalocal runuser[86603]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:22:11 np0005479288.novalocal runuser[86657]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:22:12 np0005479288.novalocal runuser[86657]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:22:12 np0005479288.novalocal runuser[86712]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:22:12 np0005479288.novalocal runuser[86712]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:22:12 np0005479288.novalocal runuser[86764]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:22:13 np0005479288.novalocal runuser[86764]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:22:14 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:14 np0005479288.novalocal systemd-sysv-generator[86858]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:14 np0005479288.novalocal systemd-rc-local-generator[86854]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:14 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:14 np0005479288.novalocal systemd[1]: Started OpenStack Manila Scheduler. Oct 09 23:22:14 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:14 np0005479288.novalocal systemd-rc-local-generator[86891]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:14 np0005479288.novalocal systemd-sysv-generator[86894]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:14 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:15 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:15 np0005479288.novalocal systemd-sysv-generator[86924]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:15 np0005479288.novalocal systemd-rc-local-generator[86920]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:15 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:15 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Deactivated successfully. Oct 09 23:22:15 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Consumed 1.160s CPU time. Oct 09 23:22:15 np0005479288.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 09 23:22:15 np0005479288.novalocal systemd[1]: setroubleshootd.service: Consumed 1.637s CPU time. Oct 09 23:22:15 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:16 np0005479288.novalocal systemd-rc-local-generator[86954]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:16 np0005479288.novalocal systemd-sysv-generator[86958]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:16 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:16 np0005479288.novalocal systemd[1]: Started OpenStack Manila Share Service. Oct 09 23:22:16 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:16 np0005479288.novalocal systemd-rc-local-generator[86987]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:16 np0005479288.novalocal systemd-sysv-generator[86991]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:16 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:16 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:17 np0005479288.novalocal systemd-rc-local-generator[87016]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:17 np0005479288.novalocal systemd-sysv-generator[87019]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:17 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:17 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:17 np0005479288.novalocal systemd-rc-local-generator[87049]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:17 np0005479288.novalocal systemd-sysv-generator[87052]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:17 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:17 np0005479288.novalocal sudo[87057]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/privsep-helper --config-file /usr/share/manila/manila-dist.conf --config-file /etc/manila/manila.conf --privsep_context manila.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpb8d3rpkl/privsep.sock Oct 09 23:22:17 np0005479288.novalocal systemd[1]: Started Session c27 of User root. Oct 09 23:22:18 np0005479288.novalocal sudo[87057]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=978) Oct 09 23:22:18 np0005479288.novalocal systemd[1]: Started OpenStack Manila Data Server. Oct 09 23:22:18 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:18 np0005479288.novalocal systemd-sysv-generator[87088]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:18 np0005479288.novalocal systemd-rc-local-generator[87084]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:18 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:18 np0005479288.novalocal sudo[87057]: pam_unix(sudo:session): session closed for user root Oct 09 23:22:18 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:18 np0005479288.novalocal systemd-sysv-generator[87119]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:18 np0005479288.novalocal systemd-rc-local-generator[87114]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:18 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:19 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:19 np0005479288.novalocal systemd-rc-local-generator[87153]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:19 np0005479288.novalocal systemd-sysv-generator[87157]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:19 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:20 np0005479288.novalocal systemd[1]: Starting One-time temporary TLS key generation for httpd.service... Oct 09 23:22:20 np0005479288.novalocal systemd[1]: httpd-init.service: Deactivated successfully. Oct 09 23:22:20 np0005479288.novalocal systemd[1]: Finished One-time temporary TLS key generation for httpd.service. Oct 09 23:22:20 np0005479288.novalocal systemd[1]: Starting The Apache HTTP Server... Oct 09 23:22:20 np0005479288.novalocal python3[87166]: /usr/lib/python3.9/site-packages/django/conf/__init__.py:267: RemovedInDjango50Warning: The USE_L10N setting is deprecated. Starting with Django 5.0, localized formatting of data will always be enabled. For example Django will display numbers and dates using the format of the current locale. Oct 09 23:22:20 np0005479288.novalocal python3[87166]: warnings.warn(USE_L10N_DEPRECATED_MSG, RemovedInDjango50Warning) Oct 09 23:22:21 np0005479288.novalocal python3[87166]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Oct 09 23:22:21 np0005479288.novalocal python3[87166]: version_info = version.StrictVersion(__version__).version Oct 09 23:22:23 np0005479288.novalocal python3[87168]: /usr/lib/python3.9/site-packages/django/conf/__init__.py:267: RemovedInDjango50Warning: The USE_L10N setting is deprecated. Starting with Django 5.0, localized formatting of data will always be enabled. For example Django will display numbers and dates using the format of the current locale. Oct 09 23:22:23 np0005479288.novalocal python3[87168]: warnings.warn(USE_L10N_DEPRECATED_MSG, RemovedInDjango50Warning) Oct 09 23:22:24 np0005479288.novalocal python3[87168]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Oct 09 23:22:24 np0005479288.novalocal python3[87168]: version_info = version.StrictVersion(__version__).version Oct 09 23:22:32 np0005479288.novalocal httpd[87178]: Server configured, listening on: ::1 port 9876, ... Oct 09 23:22:32 np0005479288.novalocal systemd[1]: Started The Apache HTTP Server. Oct 09 23:22:32 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:32 np0005479288.novalocal systemd-rc-local-generator[87251]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:32 np0005479288.novalocal systemd-sysv-generator[87255]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:32 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:32 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:22:33 np0005479288.novalocal systemd-sysv-generator[87321]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:22:33 np0005479288.novalocal systemd-rc-local-generator[87317]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:22:33 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:22:33 np0005479288.novalocal crontab[87326]: (root) REPLACE (keystone) Oct 09 23:22:35 np0005479288.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 09 23:22:35 np0005479288.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 09 23:22:36 np0005479288.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service. Oct 09 23:22:37 np0005479288.novalocal setroubleshoot[87329]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 869d525a-9334-4e6f-a6cc-257038962fcc Oct 09 23:22:37 np0005479288.novalocal setroubleshoot[87329]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:22:37 np0005479288.novalocal setroubleshoot[87329]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 34248e2e-9a59-4392-aeb4-7946e6d228f1 Oct 09 23:22:37 np0005479288.novalocal setroubleshoot[87329]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:22:37 np0005479288.novalocal setroubleshoot[87329]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 1a85fcbd-3855-4cd9-afd1-ecd10a1cea92 Oct 09 23:22:37 np0005479288.novalocal setroubleshoot[87329]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:22:37 np0005479288.novalocal setroubleshoot[87329]: failed to retrieve rpm info for path '/var/lib/keystone/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1': Oct 09 23:22:37 np0005479288.novalocal setroubleshoot[87329]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. For complete SELinux messages run: sealert -l 05717274-83d6-40e4-a630-f7df4e319658 Oct 09 23:22:37 np0005479288.novalocal setroubleshoot[87329]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:22:47 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Deactivated successfully. Oct 09 23:22:47 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Consumed 1.123s CPU time. Oct 09 23:22:47 np0005479288.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 09 23:22:47 np0005479288.novalocal systemd[1]: setroubleshootd.service: Consumed 1.055s CPU time. Oct 09 23:22:48 np0005479288.novalocal sudo[87353]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:22:48 np0005479288.novalocal systemd[1]: Started Session c28 of User root. Oct 09 23:22:48 np0005479288.novalocal sudo[87353]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:22:48 np0005479288.novalocal sudo[87353]: pam_unix(sudo:session): session closed for user root Oct 09 23:22:48 np0005479288.novalocal systemd[1]: session-c28.scope: Deactivated successfully. Oct 09 23:22:48 np0005479288.novalocal sudo[87357]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:22:48 np0005479288.novalocal systemd[1]: Started Session c29 of User root. Oct 09 23:22:49 np0005479288.novalocal sudo[87357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:22:49 np0005479288.novalocal sudo[87357]: pam_unix(sudo:session): session closed for user root Oct 09 23:22:49 np0005479288.novalocal systemd[1]: session-c29.scope: Deactivated successfully. Oct 09 23:22:49 np0005479288.novalocal sudo[87361]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:22:49 np0005479288.novalocal systemd[1]: Started Session c30 of User root. Oct 09 23:22:49 np0005479288.novalocal sudo[87361]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:22:49 np0005479288.novalocal sudo[87361]: pam_unix(sudo:session): session closed for user root Oct 09 23:22:49 np0005479288.novalocal systemd[1]: session-c30.scope: Deactivated successfully. Oct 09 23:22:49 np0005479288.novalocal sudo[87368]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:22:49 np0005479288.novalocal systemd[1]: Started Session c31 of User root. Oct 09 23:22:49 np0005479288.novalocal sudo[87368]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:22:50 np0005479288.novalocal sudo[87368]: pam_unix(sudo:session): session closed for user root Oct 09 23:22:50 np0005479288.novalocal systemd[1]: session-c31.scope: Deactivated successfully. Oct 09 23:22:58 np0005479288.novalocal irqbalance[791]: Cannot change IRQ 26 affinity: Operation not permitted Oct 09 23:22:58 np0005479288.novalocal irqbalance[791]: IRQ 26 affinity is now unmanaged Oct 09 23:23:01 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:23:01 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:23:01 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:23:10 np0005479288.novalocal octavia-health-manager[86509]: /usr/lib/python3.9/site-packages/octavia/db/repositories.py:1594: SAWarning: Coercing Subquery object into a select() for use in IN(); please pass a select() construct explicitly Oct 09 23:23:10 np0005479288.novalocal octavia-health-manager[86509]: self.model_class.amphora_id.in_(expired_ids_query) Oct 09 23:23:48 np0005479288.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 09 23:23:48 np0005479288.novalocal sudo[87452]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:23:48 np0005479288.novalocal systemd[1]: Started Session c32 of User root. Oct 09 23:23:48 np0005479288.novalocal sudo[87452]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:23:48 np0005479288.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 09 23:23:48 np0005479288.novalocal sudo[87452]: pam_unix(sudo:session): session closed for user root Oct 09 23:23:48 np0005479288.novalocal systemd[1]: session-c32.scope: Deactivated successfully. Oct 09 23:23:48 np0005479288.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service. Oct 09 23:23:48 np0005479288.novalocal sudo[87464]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:23:49 np0005479288.novalocal systemd[1]: Started Session c33 of User root. Oct 09 23:23:49 np0005479288.novalocal sudo[87464]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:23:49 np0005479288.novalocal sudo[87464]: pam_unix(sudo:session): session closed for user root Oct 09 23:23:49 np0005479288.novalocal systemd[1]: session-c33.scope: Deactivated successfully. Oct 09 23:23:49 np0005479288.novalocal sudo[87469]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:23:49 np0005479288.novalocal systemd[1]: Started Session c34 of User root. Oct 09 23:23:49 np0005479288.novalocal sudo[87469]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:23:49 np0005479288.novalocal sudo[87469]: pam_unix(sudo:session): session closed for user root Oct 09 23:23:49 np0005479288.novalocal systemd[1]: session-c34.scope: Deactivated successfully. Oct 09 23:23:49 np0005479288.novalocal sudo[87475]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:23:49 np0005479288.novalocal systemd[1]: Started Session c35 of User root. Oct 09 23:23:49 np0005479288.novalocal sudo[87475]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:23:50 np0005479288.novalocal setroubleshoot[87450]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l f3ed407b-c8c3-4ef7-ab2b-9af302a2ef3a Oct 09 23:23:50 np0005479288.novalocal setroubleshoot[87450]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 09 23:23:50 np0005479288.novalocal sudo[87475]: pam_unix(sudo:session): session closed for user root Oct 09 23:23:50 np0005479288.novalocal systemd[1]: session-c35.scope: Deactivated successfully. Oct 09 23:23:50 np0005479288.novalocal setroubleshoot[87450]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 5804db88-800f-49d8-92d9-4c838f3f2c7b Oct 09 23:23:50 np0005479288.novalocal setroubleshoot[87450]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 09 23:23:50 np0005479288.novalocal setroubleshoot[87450]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 414b13bd-e9ad-4e85-85c6-b700174fea2d Oct 09 23:23:50 np0005479288.novalocal setroubleshoot[87450]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 09 23:23:52 np0005479288.novalocal setroubleshoot[87450]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l f3ed407b-c8c3-4ef7-ab2b-9af302a2ef3a Oct 09 23:23:52 np0005479288.novalocal setroubleshoot[87450]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 09 23:23:52 np0005479288.novalocal setroubleshoot[87450]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 5804db88-800f-49d8-92d9-4c838f3f2c7b Oct 09 23:23:52 np0005479288.novalocal setroubleshoot[87450]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 09 23:23:53 np0005479288.novalocal setroubleshoot[87450]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 414b13bd-e9ad-4e85-85c6-b700174fea2d Oct 09 23:23:53 np0005479288.novalocal setroubleshoot[87450]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 09 23:23:58 np0005479288.novalocal systemd[1]: virtqemud.service: Deactivated successfully. Oct 09 23:24:01 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:24:01 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:24:01 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:24:03 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully. Oct 09 23:24:03 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Consumed 1.173s CPU time. Oct 09 23:24:03 np0005479288.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 09 23:24:03 np0005479288.novalocal systemd[1]: setroubleshootd.service: Consumed 1.172s CPU time. Oct 09 23:24:16 np0005479288.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 09 23:24:16 np0005479288.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 09 23:24:17 np0005479288.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service. Oct 09 23:24:18 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l f3ed407b-c8c3-4ef7-ab2b-9af302a2ef3a Oct 09 23:24:18 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 09 23:24:18 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 5804db88-800f-49d8-92d9-4c838f3f2c7b Oct 09 23:24:18 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 09 23:24:18 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 414b13bd-e9ad-4e85-85c6-b700174fea2d Oct 09 23:24:18 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 09 23:24:22 np0005479288.novalocal sudo[87576]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-64bf1556-569c-4437-af21-25cf5e1116d0 cinder-volumes/cinder-volumes-pool Oct 09 23:24:22 np0005479288.novalocal systemd[1]: Started Session c36 of User root. Oct 09 23:24:22 np0005479288.novalocal sudo[87576]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:22 np0005479288.novalocal dmeventd[84378]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool. Oct 09 23:24:24 np0005479288.novalocal dmeventd[84378]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Oct 09 23:24:24 np0005479288.novalocal lvm[87632]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:24:24 np0005479288.novalocal lvm[87632]: VG cinder-volumes finished Oct 09 23:24:24 np0005479288.novalocal sudo[87576]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:24 np0005479288.novalocal systemd[1]: session-c36.scope: Deactivated successfully. Oct 09 23:24:26 np0005479288.novalocal sudo[87634]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpx4vzh52h/privsep.sock Oct 09 23:24:26 np0005479288.novalocal systemd[1]: Started Session c37 of User root. Oct 09 23:24:26 np0005479288.novalocal sudo[87634]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 09 23:24:26 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 0827794c-ce19-46bd-afb9-3f2e648cf516 Oct 09 23:24:26 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:24:26 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 9a334a89-efa1-47ce-90cd-e60d41f90211 Oct 09 23:24:26 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:24:26 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 55a8e46c-10b8-44a1-a34a-7c6dbc68dc64 Oct 09 23:24:26 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:24:26 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 04b3f43d-513d-48c4-bcc6-1c057695263b Oct 09 23:24:26 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:24:26 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 8d8c9cbf-0f36-491b-9991-1df22f7b4d03 Oct 09 23:24:26 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:24:26 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 7f512bfb-1a80-4f1f-88e4-d7fc36c3e583 Oct 09 23:24:26 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:24:26 np0005479288.novalocal sudo[87634]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l ae73eb0e-1577-4b67-84f7-6bd348ac848e Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l a56f8e2d-a071-4578-887c-dc221fa86a71 Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: failed to retrieve rpm info for path '/dev/vda1': Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 6be27083-15ad-4f1f-b48e-efa906b0859c Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 14d38920-cb48-40c2-935c-a26041501c6f Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2bd29111-e416-4465-b7fe-a7c46628db7c Oct 09 23:24:27 np0005479288.novalocal sudo[87665]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-64bf1556-569c-4437-af21-25cf5e1116d0 Oct 09 23:24:27 np0005479288.novalocal systemd[1]: Started Session c38 of User root. Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal sudo[87665]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 7b0ef69d-4b6e-4d0b-ab56-bd2bf09123ac Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l d0dad55d-2f2e-4ae0-a7e9-653ed89dd24e Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 7b8fb866-f8ae-40ca-8db7-eec08f1f097e Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 4cf9bea1-07fe-415b-9fe9-b07b0acef446 Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 1596ba05-8f5d-4e8c-be84-58bdf327653f Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-hgEwc4. For complete SELinux messages run: sealert -l 307d7ad2-a682-4d5a-8310-d08c1433578c Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-hgEwc4. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-hgEwc4 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-hgEwc4. For complete SELinux messages run: sealert -l e0ebe62e-25a2-4225-9038-d0a10e146257 Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-hgEwc4. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-hgEwc4 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 0d86790f-32f8-4733-9664-a34f79e12944 Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l c87b365f-f5e8-4ebb-b23c-3a1916966861 Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 6acd149a-2a5a-45c5-bb7f-c3d651d9c80e Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 0bef0842-7acb-4575-b5d2-dfa10f547a48 Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 706c2ae5-61cb-4305-91cb-7462ef2e81a7 Oct 09 23:24:27 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:27 np0005479288.novalocal sudo[87665]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:27 np0005479288.novalocal systemd[1]: session-c38.scope: Deactivated successfully. Oct 09 23:24:27 np0005479288.novalocal sudo[87669]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-64bf1556-569c-4437-af21-25cf5e1116d0 iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 8znBbA65xLtKUuSRRybQ pRr6qDTeNm2K2PjK False -p3260 -a::1 Oct 09 23:24:27 np0005479288.novalocal systemd[1]: Started Session c39 of User root. Oct 09 23:24:27 np0005479288.novalocal sudo[87669]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:28 np0005479288.novalocal sudo[87669]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:28 np0005479288.novalocal systemd[1]: session-c39.scope: Deactivated successfully. Oct 09 23:24:28 np0005479288.novalocal sudo[87686]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 09 23:24:28 np0005479288.novalocal systemd[1]: Started Session c40 of User root. Oct 09 23:24:28 np0005479288.novalocal sudo[87686]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:29 np0005479288.novalocal sudo[87686]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:29 np0005479288.novalocal systemd[1]: session-c40.scope: Deactivated successfully. Oct 09 23:24:29 np0005479288.novalocal sudo[87691]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:24:29 np0005479288.novalocal systemd[1]: Started Session c41 of User root. Oct 09 23:24:29 np0005479288.novalocal sudo[87691]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:29 np0005479288.novalocal sudo[87691]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:29 np0005479288.novalocal systemd[1]: session-c41.scope: Deactivated successfully. Oct 09 23:24:29 np0005479288.novalocal sudo[87696]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 8znBbA65xLtKUuSRRybQ pRr6qDTeNm2K2PjK iqn.1994-05.com.redhat:701b36c35245 Oct 09 23:24:29 np0005479288.novalocal systemd[1]: Started Session c42 of User root. Oct 09 23:24:29 np0005479288.novalocal sudo[87696]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:30 np0005479288.novalocal sudo[87696]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:30 np0005479288.novalocal systemd[1]: session-c42.scope: Deactivated successfully. Oct 09 23:24:30 np0005479288.novalocal sudo[87703]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:24:30 np0005479288.novalocal systemd[1]: Started Session c43 of User root. Oct 09 23:24:30 np0005479288.novalocal sudo[87703]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:30 np0005479288.novalocal sudo[87703]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:30 np0005479288.novalocal systemd[1]: session-c43.scope: Deactivated successfully. Oct 09 23:24:30 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f9f0cf74-f509-4811-9d5f-45b3b5157bf8 Oct 09 23:24:31 np0005479288.novalocal kernel: iscsi: registered transport (tcp) Oct 09 23:24:31 np0005479288.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 09 23:24:31 np0005479288.novalocal iscsid[69457]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0, portal: ::1,3260] through [iface: default] is operational now Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 09 23:24:31 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 09 23:24:31 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: device naa.600140578d07e4667e64f5e8fb1ef734 port group 0 rel port 1 Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 4e9cdfe8-f206-48b7-9b64-81ab8e33c667 Oct 09 23:24:31 np0005479288.novalocal kernel: scsi 2:0:0:0: Attached scsi generic sg1 type 0 Oct 09 23:24:31 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: transition timeout set to 60 seconds Oct 09 23:24:31 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 09 23:24:31 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 09 23:24:31 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 09 23:24:31 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 09 23:24:31 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:24:31 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 09 23:24:31 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 09 23:24:31 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l d9af9e66-a433-40b9-8ea7-ceb3338aca1c Oct 09 23:24:31 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l a66fde19-028d-4ffd-bc65-c8b5e31395e6 Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l aa2d6ca9-53fa-4721-ae6b-ee33c5acaf71 Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1950d9f1-f441-45a5-b0c6-58ca56967aa5 Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 7fbd5eeb-fab2-4eab-8312-454640da3553 Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l cc30f29d-0b94-4478-bf50-bdc210816d74 Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 04b55ce8-a9c7-472e-9d6b-2ec03079dd5d Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 4e9cdfe8-f206-48b7-9b64-81ab8e33c667 Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l d9af9e66-a433-40b9-8ea7-ceb3338aca1c Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1950d9f1-f441-45a5-b0c6-58ca56967aa5 Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 49bed2ff-ba36-4d3f-aa8a-ca26adf29fcc Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l e6f7216d-762a-427c-a2b9-ce41143f62cc Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l b991186e-9f31-4a84-8ad8-ff446c73b3ea Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l a5656710-29de-48fb-a0d9-05647f669ad0 Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0/::1,3260. For complete SELinux messages run: sealert -l 4238eef6-b3b8-47d7-96e6-8e4cff41b81e Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0/::1,3260. For complete SELinux messages run: sealert -l faeb1fdf-dbd9-45d1-a03d-4c8baba9fc86 Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 04b55ce8-a9c7-472e-9d6b-2ec03079dd5d Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l c9740a8c-9bdb-43ef-ae28-d51efe7b67b2 Oct 09 23:24:31 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:32 np0005479288.novalocal sudo[87752]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Oct 09 23:24:32 np0005479288.novalocal systemd[1]: Started Session c44 of User root. Oct 09 23:24:32 np0005479288.novalocal sudo[87752]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l b4993de8-4a40-410f-9aee-59a559043574 Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 15503174-cc51-4e8d-90d0-7e914f1841c9 Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 5ffa4d18-5cc5-467f-8925-b752c3f05b25 Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: failed to retrieve rpm info for path '/dev/sda': Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 6be27083-15ad-4f1f-b48e-efa906b0859c Oct 09 23:24:32 np0005479288.novalocal sudo[87752]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:32 np0005479288.novalocal systemd[1]: session-c44.scope: Deactivated successfully. Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 0827794c-ce19-46bd-afb9-3f2e648cf516 Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 9a334a89-efa1-47ce-90cd-e60d41f90211 Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 55a8e46c-10b8-44a1-a34a-7c6dbc68dc64 Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 04b3f43d-513d-48c4-bcc6-1c057695263b Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 8d8c9cbf-0f36-491b-9991-1df22f7b4d03 Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 7f512bfb-1a80-4f1f-88e4-d7fc36c3e583 Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 8d8c9cbf-0f36-491b-9991-1df22f7b4d03 Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 7f512bfb-1a80-4f1f-88e4-d7fc36c3e583 Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 0827794c-ce19-46bd-afb9-3f2e648cf516 Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l cd2b0daa-b290-40ab-adaa-f24a46b97467 Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l e441f69e-2373-4100-bc39-18fa2295d3dc Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2bd29111-e416-4465-b7fe-a7c46628db7c Oct 09 23:24:32 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:33 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:24:33 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 7b0ef69d-4b6e-4d0b-ab56-bd2bf09123ac Oct 09 23:24:33 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:33 np0005479288.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 09 23:24:33 np0005479288.novalocal kernel: GPT:229375 != 2097151 Oct 09 23:24:33 np0005479288.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 09 23:24:33 np0005479288.novalocal kernel: GPT:229375 != 2097151 Oct 09 23:24:33 np0005479288.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 09 23:24:33 np0005479288.novalocal kernel: sda: sda1 sda15 Oct 09 23:24:33 np0005479288.novalocal sudo[87763]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Oct 09 23:24:33 np0005479288.novalocal systemd[1]: Started Session c45 of User root. Oct 09 23:24:33 np0005479288.novalocal sudo[87763]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 09 23:24:34 np0005479288.novalocal sudo[87763]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:34 np0005479288.novalocal systemd[1]: session-c45.scope: Deactivated successfully. Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f9f0cf74-f509-4811-9d5f-45b3b5157bf8 Oct 09 23:24:34 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 7fbd5eeb-fab2-4eab-8312-454640da3553 Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l a66fde19-028d-4ffd-bc65-c8b5e31395e6 Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l aa2d6ca9-53fa-4721-ae6b-ee33c5acaf71 Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l cc30f29d-0b94-4478-bf50-bdc210816d74 Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l f59fc602-81e4-4d6b-99d4-ddb5a0371877 Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 08050091-3355-47f8-91fe-6b2c0c445685 Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 7cd5edaa-dc51-4652-8c09-96e62b2e3666 Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 09 23:24:34 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 14d38920-cb48-40c2-935c-a26041501c6f Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:34 np0005479288.novalocal iscsid[69457]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0, portal: ::1,3260] through [iface: default] is shutdown. Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 5ffa4d18-5cc5-467f-8925-b752c3f05b25 Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:24:34 np0005479288.novalocal sudo[87806]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 iqn.1994-05.com.redhat:701b36c35245 Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0. For complete SELinux messages run: sealert -l 49bed2ff-ba36-4d3f-aa8a-ca26adf29fcc Oct 09 23:24:34 np0005479288.novalocal systemd[1]: Started Session c46 of User root. Oct 09 23:24:34 np0005479288.novalocal sudo[87806]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l b1801133-6280-494d-a1c4-533367a0633e Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 87ef9ea2-fbff-4282-88c1-68fbccb0902d Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0. For complete SELinux messages run: sealert -l 6ad29123-5352-4ad5-8cd7-49a75a1556b1 Oct 09 23:24:34 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:35 np0005479288.novalocal sudo[87806]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:35 np0005479288.novalocal systemd[1]: session-c46.scope: Deactivated successfully. Oct 09 23:24:35 np0005479288.novalocal sudo[87813]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:24:35 np0005479288.novalocal systemd[1]: Started Session c47 of User root. Oct 09 23:24:35 np0005479288.novalocal sudo[87813]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:35 np0005479288.novalocal sudo[87813]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:35 np0005479288.novalocal systemd[1]: session-c47.scope: Deactivated successfully. Oct 09 23:24:35 np0005479288.novalocal sudo[87818]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 09 23:24:35 np0005479288.novalocal systemd[1]: Started Session c48 of User root. Oct 09 23:24:35 np0005479288.novalocal sudo[87818]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:36 np0005479288.novalocal sudo[87818]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:36 np0005479288.novalocal systemd[1]: session-c48.scope: Deactivated successfully. Oct 09 23:24:36 np0005479288.novalocal sudo[87823]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 Oct 09 23:24:36 np0005479288.novalocal systemd[1]: Started Session c49 of User root. Oct 09 23:24:36 np0005479288.novalocal sudo[87823]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:36 np0005479288.novalocal sudo[87823]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:36 np0005479288.novalocal systemd[1]: session-c49.scope: Deactivated successfully. Oct 09 23:24:36 np0005479288.novalocal sudo[87828]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:24:36 np0005479288.novalocal systemd[1]: Started Session c50 of User root. Oct 09 23:24:36 np0005479288.novalocal sudo[87828]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:37 np0005479288.novalocal sudo[87828]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:37 np0005479288.novalocal systemd[1]: session-c50.scope: Deactivated successfully. Oct 09 23:24:41 np0005479288.novalocal sudo[87837]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-90c8fd8a-38e0-486c-bceb-b08a254e766d cinder-volumes/cinder-volumes-pool Oct 09 23:24:41 np0005479288.novalocal systemd[1]: Started Session c51 of User root. Oct 09 23:24:41 np0005479288.novalocal sudo[87837]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:42 np0005479288.novalocal lvm[87848]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:24:42 np0005479288.novalocal lvm[87848]: VG cinder-volumes finished Oct 09 23:24:42 np0005479288.novalocal sudo[87837]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:42 np0005479288.novalocal systemd[1]: session-c51.scope: Deactivated successfully. Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 187a626e-7f37-478f-b5ef-ef33fdb46165 Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 4446dd8b-0823-4848-95fe-a53f812d280d Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 6be27083-15ad-4f1f-b48e-efa906b0859c Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 14d38920-cb48-40c2-935c-a26041501c6f Oct 09 23:24:43 np0005479288.novalocal sudo[87863]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-90c8fd8a-38e0-486c-bceb-b08a254e766d Oct 09 23:24:43 np0005479288.novalocal systemd[1]: Started Session c52 of User root. Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal sudo[87863]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2bd29111-e416-4465-b7fe-a7c46628db7c Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 7b0ef69d-4b6e-4d0b-ab56-bd2bf09123ac Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l a1965bbf-24a8-4eff-b883-194777d43309 Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 7b8fb866-f8ae-40ca-8db7-eec08f1f097e Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 4cf9bea1-07fe-415b-9fe9-b07b0acef446 Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 1596ba05-8f5d-4e8c-be84-58bdf327653f Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-7A1mhP. For complete SELinux messages run: sealert -l e0ebe62e-25a2-4225-9038-d0a10e146257 Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-7A1mhP. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-7A1mhP file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 0d86790f-32f8-4733-9664-a34f79e12944 Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 706c2ae5-61cb-4305-91cb-7462ef2e81a7 Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 8279f9db-dbfe-4a70-823f-05eb09c8f6ec Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 0bef0842-7acb-4575-b5d2-dfa10f547a48 Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l c87b365f-f5e8-4ebb-b23c-3a1916966861 Oct 09 23:24:43 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:43 np0005479288.novalocal sudo[87863]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:43 np0005479288.novalocal systemd[1]: session-c52.scope: Deactivated successfully. Oct 09 23:24:43 np0005479288.novalocal sudo[87867]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-90c8fd8a-38e0-486c-bceb-b08a254e766d iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d 2s5dPQkJn5X2xn2o7FLW Dx5Ffq48T4FF7UV6 False -p3260 -a::1 Oct 09 23:24:43 np0005479288.novalocal systemd[1]: Started Session c53 of User root. Oct 09 23:24:43 np0005479288.novalocal sudo[87867]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:44 np0005479288.novalocal sudo[87867]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:44 np0005479288.novalocal systemd[1]: session-c53.scope: Deactivated successfully. Oct 09 23:24:44 np0005479288.novalocal sudo[87873]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 09 23:24:44 np0005479288.novalocal systemd[1]: Started Session c54 of User root. Oct 09 23:24:44 np0005479288.novalocal sudo[87873]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:44 np0005479288.novalocal sudo[87873]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:44 np0005479288.novalocal systemd[1]: session-c54.scope: Deactivated successfully. Oct 09 23:24:44 np0005479288.novalocal sudo[87878]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:24:45 np0005479288.novalocal systemd[1]: Started Session c55 of User root. Oct 09 23:24:45 np0005479288.novalocal sudo[87878]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:45 np0005479288.novalocal sudo[87878]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:45 np0005479288.novalocal systemd[1]: session-c55.scope: Deactivated successfully. Oct 09 23:24:45 np0005479288.novalocal sudo[87883]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d 2s5dPQkJn5X2xn2o7FLW Dx5Ffq48T4FF7UV6 iqn.1994-05.com.redhat:701b36c35245 Oct 09 23:24:45 np0005479288.novalocal systemd[1]: Started Session c56 of User root. Oct 09 23:24:45 np0005479288.novalocal sudo[87883]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:46 np0005479288.novalocal sudo[87883]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:46 np0005479288.novalocal systemd[1]: session-c56.scope: Deactivated successfully. Oct 09 23:24:46 np0005479288.novalocal sudo[87888]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:24:46 np0005479288.novalocal systemd[1]: Started Session c57 of User root. Oct 09 23:24:46 np0005479288.novalocal sudo[87888]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:46 np0005479288.novalocal sudo[87888]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:46 np0005479288.novalocal systemd[1]: session-c57.scope: Deactivated successfully. Oct 09 23:24:46 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f9f0cf74-f509-4811-9d5f-45b3b5157bf8 Oct 09 23:24:47 np0005479288.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 09 23:24:47 np0005479288.novalocal iscsid[69457]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d, portal: ::1,3260] through [iface: default] is operational now Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 4e9cdfe8-f206-48b7-9b64-81ab8e33c667 Oct 09 23:24:47 np0005479288.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 09 23:24:47 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 09 23:24:47 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014059db05e54fa42400182a26ce6d port group 0 rel port 1 Oct 09 23:24:47 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 09 23:24:47 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 09 23:24:47 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 09 23:24:47 np0005479288.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Oct 09 23:24:47 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 09 23:24:47 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:24:47 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 09 23:24:47 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 09 23:24:47 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:24:47 np0005479288.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Oct 09 23:24:47 np0005479288.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 09 23:24:47 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l d9af9e66-a433-40b9-8ea7-ceb3338aca1c Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l a66fde19-028d-4ffd-bc65-c8b5e31395e6 Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l aa2d6ca9-53fa-4721-ae6b-ee33c5acaf71 Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1950d9f1-f441-45a5-b0c6-58ca56967aa5 Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 7fbd5eeb-fab2-4eab-8312-454640da3553 Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l cc30f29d-0b94-4478-bf50-bdc210816d74 Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 04b55ce8-a9c7-472e-9d6b-2ec03079dd5d Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 49bed2ff-ba36-4d3f-aa8a-ca26adf29fcc Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l e6f7216d-762a-427c-a2b9-ce41143f62cc Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l b991186e-9f31-4a84-8ad8-ff446c73b3ea Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l a5656710-29de-48fb-a0d9-05647f669ad0 Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d/::1,3260. For complete SELinux messages run: sealert -l 4238eef6-b3b8-47d7-96e6-8e4cff41b81e Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d/::1,3260. For complete SELinux messages run: sealert -l faeb1fdf-dbd9-45d1-a03d-4c8baba9fc86 Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l c9740a8c-9bdb-43ef-ae28-d51efe7b67b2 Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 4e9cdfe8-f206-48b7-9b64-81ab8e33c667 Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l d9af9e66-a433-40b9-8ea7-ceb3338aca1c Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1950d9f1-f441-45a5-b0c6-58ca56967aa5 Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d/::1,3260. For complete SELinux messages run: sealert -l faeb1fdf-dbd9-45d1-a03d-4c8baba9fc86 Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l c9740a8c-9bdb-43ef-ae28-d51efe7b67b2 Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d/::1,3260. For complete SELinux messages run: sealert -l f4b3f12a-1f17-4762-af9b-992c92593572 Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l dea72cb4-b4cd-4b60-ba52-7f7de108502e Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 04b55ce8-a9c7-472e-9d6b-2ec03079dd5d Oct 09 23:24:47 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:48 np0005479288.novalocal sudo[87943]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Oct 09 23:24:48 np0005479288.novalocal systemd[1]: Started Session c58 of User root. Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l b4993de8-4a40-410f-9aee-59a559043574 Oct 09 23:24:48 np0005479288.novalocal sudo[87943]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l c3678388-9edc-4ba0-8310-560e0f83a362 Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 5ffa4d18-5cc5-467f-8925-b752c3f05b25 Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 6be27083-15ad-4f1f-b48e-efa906b0859c Oct 09 23:24:48 np0005479288.novalocal sudo[87947]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 0827794c-ce19-46bd-afb9-3f2e648cf516 Oct 09 23:24:48 np0005479288.novalocal systemd[1]: Started Session c59 of User root. Oct 09 23:24:48 np0005479288.novalocal sudo[87943]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:24:48 np0005479288.novalocal systemd[1]: session-c58.scope: Deactivated successfully. Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 9a334a89-efa1-47ce-90cd-e60d41f90211 Oct 09 23:24:48 np0005479288.novalocal sudo[87947]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 55a8e46c-10b8-44a1-a34a-7c6dbc68dc64 Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 04b3f43d-513d-48c4-bcc6-1c057695263b Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 8d8c9cbf-0f36-491b-9991-1df22f7b4d03 Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 7f512bfb-1a80-4f1f-88e4-d7fc36c3e583 Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l cd2b0daa-b290-40ab-adaa-f24a46b97467 Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 8d8c9cbf-0f36-491b-9991-1df22f7b4d03 Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 7f512bfb-1a80-4f1f-88e4-d7fc36c3e583 Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l e441f69e-2373-4100-bc39-18fa2295d3dc Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2bd29111-e416-4465-b7fe-a7c46628db7c Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 7b0ef69d-4b6e-4d0b-ab56-bd2bf09123ac Oct 09 23:24:48 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:48 np0005479288.novalocal sudo[87947]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:48 np0005479288.novalocal systemd[1]: session-c59.scope: Deactivated successfully. Oct 09 23:24:48 np0005479288.novalocal sudo[87954]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:24:48 np0005479288.novalocal systemd[1]: Started Session c60 of User root. Oct 09 23:24:48 np0005479288.novalocal sudo[87954]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:49 np0005479288.novalocal sudo[87954]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:49 np0005479288.novalocal systemd[1]: session-c60.scope: Deactivated successfully. Oct 09 23:24:49 np0005479288.novalocal sudo[87958]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:24:49 np0005479288.novalocal systemd[1]: Started Session c61 of User root. Oct 09 23:24:49 np0005479288.novalocal sudo[87958]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:49 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:24:49 np0005479288.novalocal sudo[87958]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:49 np0005479288.novalocal systemd[1]: session-c61.scope: Deactivated successfully. Oct 09 23:24:49 np0005479288.novalocal sudo[87962]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:24:49 np0005479288.novalocal systemd[1]: Started Session c62 of User root. Oct 09 23:24:49 np0005479288.novalocal sudo[87962]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:49 np0005479288.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 09 23:24:49 np0005479288.novalocal kernel: GPT:229375 != 2097151 Oct 09 23:24:49 np0005479288.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 09 23:24:49 np0005479288.novalocal kernel: GPT:229375 != 2097151 Oct 09 23:24:49 np0005479288.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 09 23:24:49 np0005479288.novalocal kernel: sda: sda1 sda15 Oct 09 23:24:49 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 0827794c-ce19-46bd-afb9-3f2e648cf516 Oct 09 23:24:49 np0005479288.novalocal sudo[87968]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Oct 09 23:24:50 np0005479288.novalocal systemd[1]: Started Session c63 of User root. Oct 09 23:24:50 np0005479288.novalocal sudo[87968]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 9a334a89-efa1-47ce-90cd-e60d41f90211 Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 55a8e46c-10b8-44a1-a34a-7c6dbc68dc64 Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 04b3f43d-513d-48c4-bcc6-1c057695263b Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:24:50 np0005479288.novalocal sudo[87962]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:50 np0005479288.novalocal systemd[1]: session-c62.scope: Deactivated successfully. Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 6be27083-15ad-4f1f-b48e-efa906b0859c Oct 09 23:24:50 np0005479288.novalocal sudo[87968]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:50 np0005479288.novalocal systemd[1]: session-c63.scope: Deactivated successfully. Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l cd2b0daa-b290-40ab-adaa-f24a46b97467 Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 09 23:24:50 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f9f0cf74-f509-4811-9d5f-45b3b5157bf8 Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 7fbd5eeb-fab2-4eab-8312-454640da3553 Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d/::1,3260. For complete SELinux messages run: sealert -l faeb1fdf-dbd9-45d1-a03d-4c8baba9fc86 Oct 09 23:24:50 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 4e9cdfe8-f206-48b7-9b64-81ab8e33c667 Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:50 np0005479288.novalocal iscsid[69457]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d, portal: ::1,3260] through [iface: default] is shutdown. Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l d9af9e66-a433-40b9-8ea7-ceb3338aca1c Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l a66fde19-028d-4ffd-bc65-c8b5e31395e6 Oct 09 23:24:50 np0005479288.novalocal sudo[88014]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d iqn.1994-05.com.redhat:701b36c35245 Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:50 np0005479288.novalocal systemd[1]: Started Session c64 of User root. Oct 09 23:24:50 np0005479288.novalocal sudo[88014]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l aa2d6ca9-53fa-4721-ae6b-ee33c5acaf71 Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1950d9f1-f441-45a5-b0c6-58ca56967aa5 Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:50 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l c9740a8c-9bdb-43ef-ae28-d51efe7b67b2 Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d/::1,3260. For complete SELinux messages run: sealert -l f4b3f12a-1f17-4762-af9b-992c92593572 Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l cc30f29d-0b94-4478-bf50-bdc210816d74 Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 04b55ce8-a9c7-472e-9d6b-2ec03079dd5d Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l f59fc602-81e4-4d6b-99d4-ddb5a0371877 Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 08050091-3355-47f8-91fe-6b2c0c445685 Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 7cd5edaa-dc51-4652-8c09-96e62b2e3666 Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 14d38920-cb48-40c2-935c-a26041501c6f Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2bd29111-e416-4465-b7fe-a7c46628db7c Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 7b0ef69d-4b6e-4d0b-ab56-bd2bf09123ac Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 5ffa4d18-5cc5-467f-8925-b752c3f05b25 Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 7fbd5eeb-fab2-4eab-8312-454640da3553 Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l a66fde19-028d-4ffd-bc65-c8b5e31395e6 Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l aa2d6ca9-53fa-4721-ae6b-ee33c5acaf71 Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l dea72cb4-b4cd-4b60-ba52-7f7de108502e Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l cc30f29d-0b94-4478-bf50-bdc210816d74 Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d. For complete SELinux messages run: sealert -l 49bed2ff-ba36-4d3f-aa8a-ca26adf29fcc Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l b1801133-6280-494d-a1c4-533367a0633e Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 87ef9ea2-fbff-4282-88c1-68fbccb0902d Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d. For complete SELinux messages run: sealert -l 6ad29123-5352-4ad5-8cd7-49a75a1556b1 Oct 09 23:24:51 np0005479288.novalocal setroubleshoot[87547]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:24:51 np0005479288.novalocal sudo[88014]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:51 np0005479288.novalocal systemd[1]: session-c64.scope: Deactivated successfully. Oct 09 23:24:51 np0005479288.novalocal sudo[88024]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:24:51 np0005479288.novalocal systemd[1]: Started Session c65 of User root. Oct 09 23:24:51 np0005479288.novalocal sudo[88024]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:52 np0005479288.novalocal sudo[88024]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:52 np0005479288.novalocal systemd[1]: session-c65.scope: Deactivated successfully. Oct 09 23:24:52 np0005479288.novalocal sudo[88029]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 09 23:24:52 np0005479288.novalocal systemd[1]: Started Session c66 of User root. Oct 09 23:24:52 np0005479288.novalocal sudo[88029]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:52 np0005479288.novalocal sudo[88029]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:52 np0005479288.novalocal systemd[1]: session-c66.scope: Deactivated successfully. Oct 09 23:24:52 np0005479288.novalocal sudo[88034]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-90c8fd8a-38e0-486c-bceb-b08a254e766d Oct 09 23:24:52 np0005479288.novalocal systemd[1]: Started Session c67 of User root. Oct 09 23:24:52 np0005479288.novalocal sudo[88034]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:53 np0005479288.novalocal sudo[88034]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:53 np0005479288.novalocal systemd[1]: session-c67.scope: Deactivated successfully. Oct 09 23:24:53 np0005479288.novalocal sudo[88039]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:24:53 np0005479288.novalocal systemd[1]: Started Session c68 of User root. Oct 09 23:24:53 np0005479288.novalocal sudo[88039]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:24:53 np0005479288.novalocal sudo[88039]: pam_unix(sudo:session): session closed for user root Oct 09 23:24:53 np0005479288.novalocal systemd[1]: session-c68.scope: Deactivated successfully. Oct 09 23:25:01 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Deactivated successfully. Oct 09 23:25:01 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Consumed 1.264s CPU time. Oct 09 23:25:01 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:25:01 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:25:01 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:25:01 np0005479288.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 09 23:25:01 np0005479288.novalocal systemd[1]: setroubleshootd.service: Consumed 7.318s CPU time. Oct 09 23:25:48 np0005479288.novalocal sudo[88122]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:25:48 np0005479288.novalocal systemd[1]: Started Session c69 of User root. Oct 09 23:25:48 np0005479288.novalocal sudo[88122]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:25:48 np0005479288.novalocal sudo[88122]: pam_unix(sudo:session): session closed for user root Oct 09 23:25:48 np0005479288.novalocal systemd[1]: session-c69.scope: Deactivated successfully. Oct 09 23:25:48 np0005479288.novalocal sudo[88126]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:25:48 np0005479288.novalocal systemd[1]: Started Session c70 of User root. Oct 09 23:25:48 np0005479288.novalocal sudo[88126]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:25:49 np0005479288.novalocal sudo[88126]: pam_unix(sudo:session): session closed for user root Oct 09 23:25:49 np0005479288.novalocal systemd[1]: session-c70.scope: Deactivated successfully. Oct 09 23:25:49 np0005479288.novalocal sudo[88130]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:25:49 np0005479288.novalocal systemd[1]: Started Session c71 of User root. Oct 09 23:25:49 np0005479288.novalocal sudo[88130]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:25:49 np0005479288.novalocal sudo[88130]: pam_unix(sudo:session): session closed for user root Oct 09 23:25:49 np0005479288.novalocal systemd[1]: session-c71.scope: Deactivated successfully. Oct 09 23:25:49 np0005479288.novalocal sudo[88135]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:25:49 np0005479288.novalocal systemd[1]: Started Session c72 of User root. Oct 09 23:25:49 np0005479288.novalocal sudo[88135]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:25:50 np0005479288.novalocal sudo[88135]: pam_unix(sudo:session): session closed for user root Oct 09 23:25:50 np0005479288.novalocal systemd[1]: session-c72.scope: Deactivated successfully. Oct 09 23:26:00 np0005479288.novalocal PackageKit[2929]: daemon quit Oct 09 23:26:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:26:00 np0005479288.novalocal systemd[1]: packagekit.service: Deactivated successfully. Oct 09 23:26:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:26:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:26:48 np0005479288.novalocal sudo[88217]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:26:48 np0005479288.novalocal systemd[1]: Started Session c73 of User root. Oct 09 23:26:48 np0005479288.novalocal sudo[88217]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:26:48 np0005479288.novalocal sudo[88217]: pam_unix(sudo:session): session closed for user root Oct 09 23:26:48 np0005479288.novalocal systemd[1]: session-c73.scope: Deactivated successfully. Oct 09 23:26:48 np0005479288.novalocal sudo[88222]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:26:48 np0005479288.novalocal systemd[1]: Started Session c74 of User root. Oct 09 23:26:48 np0005479288.novalocal sudo[88222]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:26:49 np0005479288.novalocal sudo[88222]: pam_unix(sudo:session): session closed for user root Oct 09 23:26:49 np0005479288.novalocal systemd[1]: session-c74.scope: Deactivated successfully. Oct 09 23:26:49 np0005479288.novalocal sudo[88226]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:26:49 np0005479288.novalocal systemd[1]: Started Session c75 of User root. Oct 09 23:26:49 np0005479288.novalocal sudo[88226]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:26:49 np0005479288.novalocal sudo[88226]: pam_unix(sudo:session): session closed for user root Oct 09 23:26:49 np0005479288.novalocal systemd[1]: session-c75.scope: Deactivated successfully. Oct 09 23:26:49 np0005479288.novalocal sudo[88230]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:26:49 np0005479288.novalocal systemd[1]: Started Session c76 of User root. Oct 09 23:26:49 np0005479288.novalocal sudo[88230]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:26:50 np0005479288.novalocal sudo[88230]: pam_unix(sudo:session): session closed for user root Oct 09 23:26:50 np0005479288.novalocal systemd[1]: session-c76.scope: Deactivated successfully. Oct 09 23:26:59 np0005479288.novalocal systemd[84147]: Created slice User Background Tasks Slice. Oct 09 23:26:59 np0005479288.novalocal systemd[84147]: Starting Cleanup of User's Temporary Files and Directories... Oct 09 23:27:00 np0005479288.novalocal systemd[84147]: Finished Cleanup of User's Temporary Files and Directories. Oct 09 23:27:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:27:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:27:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:27:05 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:27:06 np0005479288.novalocal systemd-rc-local-generator[88275]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:27:06 np0005479288.novalocal systemd-sysv-generator[88278]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:27:06 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:27:06 np0005479288.novalocal systemd[1]: Starting OpenStack Nova Conductor Server... Oct 09 23:27:08 np0005479288.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 09 23:27:08 np0005479288.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 09 23:27:09 np0005479288.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service. Oct 09 23:27:09 np0005479288.novalocal systemd[1]: Started OpenStack Nova Conductor Server. Oct 09 23:27:10 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:27:10 np0005479288.novalocal systemd-rc-local-generator[88330]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:27:10 np0005479288.novalocal systemd-sysv-generator[88333]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:27:10 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 4dcee729-aa62-4e21-a126-c52509df4627 Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:10 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 5b04f2bb-6dbd-465b-9a41-42fcceb9bd0f Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:10 np0005479288.novalocal systemd-rc-local-generator[88360]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 8101ab45-d70e-454e-bf94-ed3f15bb2ee5 Oct 09 23:27:10 np0005479288.novalocal systemd-sysv-generator[88364]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 1e53ce1f-0586-44cc-a583-b99fa4eeb267 Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:10 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 04188e53-dae4-46da-8f99-71ee9b73691e Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 8f3a06d9-4460-4260-b5be-c767299fda61 Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l c6980ef6-e3bc-41fd-b3cf-b46bb450f22f Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 65955495-8448-469a-b1d7-6f1712cb256e Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l bb339fca-fe30-486f-863e-5834116a7e21 Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:10 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 5858dc41-eea0-4034-93ce-0149493e0ea0 Oct 09 23:27:11 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:11 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l b898ed41-6767-4c64-8a65-925b3ea5c3ad Oct 09 23:27:11 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:11 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:27:11 np0005479288.novalocal systemd-rc-local-generator[88438]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:27:11 np0005479288.novalocal systemd-sysv-generator[88442]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:27:11 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:27:11 np0005479288.novalocal systemd[1]: Starting OpenStack Nova Compute Server... Oct 09 23:27:16 np0005479288.novalocal systemd[1]: Started OpenStack Nova Compute Server. Oct 09 23:27:17 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:27:17 np0005479288.novalocal systemd-rc-local-generator[88479]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:27:17 np0005479288.novalocal systemd-sysv-generator[88483]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:27:17 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:27:17 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:27:17 np0005479288.novalocal systemd-rc-local-generator[88529]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:27:17 np0005479288.novalocal systemd-sysv-generator[88532]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:27:17 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:27:17 np0005479288.novalocal systemd[1]: Starting libvirt QEMU daemon... Oct 09 23:27:17 np0005479288.novalocal systemd[1]: Started libvirt QEMU daemon. Oct 09 23:27:18 np0005479288.novalocal nova-compute[88450]: libvirt: error : internal error: could not initialize domain event timer Oct 09 23:27:18 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:27:18 np0005479288.novalocal systemd-sysv-generator[88597]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:27:18 np0005479288.novalocal systemd-rc-local-generator[88593]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:27:18 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:27:18 np0005479288.novalocal systemd[1]: Starting OpenStack Nova Scheduler Server... Oct 09 23:27:19 np0005479288.novalocal systemd[1]: Listening on libvirt nodedev daemon admin socket. Oct 09 23:27:19 np0005479288.novalocal systemd[1]: Listening on libvirt nodedev daemon read-only socket. Oct 09 23:27:19 np0005479288.novalocal systemd[1]: Starting libvirt nodedev daemon... Oct 09 23:27:19 np0005479288.novalocal systemd[1]: Started libvirt nodedev daemon. Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 4dcee729-aa62-4e21-a126-c52509df4627 Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 5b04f2bb-6dbd-465b-9a41-42fcceb9bd0f Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 8101ab45-d70e-454e-bf94-ed3f15bb2ee5 Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 1e53ce1f-0586-44cc-a583-b99fa4eeb267 Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 04188e53-dae4-46da-8f99-71ee9b73691e Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 8f3a06d9-4460-4260-b5be-c767299fda61 Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l c6980ef6-e3bc-41fd-b3cf-b46bb450f22f Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 65955495-8448-469a-b1d7-6f1712cb256e Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l bb339fca-fe30-486f-863e-5834116a7e21 Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 5858dc41-eea0-4034-93ce-0149493e0ea0 Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l b898ed41-6767-4c64-8a65-925b3ea5c3ad Oct 09 23:27:20 np0005479288.novalocal setroubleshoot[88285]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 09 23:27:21 np0005479288.novalocal systemd[1]: Started OpenStack Nova Scheduler Server. Oct 09 23:27:21 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:27:21 np0005479288.novalocal systemd-rc-local-generator[88666]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:27:21 np0005479288.novalocal systemd-sysv-generator[88670]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:27:21 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:27:21 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:27:21 np0005479288.novalocal systemd-sysv-generator[88703]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:27:21 np0005479288.novalocal systemd-rc-local-generator[88700]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:27:21 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:27:30 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Deactivated successfully. Oct 09 23:27:30 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Consumed 1.205s CPU time. Oct 09 23:27:31 np0005479288.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 09 23:27:31 np0005479288.novalocal systemd[1]: setroubleshootd.service: Consumed 2.152s CPU time. Oct 09 23:27:48 np0005479288.novalocal sudo[88716]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:27:48 np0005479288.novalocal systemd[1]: Started Session c77 of User root. Oct 09 23:27:48 np0005479288.novalocal sudo[88716]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:27:48 np0005479288.novalocal sudo[88716]: pam_unix(sudo:session): session closed for user root Oct 09 23:27:48 np0005479288.novalocal systemd[1]: session-c77.scope: Deactivated successfully. Oct 09 23:27:48 np0005479288.novalocal sudo[88720]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:27:49 np0005479288.novalocal systemd[1]: Started Session c78 of User root. Oct 09 23:27:49 np0005479288.novalocal sudo[88720]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:27:49 np0005479288.novalocal sudo[88720]: pam_unix(sudo:session): session closed for user root Oct 09 23:27:49 np0005479288.novalocal systemd[1]: session-c78.scope: Deactivated successfully. Oct 09 23:27:49 np0005479288.novalocal sudo[88724]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:27:49 np0005479288.novalocal systemd[1]: Started Session c79 of User root. Oct 09 23:27:49 np0005479288.novalocal sudo[88724]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:27:49 np0005479288.novalocal sudo[88724]: pam_unix(sudo:session): session closed for user root Oct 09 23:27:49 np0005479288.novalocal systemd[1]: session-c79.scope: Deactivated successfully. Oct 09 23:27:49 np0005479288.novalocal sudo[88728]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:27:49 np0005479288.novalocal systemd[1]: Started Session c80 of User root. Oct 09 23:27:49 np0005479288.novalocal sudo[88728]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:27:50 np0005479288.novalocal sudo[88728]: pam_unix(sudo:session): session closed for user root Oct 09 23:27:50 np0005479288.novalocal systemd[1]: session-c80.scope: Deactivated successfully. Oct 09 23:27:56 np0005479288.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 09 23:27:57 np0005479288.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 09 23:27:58 np0005479288.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service. Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 16cd3310-c54e-4188-9912-08af0c719f94 Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 2c410a10-2826-47e6-b130-c0817112c04a Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). For complete SELinux messages run: sealert -l 3b002d65-cd3e-4a21-9697-c123f3c0d8fe Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1': Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. For complete SELinux messages run: sealert -l 0e7b7523-a1b3-400b-9284-ad37b07cfefc Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. For complete SELinux messages run: sealert -l e025cffd-52dd-4380-8d9a-9fa6bddfb148 Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. For complete SELinux messages run: sealert -l 068f9628-9462-4c86-82ca-299b13cc290c Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 2dee3a9c-cc99-4d76-9440-33550cd77831 Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l fa3a1039-ae06-4737-b1fa-bac438d02db9 Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 8ab4dda9-4577-4915-8d32-47b0527d1c75 Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/sbin/httpd from read access on the file ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. For complete SELinux messages run: sealert -l 6972805b-ae43-47b2-8ca1-b1874c338915 Oct 09 23:27:59 np0005479288.novalocal setroubleshoot[88740]: SELinux is preventing /usr/sbin/httpd from read access on the file ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:28:01 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:28:01 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:28:01 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:28:08 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:28:08 np0005479288.novalocal systemd-sysv-generator[88797]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:28:08 np0005479288.novalocal systemd-rc-local-generator[88792]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:28:08 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:28:08 np0005479288.novalocal systemd[1]: Started OpenStack Octavia Worker service. Oct 09 23:28:09 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:28:09 np0005479288.novalocal systemd-rc-local-generator[88828]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:28:09 np0005479288.novalocal systemd-sysv-generator[88832]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:28:09 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:28:09 np0005479288.novalocal systemd[1]: Reloading. Oct 09 23:28:09 np0005479288.novalocal systemd-rc-local-generator[88856]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 09 23:28:09 np0005479288.novalocal systemd-sysv-generator[88859]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 09 23:28:09 np0005479288.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 09 23:28:09 np0005479288.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 09 23:28:09 np0005479288.novalocal systemd[1]: setroubleshootd.service: Consumed 1.656s CPU time. Oct 09 23:28:09 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Deactivated successfully. Oct 09 23:28:09 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Consumed 1.144s CPU time. Oct 09 23:28:24 np0005479288.novalocal runuser[89078]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:28:25 np0005479288.novalocal runuser[89078]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:28:25 np0005479288.novalocal runuser[89131]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:28:25 np0005479288.novalocal runuser[89131]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:28:25 np0005479288.novalocal runuser[89185]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:28:26 np0005479288.novalocal runuser[89185]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:28:48 np0005479288.novalocal sudo[89554]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:28:48 np0005479288.novalocal systemd[1]: Started Session c81 of User root. Oct 09 23:28:48 np0005479288.novalocal sudo[89554]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:28:48 np0005479288.novalocal sudo[89554]: pam_unix(sudo:session): session closed for user root Oct 09 23:28:48 np0005479288.novalocal systemd[1]: session-c81.scope: Deactivated successfully. Oct 09 23:28:48 np0005479288.novalocal sudo[89567]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:28:48 np0005479288.novalocal systemd[1]: Started Session c82 of User root. Oct 09 23:28:49 np0005479288.novalocal sudo[89567]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:28:49 np0005479288.novalocal sudo[89567]: pam_unix(sudo:session): session closed for user root Oct 09 23:28:49 np0005479288.novalocal systemd[1]: session-c82.scope: Deactivated successfully. Oct 09 23:28:49 np0005479288.novalocal sudo[89571]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:28:49 np0005479288.novalocal systemd[1]: Started Session c83 of User root. Oct 09 23:28:49 np0005479288.novalocal sudo[89571]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:28:49 np0005479288.novalocal sudo[89571]: pam_unix(sudo:session): session closed for user root Oct 09 23:28:49 np0005479288.novalocal systemd[1]: session-c83.scope: Deactivated successfully. Oct 09 23:28:49 np0005479288.novalocal sudo[89575]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:28:49 np0005479288.novalocal systemd[1]: Started Session c84 of User root. Oct 09 23:28:49 np0005479288.novalocal sudo[89575]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:28:50 np0005479288.novalocal sudo[89575]: pam_unix(sudo:session): session closed for user root Oct 09 23:28:50 np0005479288.novalocal systemd[1]: session-c84.scope: Deactivated successfully. Oct 09 23:29:01 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:29:01 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:29:01 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:29:09 np0005479288.novalocal crontab[89634]: (root) LIST (root) Oct 09 23:29:09 np0005479288.novalocal crontab[89635]: (root) LIST (keystone) Oct 09 23:29:09 np0005479288.novalocal crontab[89636]: (root) LIST (cinder) Oct 09 23:29:09 np0005479288.novalocal crontab[89637]: (root) LIST (glance) Oct 09 23:29:09 np0005479288.novalocal crontab[89638]: (root) LIST (nova) Oct 09 23:29:10 np0005479288.novalocal crontab[89639]: (root) LIST (manila) Oct 09 23:29:13 np0005479288.novalocal runuser[89683]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:13 np0005479288.novalocal runuser[89683]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:13 np0005479288.novalocal runuser[89737]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:14 np0005479288.novalocal runuser[89737]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:14 np0005479288.novalocal runuser[89789]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:15 np0005479288.novalocal runuser[89789]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:15 np0005479288.novalocal runuser[89843]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:16 np0005479288.novalocal runuser[89843]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:16 np0005479288.novalocal runuser[89895]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:17 np0005479288.novalocal runuser[89895]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:17 np0005479288.novalocal runuser[89947]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:17 np0005479288.novalocal runuser[89947]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:17 np0005479288.novalocal runuser[89999]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:18 np0005479288.novalocal runuser[89999]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:18 np0005479288.novalocal runuser[90053]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:19 np0005479288.novalocal runuser[90053]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:19 np0005479288.novalocal runuser[90105]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:20 np0005479288.novalocal runuser[90105]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:20 np0005479288.novalocal runuser[90159]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:20 np0005479288.novalocal runuser[90159]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:22 np0005479288.novalocal runuser[90224]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:22 np0005479288.novalocal runuser[90224]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:22 np0005479288.novalocal runuser[90276]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:23 np0005479288.novalocal runuser[90276]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:23 np0005479288.novalocal runuser[90330]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:24 np0005479288.novalocal runuser[90330]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:24 np0005479288.novalocal runuser[90382]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:24 np0005479288.novalocal runuser[90382]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:25 np0005479288.novalocal runuser[90440]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:26 np0005479288.novalocal runuser[90440]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:26 np0005479288.novalocal runuser[90492]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:27 np0005479288.novalocal runuser[90492]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:28 np0005479288.novalocal virtqemud[88538]: libvirt version: 10.10.0, package: 15.el9 (builder@centos.org, 2025-08-18-13:22:20, ) Oct 09 23:29:28 np0005479288.novalocal virtqemud[88538]: hostname: np0005479288.novalocal Oct 09 23:29:28 np0005479288.novalocal virtqemud[88538]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Oct 09 23:29:29 np0005479288.novalocal virtqemud[88538]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Oct 09 23:29:29 np0005479288.novalocal runuser[90575]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:30 np0005479288.novalocal runuser[90575]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:30 np0005479288.novalocal runuser[90629]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:31 np0005479288.novalocal runuser[90629]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:32 np0005479288.novalocal runuser[90689]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:33 np0005479288.novalocal runuser[90689]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:33 np0005479288.novalocal runuser[90741]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 09 23:29:33 np0005479288.novalocal runuser[90741]: pam_unix(runuser:session): session closed for user rabbitmq Oct 09 23:29:48 np0005479288.novalocal sudo[90814]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:29:48 np0005479288.novalocal systemd[1]: Started Session c85 of User root. Oct 09 23:29:48 np0005479288.novalocal sudo[90814]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:29:48 np0005479288.novalocal sudo[90814]: pam_unix(sudo:session): session closed for user root Oct 09 23:29:48 np0005479288.novalocal systemd[1]: session-c85.scope: Deactivated successfully. Oct 09 23:29:48 np0005479288.novalocal sudo[90818]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:29:49 np0005479288.novalocal systemd[1]: Started Session c86 of User root. Oct 09 23:29:49 np0005479288.novalocal sudo[90818]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:29:49 np0005479288.novalocal sudo[90818]: pam_unix(sudo:session): session closed for user root Oct 09 23:29:49 np0005479288.novalocal systemd[1]: session-c86.scope: Deactivated successfully. Oct 09 23:29:49 np0005479288.novalocal sudo[90822]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:29:49 np0005479288.novalocal systemd[1]: Started Session c87 of User root. Oct 09 23:29:49 np0005479288.novalocal sudo[90822]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:29:49 np0005479288.novalocal sudo[90822]: pam_unix(sudo:session): session closed for user root Oct 09 23:29:49 np0005479288.novalocal systemd[1]: session-c87.scope: Deactivated successfully. Oct 09 23:29:49 np0005479288.novalocal sudo[90826]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:29:49 np0005479288.novalocal systemd[1]: Started Session c88 of User root. Oct 09 23:29:49 np0005479288.novalocal sudo[90826]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:29:50 np0005479288.novalocal sudo[90826]: pam_unix(sudo:session): session closed for user root Oct 09 23:29:50 np0005479288.novalocal systemd[1]: session-c88.scope: Deactivated successfully. Oct 09 23:30:01 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:30:01 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:30:01 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:30:01 np0005479288.novalocal systemd[1]: Created slice User Slice of UID 163. Oct 09 23:30:01 np0005479288.novalocal systemd[1]: Starting User Runtime Directory /run/user/163... Oct 09 23:30:01 np0005479288.novalocal systemd[1]: Created slice User Slice of UID 161. Oct 09 23:30:01 np0005479288.novalocal systemd[1]: Starting User Runtime Directory /run/user/161... Oct 09 23:30:01 np0005479288.novalocal systemd[1]: Finished User Runtime Directory /run/user/163. Oct 09 23:30:01 np0005479288.novalocal systemd[1]: Starting User Manager for UID 163... Oct 09 23:30:01 np0005479288.novalocal systemd[1]: Finished User Runtime Directory /run/user/161. Oct 09 23:30:01 np0005479288.novalocal systemd[1]: Starting User Manager for UID 161... Oct 09 23:30:01 np0005479288.novalocal systemd[90850]: pam_unix(systemd-user:session): session opened for user keystone(uid=163) by keystone(uid=0) Oct 09 23:30:01 np0005479288.novalocal systemd[90852]: pam_unix(systemd-user:session): session opened for user glance(uid=161) by glance(uid=0) Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Queued start job for default target Main User Target. Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Queued start job for default target Main User Target. Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Created slice User Application Slice. Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Created slice User Application Slice. Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Started Daily Cleanup of User's Temporary Directories. Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Started Daily Cleanup of User's Temporary Directories. Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Reached target Paths. Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Reached target Paths. Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Reached target Timers. Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Reached target Timers. Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Starting D-Bus User Message Bus Socket... Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Starting D-Bus User Message Bus Socket... Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Listening on PipeWire PulseAudio. Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Listening on PipeWire PulseAudio. Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Listening on PipeWire Multimedia System Sockets. Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Listening on PipeWire Multimedia System Sockets. Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Starting Create User's Volatile Files and Directories... Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Starting Create User's Volatile Files and Directories... Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Listening on D-Bus User Message Bus Socket. Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Reached target Sockets. Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Listening on D-Bus User Message Bus Socket. Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Reached target Sockets. Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Finished Create User's Volatile Files and Directories. Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Reached target Basic System. Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Reached target Main User Target. Oct 09 23:30:02 np0005479288.novalocal systemd[90852]: Startup finished in 281ms. Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Finished Create User's Volatile Files and Directories. Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Reached target Basic System. Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Reached target Main User Target. Oct 09 23:30:02 np0005479288.novalocal systemd[90850]: Startup finished in 282ms. Oct 09 23:30:02 np0005479288.novalocal systemd[1]: Started User Manager for UID 161. Oct 09 23:30:02 np0005479288.novalocal systemd[1]: Started User Manager for UID 163. Oct 09 23:30:02 np0005479288.novalocal systemd[1]: Started Session 5 of User keystone. Oct 09 23:30:02 np0005479288.novalocal systemd[1]: Started Session 6 of User glance. Oct 09 23:30:02 np0005479288.novalocal CROND[90872]: (keystone) CMD (keystone-manage fernet_rotate) Oct 09 23:30:02 np0005479288.novalocal CROND[90873]: (glance) CMD (glance-cache-pruner) Oct 09 23:30:03 np0005479288.novalocal CROND[90842]: (glance) CMDOUT (2025-10-09 23:30:03.097 90873 INFO glance.image_cache [-] Image cache loaded driver 'centralized_db'.) Oct 09 23:30:03 np0005479288.novalocal CROND[90842]: (glance) CMDOUT (2025-10-09 23:30:03.328 90873 DEBUG glance.image_cache [None req-9bb75a77-91d2-40f4-95fe-6f4c77e1b0dd - - - - - -] Image cache has free space, skipping prune... prune /usr/lib/python3.9/site-packages/glance/image_cache/__init__.py:291) Oct 09 23:30:03 np0005479288.novalocal CROND[90842]: (glance) CMDEND (glance-cache-pruner) Oct 09 23:30:03 np0005479288.novalocal systemd[1]: session-6.scope: Deactivated successfully. Oct 09 23:30:03 np0005479288.novalocal systemd[1]: session-6.scope: Consumed 1.147s CPU time. Oct 09 23:30:04 np0005479288.novalocal CROND[90843]: (keystone) CMDEND (keystone-manage fernet_rotate) Oct 09 23:30:04 np0005479288.novalocal systemd[1]: session-5.scope: Deactivated successfully. Oct 09 23:30:04 np0005479288.novalocal systemd[1]: session-5.scope: Consumed 1.901s CPU time. Oct 09 23:30:13 np0005479288.novalocal systemd[1]: Stopping User Manager for UID 161... Oct 09 23:30:13 np0005479288.novalocal systemd[90852]: Activating special unit Exit the Session... Oct 09 23:30:13 np0005479288.novalocal systemd[90852]: Stopped target Main User Target. Oct 09 23:30:13 np0005479288.novalocal systemd[90852]: Stopped target Basic System. Oct 09 23:30:13 np0005479288.novalocal systemd[90852]: Stopped target Paths. Oct 09 23:30:13 np0005479288.novalocal systemd[90852]: Stopped target Sockets. Oct 09 23:30:13 np0005479288.novalocal systemd[90852]: Stopped target Timers. Oct 09 23:30:13 np0005479288.novalocal systemd[90852]: Stopped Daily Cleanup of User's Temporary Directories. Oct 09 23:30:13 np0005479288.novalocal systemd[90852]: Closed D-Bus User Message Bus Socket. Oct 09 23:30:13 np0005479288.novalocal systemd[90852]: Closed PipeWire PulseAudio. Oct 09 23:30:13 np0005479288.novalocal systemd[90852]: Closed PipeWire Multimedia System Sockets. Oct 09 23:30:13 np0005479288.novalocal systemd[90852]: Stopped Create User's Volatile Files and Directories. Oct 09 23:30:13 np0005479288.novalocal systemd[90852]: Removed slice User Application Slice. Oct 09 23:30:13 np0005479288.novalocal systemd[90852]: Reached target Shutdown. Oct 09 23:30:13 np0005479288.novalocal systemd[90852]: Finished Exit the Session. Oct 09 23:30:13 np0005479288.novalocal systemd[90852]: Reached target Exit the Session. Oct 09 23:30:13 np0005479288.novalocal systemd[1]: user@161.service: Deactivated successfully. Oct 09 23:30:13 np0005479288.novalocal systemd[1]: Stopped User Manager for UID 161. Oct 09 23:30:13 np0005479288.novalocal systemd[1]: Stopping User Runtime Directory /run/user/161... Oct 09 23:30:13 np0005479288.novalocal systemd[1]: run-user-161.mount: Deactivated successfully. Oct 09 23:30:13 np0005479288.novalocal systemd[1]: user-runtime-dir@161.service: Deactivated successfully. Oct 09 23:30:13 np0005479288.novalocal systemd[1]: Stopped User Runtime Directory /run/user/161. Oct 09 23:30:13 np0005479288.novalocal systemd[1]: Removed slice User Slice of UID 161. Oct 09 23:30:13 np0005479288.novalocal systemd[1]: user-161.slice: Consumed 1.481s CPU time. Oct 09 23:30:14 np0005479288.novalocal systemd[1]: Stopping User Manager for UID 163... Oct 09 23:30:14 np0005479288.novalocal systemd[90850]: Activating special unit Exit the Session... Oct 09 23:30:14 np0005479288.novalocal systemd[90850]: Stopped target Main User Target. Oct 09 23:30:14 np0005479288.novalocal systemd[90850]: Stopped target Basic System. Oct 09 23:30:14 np0005479288.novalocal systemd[90850]: Stopped target Paths. Oct 09 23:30:14 np0005479288.novalocal systemd[90850]: Stopped target Sockets. Oct 09 23:30:14 np0005479288.novalocal systemd[90850]: Stopped target Timers. Oct 09 23:30:14 np0005479288.novalocal systemd[90850]: Stopped Daily Cleanup of User's Temporary Directories. Oct 09 23:30:14 np0005479288.novalocal systemd[90850]: Closed D-Bus User Message Bus Socket. Oct 09 23:30:14 np0005479288.novalocal systemd[90850]: Closed PipeWire PulseAudio. Oct 09 23:30:14 np0005479288.novalocal systemd[90850]: Closed PipeWire Multimedia System Sockets. Oct 09 23:30:14 np0005479288.novalocal systemd[90850]: Stopped Create User's Volatile Files and Directories. Oct 09 23:30:14 np0005479288.novalocal systemd[90850]: Removed slice User Application Slice. Oct 09 23:30:14 np0005479288.novalocal systemd[90850]: Reached target Shutdown. Oct 09 23:30:14 np0005479288.novalocal systemd[90850]: Finished Exit the Session. Oct 09 23:30:14 np0005479288.novalocal systemd[90850]: Reached target Exit the Session. Oct 09 23:30:14 np0005479288.novalocal systemd[1]: user@163.service: Deactivated successfully. Oct 09 23:30:14 np0005479288.novalocal systemd[1]: Stopped User Manager for UID 163. Oct 09 23:30:14 np0005479288.novalocal systemd[1]: Stopping User Runtime Directory /run/user/163... Oct 09 23:30:14 np0005479288.novalocal systemd[1]: run-user-163.mount: Deactivated successfully. Oct 09 23:30:14 np0005479288.novalocal systemd[1]: user-runtime-dir@163.service: Deactivated successfully. Oct 09 23:30:14 np0005479288.novalocal systemd[1]: Stopped User Runtime Directory /run/user/163. Oct 09 23:30:14 np0005479288.novalocal systemd[1]: Removed slice User Slice of UID 163. Oct 09 23:30:14 np0005479288.novalocal systemd[1]: user-163.slice: Consumed 2.236s CPU time. Oct 09 23:30:48 np0005479288.novalocal sudo[90947]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:30:48 np0005479288.novalocal systemd[1]: Started Session c89 of User root. Oct 09 23:30:48 np0005479288.novalocal sudo[90947]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:30:48 np0005479288.novalocal sudo[90947]: pam_unix(sudo:session): session closed for user root Oct 09 23:30:48 np0005479288.novalocal systemd[1]: session-c89.scope: Deactivated successfully. Oct 09 23:30:48 np0005479288.novalocal sudo[90951]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:30:49 np0005479288.novalocal systemd[1]: Started Session c90 of User root. Oct 09 23:30:49 np0005479288.novalocal sudo[90951]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:30:49 np0005479288.novalocal sudo[90951]: pam_unix(sudo:session): session closed for user root Oct 09 23:30:49 np0005479288.novalocal systemd[1]: session-c90.scope: Deactivated successfully. Oct 09 23:30:49 np0005479288.novalocal sudo[90955]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:30:49 np0005479288.novalocal systemd[1]: Started Session c91 of User root. Oct 09 23:30:49 np0005479288.novalocal sudo[90955]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:30:49 np0005479288.novalocal sudo[90955]: pam_unix(sudo:session): session closed for user root Oct 09 23:30:49 np0005479288.novalocal systemd[1]: session-c91.scope: Deactivated successfully. Oct 09 23:30:49 np0005479288.novalocal sudo[90960]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:30:49 np0005479288.novalocal systemd[1]: Started Session c92 of User root. Oct 09 23:30:49 np0005479288.novalocal sudo[90960]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:30:50 np0005479288.novalocal sudo[90960]: pam_unix(sudo:session): session closed for user root Oct 09 23:30:50 np0005479288.novalocal systemd[1]: session-c92.scope: Deactivated successfully. Oct 09 23:31:02 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:31:02 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:31:02 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:31:24 np0005479288.novalocal sudo[91051]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpp7qoojk_/privsep.sock Oct 09 23:31:24 np0005479288.novalocal systemd[1]: Started Session c93 of User root. Oct 09 23:31:24 np0005479288.novalocal sudo[91051]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:31:25 np0005479288.novalocal sudo[91051]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:32 np0005479288.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 09 23:31:32 np0005479288.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 09 23:31:33 np0005479288.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service. Oct 09 23:31:34 np0005479288.novalocal setroubleshoot[91067]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 6c5d15e0-983e-4f8d-aff7-c7f0a21c3cd1 Oct 09 23:31:34 np0005479288.novalocal setroubleshoot[91067]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server:' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Oct 09 23:31:34 np0005479288.novalocal setroubleshoot[91067]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 6c5d15e0-983e-4f8d-aff7-c7f0a21c3cd1 Oct 09 23:31:34 np0005479288.novalocal setroubleshoot[91067]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server:' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Oct 09 23:31:44 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Deactivated successfully. Oct 09 23:31:44 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Consumed 1.165s CPU time. Oct 09 23:31:44 np0005479288.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 09 23:31:44 np0005479288.novalocal systemd[1]: setroubleshootd.service: Consumed 1.261s CPU time. Oct 09 23:31:47 np0005479288.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 09 23:31:48 np0005479288.novalocal sudo[91111]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-64bf1556-569c-4437-af21-25cf5e1116d0 Oct 09 23:31:48 np0005479288.novalocal systemd[1]: Started Session c94 of User root. Oct 09 23:31:48 np0005479288.novalocal sudo[91111]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:31:48 np0005479288.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 09 23:31:48 np0005479288.novalocal sudo[91111]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:48 np0005479288.novalocal systemd[1]: session-c94.scope: Deactivated successfully. Oct 09 23:31:48 np0005479288.novalocal sudo[91116]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:31:48 np0005479288.novalocal systemd[1]: Started Session c95 of User root. Oct 09 23:31:48 np0005479288.novalocal sudo[91117]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-64bf1556-569c-4437-af21-25cf5e1116d0 iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 8znBbA65xLtKUuSRRybQ pRr6qDTeNm2K2PjK False -p3260 -a::1 Oct 09 23:31:48 np0005479288.novalocal sudo[91116]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:31:48 np0005479288.novalocal systemd[1]: Started Session c96 of User root. Oct 09 23:31:48 np0005479288.novalocal sudo[91117]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:31:48 np0005479288.novalocal sudo[91116]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:48 np0005479288.novalocal systemd[1]: session-c95.scope: Deactivated successfully. Oct 09 23:31:48 np0005479288.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service. Oct 09 23:31:48 np0005479288.novalocal sudo[91137]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:31:48 np0005479288.novalocal systemd[1]: Started Session c97 of User root. Oct 09 23:31:48 np0005479288.novalocal sudo[91137]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:31:49 np0005479288.novalocal sudo[91117]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:49 np0005479288.novalocal systemd[1]: session-c96.scope: Deactivated successfully. Oct 09 23:31:49 np0005479288.novalocal sudo[91144]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 09 23:31:49 np0005479288.novalocal systemd[1]: Started Session c98 of User root. Oct 09 23:31:49 np0005479288.novalocal sudo[91144]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:31:49 np0005479288.novalocal sudo[91137]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:49 np0005479288.novalocal systemd[1]: session-c97.scope: Deactivated successfully. Oct 09 23:31:49 np0005479288.novalocal sudo[91150]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:31:49 np0005479288.novalocal systemd[1]: Started Session c99 of User root. Oct 09 23:31:49 np0005479288.novalocal sudo[91150]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:31:49 np0005479288.novalocal sudo[91144]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:49 np0005479288.novalocal systemd[1]: session-c98.scope: Deactivated successfully. Oct 09 23:31:49 np0005479288.novalocal sudo[91150]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:49 np0005479288.novalocal systemd[1]: session-c99.scope: Deactivated successfully. Oct 09 23:31:49 np0005479288.novalocal sudo[91156]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:31:49 np0005479288.novalocal systemd[1]: Started Session c100 of User root. Oct 09 23:31:49 np0005479288.novalocal sudo[91157]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:31:49 np0005479288.novalocal sudo[91156]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:31:49 np0005479288.novalocal systemd[1]: Started Session c101 of User root. Oct 09 23:31:49 np0005479288.novalocal sudo[91157]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:31:49 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l e271d455-3247-4433-a5a2-133af9ba0ab9 Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal sudo[91157]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:50 np0005479288.novalocal systemd[1]: session-c101.scope: Deactivated successfully. Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 88654244-7ad1-4008-a2e4-2a89ff0d1197 Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal sudo[91156]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:50 np0005479288.novalocal systemd[1]: session-c100.scope: Deactivated successfully. Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: failed to retrieve rpm info for path '/dev/vda1': Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 6be27083-15ad-4f1f-b48e-efa906b0859c Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 14d38920-cb48-40c2-935c-a26041501c6f Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2bd29111-e416-4465-b7fe-a7c46628db7c Oct 09 23:31:50 np0005479288.novalocal sudo[91170]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 8znBbA65xLtKUuSRRybQ pRr6qDTeNm2K2PjK iqn.1994-05.com.redhat:701b36c35245 Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 7b0ef69d-4b6e-4d0b-ab56-bd2bf09123ac Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l af7d0fa5-4ed8-4ae5-9604-e8425caf2d0b Oct 09 23:31:50 np0005479288.novalocal systemd[1]: Started Session c102 of User root. Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l a42d949c-988f-41ef-9952-1f17d0d6812b Oct 09 23:31:50 np0005479288.novalocal sudo[91170]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 4a93d412-dfad-4ee2-9ddc-78ab7241b9d0 Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 344e0f1d-8b38-42b8-99b9-6dc419c5550c Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-yuPPFo. For complete SELinux messages run: sealert -l ae39bf34-a895-4005-a127-411f3873a5e4 Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-yuPPFo. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-yuPPFo file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-yuPPFo. For complete SELinux messages run: sealert -l e1806d25-65e9-46ca-82c6-442966259a72 Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-yuPPFo. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-yuPPFo file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l a1ae6920-fc93-4425-abf4-2f7cb64d91db Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 6f986960-f0ce-4c6f-a9d7-0ebae6f78629 Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l a842e8cc-6d2f-4bad-bd7b-cb4781573e89 Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 2ce9074c-4519-4bfd-b674-0f768909eee4 Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l f4098c69-dd1d-446a-89f2-352cd809d9cc Oct 09 23:31:50 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:50 np0005479288.novalocal sudo[91170]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:50 np0005479288.novalocal systemd[1]: session-c102.scope: Deactivated successfully. Oct 09 23:31:50 np0005479288.novalocal sudo[91177]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:31:50 np0005479288.novalocal systemd[1]: Started Session c103 of User root. Oct 09 23:31:50 np0005479288.novalocal sudo[91177]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:31:51 np0005479288.novalocal sudo[91177]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:51 np0005479288.novalocal systemd[1]: session-c103.scope: Deactivated successfully. Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f9f0cf74-f509-4811-9d5f-45b3b5157bf8 Oct 09 23:31:51 np0005479288.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 09 23:31:51 np0005479288.novalocal iscsid[69457]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0, portal: ::1,3260] through [iface: default] is operational now Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 4e9cdfe8-f206-48b7-9b64-81ab8e33c667 Oct 09 23:31:51 np0005479288.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 09 23:31:51 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 09 23:31:51 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405dc560150b65448a09a7fc89ac port group 0 rel port 1 Oct 09 23:31:51 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 09 23:31:51 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 09 23:31:51 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 09 23:31:51 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 09 23:31:51 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:31:51 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 09 23:31:51 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 09 23:31:51 np0005479288.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Oct 09 23:31:51 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:51 np0005479288.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Oct 09 23:31:51 np0005479288.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 09 23:31:51 np0005479288.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 09 23:31:51 np0005479288.novalocal kernel: GPT:229375 != 2097151 Oct 09 23:31:51 np0005479288.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 09 23:31:51 np0005479288.novalocal kernel: GPT:229375 != 2097151 Oct 09 23:31:51 np0005479288.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 09 23:31:51 np0005479288.novalocal kernel: sda: sda1 sda15 Oct 09 23:31:51 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l d9af9e66-a433-40b9-8ea7-ceb3338aca1c Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l a66fde19-028d-4ffd-bc65-c8b5e31395e6 Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l aa2d6ca9-53fa-4721-ae6b-ee33c5acaf71 Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1950d9f1-f441-45a5-b0c6-58ca56967aa5 Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 7fbd5eeb-fab2-4eab-8312-454640da3553 Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l cc30f29d-0b94-4478-bf50-bdc210816d74 Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 04b55ce8-a9c7-472e-9d6b-2ec03079dd5d Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 4e9cdfe8-f206-48b7-9b64-81ab8e33c667 Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l d9af9e66-a433-40b9-8ea7-ceb3338aca1c Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1950d9f1-f441-45a5-b0c6-58ca56967aa5 Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 49bed2ff-ba36-4d3f-aa8a-ca26adf29fcc Oct 09 23:31:51 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:52 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8dc3e0bc-3b81-48fe-9955-90bd33af2ef0 Oct 09 23:31:52 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:52 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l ecf165f0-3d66-4d97-902f-d5ab0bbd0767 Oct 09 23:31:52 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:52 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 848112b1-63ea-4efe-964d-2da8b7684e3f Oct 09 23:31:52 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:52 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0/::1,3260. For complete SELinux messages run: sealert -l 445643fc-d54e-4da9-873e-26b5af26c32c Oct 09 23:31:52 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:52 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0/::1,3260. For complete SELinux messages run: sealert -l faeb1fdf-dbd9-45d1-a03d-4c8baba9fc86 Oct 09 23:31:52 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:52 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 04b55ce8-a9c7-472e-9d6b-2ec03079dd5d Oct 09 23:31:52 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:52 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l c9740a8c-9bdb-43ef-ae28-d51efe7b67b2 Oct 09 23:31:52 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:52 np0005479288.novalocal sudo[91232]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Oct 09 23:31:52 np0005479288.novalocal systemd[1]: Started Session c104 of User root. Oct 09 23:31:52 np0005479288.novalocal sudo[91232]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 09 23:31:52 np0005479288.novalocal setroubleshoot[91109]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l d68c3fab-3e5b-47ec-8b86-4d0fa9473216 Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l f00662c7-efc7-4064-9f8d-398cfbce27d5 Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 5ffa4d18-5cc5-467f-8925-b752c3f05b25 Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: failed to retrieve rpm info for path '/dev/sda': Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 6be27083-15ad-4f1f-b48e-efa906b0859c Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:53 np0005479288.novalocal sudo[91232]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:53 np0005479288.novalocal systemd[1]: session-c104.scope: Deactivated successfully. Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 580c9d1a-c075-4354-8f77-defc34398a93 Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l f62f0bad-04b6-40e4-af22-09ea88d5152a Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 55a8e46c-10b8-44a1-a34a-7c6dbc68dc64 Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 04b3f43d-513d-48c4-bcc6-1c057695263b Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l c914a636-e48b-4394-96fc-0657322acf32 Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 34b3005d-ec43-4582-9098-a3ff4b24db83 Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 580c9d1a-c075-4354-8f77-defc34398a93 Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l cd2b0daa-b290-40ab-adaa-f24a46b97467 Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 14d38920-cb48-40c2-935c-a26041501c6f Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2bd29111-e416-4465-b7fe-a7c46628db7c Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:53 np0005479288.novalocal sudo[91247]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Oct 09 23:31:53 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 7b0ef69d-4b6e-4d0b-ab56-bd2bf09123ac Oct 09 23:31:54 np0005479288.novalocal systemd[1]: Started Session c105 of User root. Oct 09 23:31:54 np0005479288.novalocal sudo[91247]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:31:54 np0005479288.novalocal sudo[91247]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:54 np0005479288.novalocal systemd[1]: session-c105.scope: Deactivated successfully. Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f9f0cf74-f509-4811-9d5f-45b3b5157bf8 Oct 09 23:31:54 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 09 23:31:54 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:54 np0005479288.novalocal iscsid[69457]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0, portal: ::1,3260] through [iface: default] is shutdown. Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 7fbd5eeb-fab2-4eab-8312-454640da3553 Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l a66fde19-028d-4ffd-bc65-c8b5e31395e6 Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:54 np0005479288.novalocal sudo[91287]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 iqn.1994-05.com.redhat:701b36c35245 Oct 09 23:31:54 np0005479288.novalocal systemd[1]: Started Session c106 of User root. Oct 09 23:31:54 np0005479288.novalocal sudo[91287]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l aa2d6ca9-53fa-4721-ae6b-ee33c5acaf71 Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l cc30f29d-0b94-4478-bf50-bdc210816d74 Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l f59fc602-81e4-4d6b-99d4-ddb5a0371877 Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 08050091-3355-47f8-91fe-6b2c0c445685 Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 7cd5edaa-dc51-4652-8c09-96e62b2e3666 Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 5ffa4d18-5cc5-467f-8925-b752c3f05b25 Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0. For complete SELinux messages run: sealert -l 49bed2ff-ba36-4d3f-aa8a-ca26adf29fcc Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l b1801133-6280-494d-a1c4-533367a0633e Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 87ef9ea2-fbff-4282-88c1-68fbccb0902d Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0. For complete SELinux messages run: sealert -l 6ad29123-5352-4ad5-8cd7-49a75a1556b1 Oct 09 23:31:54 np0005479288.novalocal setroubleshoot[91109]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:31:55 np0005479288.novalocal sudo[91287]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:55 np0005479288.novalocal systemd[1]: session-c106.scope: Deactivated successfully. Oct 09 23:31:55 np0005479288.novalocal sudo[91295]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:31:55 np0005479288.novalocal systemd[1]: Started Session c107 of User root. Oct 09 23:31:55 np0005479288.novalocal sudo[91295]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:31:55 np0005479288.novalocal sudo[91295]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:55 np0005479288.novalocal systemd[1]: session-c107.scope: Deactivated successfully. Oct 09 23:31:55 np0005479288.novalocal sudo[91300]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 09 23:31:55 np0005479288.novalocal systemd[1]: Started Session c108 of User root. Oct 09 23:31:55 np0005479288.novalocal sudo[91300]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:31:56 np0005479288.novalocal sudo[91300]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:56 np0005479288.novalocal systemd[1]: session-c108.scope: Deactivated successfully. Oct 09 23:31:56 np0005479288.novalocal sudo[91305]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-64bf1556-569c-4437-af21-25cf5e1116d0 Oct 09 23:31:56 np0005479288.novalocal systemd[1]: Started Session c109 of User root. Oct 09 23:31:56 np0005479288.novalocal sudo[91305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:31:56 np0005479288.novalocal sudo[91305]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:56 np0005479288.novalocal systemd[1]: session-c109.scope: Deactivated successfully. Oct 09 23:31:56 np0005479288.novalocal sudo[91310]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:31:56 np0005479288.novalocal systemd[1]: Started Session c110 of User root. Oct 09 23:31:56 np0005479288.novalocal sudo[91310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:31:57 np0005479288.novalocal sudo[91310]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:57 np0005479288.novalocal systemd[1]: session-c110.scope: Deactivated successfully. Oct 09 23:31:57 np0005479288.novalocal sudo[91318]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context nova.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmppjt6k4bi/privsep.sock Oct 09 23:31:57 np0005479288.novalocal systemd[1]: Started Session c111 of User root. Oct 09 23:31:57 np0005479288.novalocal sudo[91318]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Oct 09 23:31:58 np0005479288.novalocal sudo[91318]: pam_unix(sudo:session): session closed for user root Oct 09 23:31:59 np0005479288.novalocal sudo[91355]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context vif_plug_ovs.privsep.vif_plug --privsep_sock_path /tmp/tmpnjip3uwx/privsep.sock Oct 09 23:31:59 np0005479288.novalocal systemd[1]: Started Session c112 of User root. Oct 09 23:31:59 np0005479288.novalocal sudo[91355]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Oct 09 23:32:00 np0005479288.novalocal sudo[91355]: pam_unix(sudo:session): session closed for user root Oct 09 23:32:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:32:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:32:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:32:01 np0005479288.novalocal kernel: tun: Universal TUN/TAP device driver, 1.6 Oct 09 23:32:01 np0005479288.novalocal NetworkManager[860]: [1760067121.9655] manager: (tapdfefc256-61): new Tun device (/org/freedesktop/NetworkManager/Devices/9) Oct 09 23:32:01 np0005479288.novalocal NetworkManager[860]: [1760067121.9678] manager: (tap6c3d2fae-fa): new Tun device (/org/freedesktop/NetworkManager/Devices/10) Oct 09 23:32:01 np0005479288.novalocal kernel: tap6c3d2fae-fa: entered promiscuous mode Oct 09 23:32:01 np0005479288.novalocal kernel: tapdfefc256-61: entered promiscuous mode Oct 09 23:32:01 np0005479288.novalocal virtqemud[88538]: Domain id=1 name='instance-00000001' uuid=d4682d6a-79e2-4ef3-bb63-3f39ca985ecf is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 09 23:32:01 np0005479288.novalocal virtqemud[88538]: Domain id=1 name='instance-00000001' uuid=d4682d6a-79e2-4ef3-bb63-3f39ca985ecf is tainted: deprecated-config (CPU model 'qemu64') Oct 09 23:32:02 np0005479288.novalocal virtqemud[88538]: Domain id=2 name='instance-00000002' uuid=52662107-dc6f-4e7c-82fc-37c0e285fb50 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 09 23:32:02 np0005479288.novalocal virtqemud[88538]: Domain id=2 name='instance-00000002' uuid=52662107-dc6f-4e7c-82fc-37c0e285fb50 is tainted: deprecated-config (CPU model 'qemu64') Oct 09 23:32:02 np0005479288.novalocal systemd-udevd[91402]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:32:02 np0005479288.novalocal systemd-udevd[91406]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:32:02 np0005479288.novalocal systemd-machined[85828]: New machine qemu-2-instance-00000002. Oct 09 23:32:02 np0005479288.novalocal NetworkManager[860]: [1760067122.0696] device (tap6c3d2fae-fa): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 09 23:32:02 np0005479288.novalocal systemd[1]: Started Virtual Machine qemu-2-instance-00000002. Oct 09 23:32:02 np0005479288.novalocal NetworkManager[860]: [1760067122.0782] device (tap6c3d2fae-fa): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 09 23:32:02 np0005479288.novalocal NetworkManager[860]: [1760067122.0789] device (tapdfefc256-61): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 09 23:32:02 np0005479288.novalocal NetworkManager[860]: [1760067122.0798] device (tapdfefc256-61): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 09 23:32:02 np0005479288.novalocal systemd-machined[85828]: New machine qemu-1-instance-00000001. Oct 09 23:32:02 np0005479288.novalocal systemd[1]: Started Virtual Machine qemu-1-instance-00000001. Oct 09 23:32:02 np0005479288.novalocal sudo[91413]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmpbojlvpj5/privsep.sock Oct 09 23:32:02 np0005479288.novalocal systemd[1]: Started Session c113 of User root. Oct 09 23:32:02 np0005479288.novalocal sudo[91413]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:32:02 np0005479288.novalocal sudo[91413]: pam_unix(sudo:session): session closed for user root Oct 09 23:32:04 np0005479288.novalocal NetworkManager[860]: [1760067124.0529] manager: (tapeb05d677-60): new Veth device (/org/freedesktop/NetworkManager/Devices/11) Oct 09 23:32:04 np0005479288.novalocal NetworkManager[860]: [1760067124.1463] device (tapeb05d677-60): carrier: link connected Oct 09 23:32:04 np0005479288.novalocal kernel: tapeb05d677-60: entered promiscuous mode Oct 09 23:32:04 np0005479288.novalocal sudo[91473]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-eb05d677-6f78-4233-9324-3f2c951fb155 env PROCESS_TAG=haproxy-eb05d677-6f78-4233-9324-3f2c951fb155 haproxy -f /var/lib/neutron/ovn-metadata-proxy/eb05d677-6f78-4233-9324-3f2c951fb155.conf Oct 09 23:32:04 np0005479288.novalocal systemd[1]: Started Session c114 of User root. Oct 09 23:32:04 np0005479288.novalocal sudo[91473]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:32:04 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Deactivated successfully. Oct 09 23:32:04 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Consumed 1.179s CPU time. Oct 09 23:32:04 np0005479288.novalocal sudo[91473]: pam_unix(sudo:session): session closed for user root Oct 09 23:32:04 np0005479288.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 09 23:32:04 np0005479288.novalocal systemd[1]: setroubleshootd.service: Consumed 3.418s CPU time. Oct 09 23:32:05 np0005479288.novalocal NetworkManager[860]: [1760067125.2046] manager: (tap1a3e0739-b0): new Veth device (/org/freedesktop/NetworkManager/Devices/12) Oct 09 23:32:05 np0005479288.novalocal systemd-udevd[91502]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:32:05 np0005479288.novalocal NetworkManager[860]: [1760067125.2895] device (tap1a3e0739-b0): carrier: link connected Oct 09 23:32:05 np0005479288.novalocal kernel: tap1a3e0739-b0: entered promiscuous mode Oct 09 23:32:05 np0005479288.novalocal sudo[91531]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-1a3e0739-ba0e-42ea-94b1-668e80f073be env PROCESS_TAG=haproxy-1a3e0739-ba0e-42ea-94b1-668e80f073be haproxy -f /var/lib/neutron/ovn-metadata-proxy/1a3e0739-ba0e-42ea-94b1-668e80f073be.conf Oct 09 23:32:05 np0005479288.novalocal systemd[1]: Started Session c115 of User root. Oct 09 23:32:05 np0005479288.novalocal sudo[91531]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:32:05 np0005479288.novalocal sudo[91531]: pam_unix(sudo:session): session closed for user root Oct 09 23:32:13 np0005479288.novalocal kernel: tap6c3d2fae-fa (unregistering): left promiscuous mode Oct 09 23:32:13 np0005479288.novalocal NetworkManager[860]: [1760067133.7139] device (tap6c3d2fae-fa): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 09 23:32:13 np0005479288.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Deactivated successfully. Oct 09 23:32:13 np0005479288.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Consumed 11.484s CPU time. Oct 09 23:32:13 np0005479288.novalocal systemd[1]: session-c114.scope: Deactivated successfully. Oct 09 23:32:13 np0005479288.novalocal systemd-machined[85828]: Machine qemu-1-instance-00000001 terminated. Oct 09 23:32:13 np0005479288.novalocal kernel: tapeb05d677-60: left promiscuous mode Oct 09 23:32:13 np0005479288.novalocal systemd[1]: run-netns-ovnmeta\x2deb05d677\x2d6f78\x2d4233\x2d9324\x2d3f2c951fb155.mount: Deactivated successfully. Oct 09 23:32:24 np0005479288.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 09 23:32:24 np0005479288.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 09 23:32:25 np0005479288.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service. Oct 09 23:32:26 np0005479288.novalocal setroubleshoot[91670]: SELinux is preventing /usr/sbin/httpd from read access on the file ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. For complete SELinux messages run: sealert -l 202bf40f-a5d3-4d44-a348-635fdaaf3dcc Oct 09 23:32:26 np0005479288.novalocal setroubleshoot[91670]: SELinux is preventing /usr/sbin/httpd from read access on the file ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:32:26 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:58800 [09/Oct/2025:23:32:23.304] listener listener/metadata 0/0/0/3399/3399 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 09 23:32:26 np0005479288.novalocal setroubleshoot[91670]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1': Oct 09 23:32:26 np0005479288.novalocal setroubleshoot[91670]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. For complete SELinux messages run: sealert -l 72b00df5-2d7f-4f61-a39c-286af89cf177 Oct 09 23:32:26 np0005479288.novalocal setroubleshoot[91670]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:32:26 np0005479288.novalocal setroubleshoot[91670]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. For complete SELinux messages run: sealert -l 0273ae40-a53e-4c15-946c-9d74dfa7ad9c Oct 09 23:32:26 np0005479288.novalocal setroubleshoot[91670]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:32:26 np0005479288.novalocal setroubleshoot[91670]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. For complete SELinux messages run: sealert -l 0d52e905-9fb6-4d54-bf61-d24c29c29f26 Oct 09 23:32:26 np0005479288.novalocal setroubleshoot[91670]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the ae808f994cb4eef48982a3a11e2314047b45bfa6d569f499c86a391b03c71dc1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:32:28 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:58814 [09/Oct/2025:23:32:26.753] listener listener/metadata 0/0/0/1910/1910 200 148 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Oct 09 23:32:28 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:40738 [09/Oct/2025:23:32:28.716] listener listener/metadata 0/0/0/16/16 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Oct 09 23:32:28 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:40754 [09/Oct/2025:23:32:28.787] listener listener/metadata 0/0/0/16/16 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 09 23:32:28 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:40762 [09/Oct/2025:23:32:28.849] listener listener/metadata 0/0/0/15/15 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Oct 09 23:32:28 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:40766 [09/Oct/2025:23:32:28.908] listener listener/metadata 0/0/0/15/15 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Oct 09 23:32:28 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:40774 [09/Oct/2025:23:32:28.956] listener listener/metadata 0/0/0/15/15 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Oct 09 23:32:29 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:40776 [09/Oct/2025:23:32:29.005] listener listener/metadata 0/0/0/15/15 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Oct 09 23:32:29 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:40778 [09/Oct/2025:23:32:29.054] listener listener/metadata 0/0/0/15/15 200 184 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Oct 09 23:32:29 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:40790 [09/Oct/2025:23:32:29.104] listener listener/metadata 0/0/0/15/15 200 184 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Oct 09 23:32:29 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:40798 [09/Oct/2025:23:32:29.159] listener listener/metadata 0/0/0/15/15 200 215 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Oct 09 23:32:29 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:40808 [09/Oct/2025:23:32:29.214] listener listener/metadata 0/0/0/13/13 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Oct 09 23:32:29 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:40812 [09/Oct/2025:23:32:29.256] listener listener/metadata 0/0/0/15/15 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Oct 09 23:32:29 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:40828 [09/Oct/2025:23:32:29.301] listener listener/metadata 0/0/0/14/14 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Oct 09 23:32:29 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:40832 [09/Oct/2025:23:32:29.351] listener listener/metadata 0/0/0/13/13 200 184 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Oct 09 23:32:29 np0005479288.novalocal haproxy-metadata-proxy-1a3e0739-ba0e-42ea-94b1-668e80f073be[91536]: 10.100.0.7:40838 [09/Oct/2025:23:32:29.398] listener listener/metadata 0/0/0/12/12 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Oct 09 23:32:36 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Deactivated successfully. Oct 09 23:32:36 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Consumed 1.304s CPU time. Oct 09 23:32:36 np0005479288.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 09 23:32:36 np0005479288.novalocal systemd[1]: setroubleshootd.service: Consumed 1.346s CPU time. Oct 09 23:32:42 np0005479288.novalocal kernel: tap707c843a-3b: entered promiscuous mode Oct 09 23:32:43 np0005479288.novalocal NetworkManager[860]: [1760067163.0024] manager: (tap707c843a-3b): new Tun device (/org/freedesktop/NetworkManager/Devices/13) Oct 09 23:32:43 np0005479288.novalocal virtqemud[88538]: Domain id=3 name='instance-00000003' uuid=3eeb53c7-406f-4a47-b2d6-86d3872b1815 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 09 23:32:43 np0005479288.novalocal virtqemud[88538]: Domain id=3 name='instance-00000003' uuid=3eeb53c7-406f-4a47-b2d6-86d3872b1815 is tainted: deprecated-config (CPU model 'qemu64') Oct 09 23:32:43 np0005479288.novalocal systemd-machined[85828]: New machine qemu-3-instance-00000003. Oct 09 23:32:43 np0005479288.novalocal systemd[1]: Started Virtual Machine qemu-3-instance-00000003. Oct 09 23:32:43 np0005479288.novalocal systemd-udevd[91743]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:32:43 np0005479288.novalocal NetworkManager[860]: [1760067163.1091] device (tap707c843a-3b): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 09 23:32:43 np0005479288.novalocal NetworkManager[860]: [1760067163.1109] device (tap707c843a-3b): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 09 23:32:43 np0005479288.novalocal systemd-udevd[91745]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:32:43 np0005479288.novalocal NetworkManager[860]: [1760067163.1788] manager: (tap9c1b3e7c-10): new Veth device (/org/freedesktop/NetworkManager/Devices/14) Oct 09 23:32:43 np0005479288.novalocal NetworkManager[860]: [1760067163.2596] device (tap9c1b3e7c-10): carrier: link connected Oct 09 23:32:43 np0005479288.novalocal kernel: tap9c1b3e7c-10: entered promiscuous mode Oct 09 23:32:43 np0005479288.novalocal sudo[91788]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-9c1b3e7c-124e-40bb-9346-31bc3f20778c env PROCESS_TAG=haproxy-9c1b3e7c-124e-40bb-9346-31bc3f20778c haproxy -f /var/lib/neutron/ovn-metadata-proxy/9c1b3e7c-124e-40bb-9346-31bc3f20778c.conf Oct 09 23:32:43 np0005479288.novalocal systemd[1]: Started Session c116 of User root. Oct 09 23:32:43 np0005479288.novalocal sudo[91788]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:32:43 np0005479288.novalocal sudo[91788]: pam_unix(sudo:session): session closed for user root Oct 09 23:32:48 np0005479288.novalocal sudo[91801]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:32:48 np0005479288.novalocal systemd[1]: Started Session c117 of User root. Oct 09 23:32:48 np0005479288.novalocal sudo[91801]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:32:48 np0005479288.novalocal sudo[91801]: pam_unix(sudo:session): session closed for user root Oct 09 23:32:48 np0005479288.novalocal systemd[1]: session-c117.scope: Deactivated successfully. Oct 09 23:32:49 np0005479288.novalocal sudo[91805]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:32:49 np0005479288.novalocal systemd[1]: Started Session c118 of User root. Oct 09 23:32:49 np0005479288.novalocal sudo[91805]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:32:49 np0005479288.novalocal sudo[91805]: pam_unix(sudo:session): session closed for user root Oct 09 23:32:49 np0005479288.novalocal systemd[1]: session-c118.scope: Deactivated successfully. Oct 09 23:32:49 np0005479288.novalocal sudo[91809]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:32:49 np0005479288.novalocal systemd[1]: Started Session c119 of User root. Oct 09 23:32:49 np0005479288.novalocal sudo[91809]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:32:49 np0005479288.novalocal sudo[91809]: pam_unix(sudo:session): session closed for user root Oct 09 23:32:49 np0005479288.novalocal systemd[1]: session-c119.scope: Deactivated successfully. Oct 09 23:32:49 np0005479288.novalocal sudo[91814]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:32:49 np0005479288.novalocal systemd[1]: Started Session c120 of User root. Oct 09 23:32:49 np0005479288.novalocal sudo[91814]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:32:50 np0005479288.novalocal sudo[91814]: pam_unix(sudo:session): session closed for user root Oct 09 23:32:50 np0005479288.novalocal systemd[1]: session-c120.scope: Deactivated successfully. Oct 09 23:32:54 np0005479288.novalocal kernel: tapdfefc256-61 (unregistering): left promiscuous mode Oct 09 23:32:54 np0005479288.novalocal NetworkManager[860]: [1760067174.0736] device (tapdfefc256-61): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 09 23:32:54 np0005479288.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Deactivated successfully. Oct 09 23:32:54 np0005479288.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Consumed 20.571s CPU time. Oct 09 23:32:54 np0005479288.novalocal systemd-machined[85828]: Machine qemu-2-instance-00000002 terminated. Oct 09 23:32:54 np0005479288.novalocal systemd[1]: session-c115.scope: Deactivated successfully. Oct 09 23:32:54 np0005479288.novalocal kernel: tap1a3e0739-b0: left promiscuous mode Oct 09 23:32:54 np0005479288.novalocal systemd[1]: run-netns-ovnmeta\x2d1a3e0739\x2dba0e\x2d42ea\x2d94b1\x2d668e80f073be.mount: Deactivated successfully. Oct 09 23:32:55 np0005479288.novalocal kernel: tap707c843a-3b (unregistering): left promiscuous mode Oct 09 23:32:55 np0005479288.novalocal NetworkManager[860]: [1760067175.7341] device (tap707c843a-3b): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 09 23:32:55 np0005479288.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Deactivated successfully. Oct 09 23:32:55 np0005479288.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Consumed 12.608s CPU time. Oct 09 23:32:55 np0005479288.novalocal systemd-machined[85828]: Machine qemu-3-instance-00000003 terminated. Oct 09 23:32:55 np0005479288.novalocal systemd[1]: session-c116.scope: Deactivated successfully. Oct 09 23:32:55 np0005479288.novalocal kernel: tap9c1b3e7c-10: left promiscuous mode Oct 09 23:32:55 np0005479288.novalocal systemd[1]: run-netns-ovnmeta\x2d9c1b3e7c\x2d124e\x2d40bb\x2d9346\x2d31bc3f20778c.mount: Deactivated successfully. Oct 09 23:33:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:33:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:33:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:33:16 np0005479288.novalocal sudo[91953]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-64bf1556-569c-4437-af21-25cf5e1116d0 Oct 09 23:33:16 np0005479288.novalocal systemd[1]: Started Session c121 of User root. Oct 09 23:33:16 np0005479288.novalocal sudo[91953]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:17 np0005479288.novalocal sudo[91953]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:17 np0005479288.novalocal systemd[1]: session-c121.scope: Deactivated successfully. Oct 09 23:33:17 np0005479288.novalocal sudo[91957]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate --name volume-c7a3d40d-7966-4ed5-bde5-262a48eb7cae --snapshot cinder-volumes/volume-64bf1556-569c-4437-af21-25cf5e1116d0 Oct 09 23:33:17 np0005479288.novalocal systemd[1]: Started Session c122 of User root. Oct 09 23:33:17 np0005479288.novalocal sudo[91957]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:17 np0005479288.novalocal dmeventd[84378]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Oct 09 23:33:17 np0005479288.novalocal dmeventd[84378]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Oct 09 23:33:17 np0005479288.novalocal lvm[91969]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:33:17 np0005479288.novalocal lvm[91969]: VG cinder-volumes finished Oct 09 23:33:17 np0005479288.novalocal sudo[91957]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:17 np0005479288.novalocal systemd[1]: session-c122.scope: Deactivated successfully. Oct 09 23:33:17 np0005479288.novalocal sudo[91971]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -k n cinder-volumes/volume-c7a3d40d-7966-4ed5-bde5-262a48eb7cae Oct 09 23:33:17 np0005479288.novalocal systemd[1]: Started Session c123 of User root. Oct 09 23:33:17 np0005479288.novalocal sudo[91971]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:18 np0005479288.novalocal lvm[91976]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:33:18 np0005479288.novalocal lvm[91976]: VG cinder-volumes finished Oct 09 23:33:18 np0005479288.novalocal sudo[91971]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:18 np0005479288.novalocal systemd[1]: session-c123.scope: Deactivated successfully. Oct 09 23:33:25 np0005479288.novalocal sudo[92005]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpyr291cn1/privsep.sock Oct 09 23:33:25 np0005479288.novalocal systemd[1]: Started Session c124 of User root. Oct 09 23:33:25 np0005479288.novalocal sudo[92005]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Oct 09 23:33:25 np0005479288.novalocal kernel: tapb2449b62-b1: entered promiscuous mode Oct 09 23:33:25 np0005479288.novalocal NetworkManager[860]: [1760067205.8173] manager: (tapb2449b62-b1): new Tun device (/org/freedesktop/NetworkManager/Devices/15) Oct 09 23:33:25 np0005479288.novalocal virtqemud[88538]: Domain id=4 name='instance-00000004' uuid=182e7e4d-7b78-464a-a702-2f16908154f4 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 09 23:33:25 np0005479288.novalocal virtqemud[88538]: Domain id=4 name='instance-00000004' uuid=182e7e4d-7b78-464a-a702-2f16908154f4 is tainted: deprecated-config (CPU model 'qemu64') Oct 09 23:33:25 np0005479288.novalocal systemd-machined[85828]: New machine qemu-4-instance-00000004. Oct 09 23:33:25 np0005479288.novalocal systemd[1]: Started Virtual Machine qemu-4-instance-00000004. Oct 09 23:33:25 np0005479288.novalocal systemd-udevd[92026]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:33:25 np0005479288.novalocal NetworkManager[860]: [1760067205.9162] device (tapb2449b62-b1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 09 23:33:25 np0005479288.novalocal NetworkManager[860]: [1760067205.9171] device (tapb2449b62-b1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 09 23:33:25 np0005479288.novalocal NetworkManager[860]: [1760067205.9633] manager: (tap2faeb113-60): new Veth device (/org/freedesktop/NetworkManager/Devices/16) Oct 09 23:33:26 np0005479288.novalocal NetworkManager[860]: [1760067206.0307] device (tap2faeb113-60): carrier: link connected Oct 09 23:33:26 np0005479288.novalocal kernel: tap2faeb113-60: entered promiscuous mode Oct 09 23:33:26 np0005479288.novalocal sudo[92071]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-2faeb113-6a95-44d1-b2ce-894227d84879 env PROCESS_TAG=haproxy-2faeb113-6a95-44d1-b2ce-894227d84879 haproxy -f /var/lib/neutron/ovn-metadata-proxy/2faeb113-6a95-44d1-b2ce-894227d84879.conf Oct 09 23:33:26 np0005479288.novalocal systemd[1]: Started Session c125 of User root. Oct 09 23:33:26 np0005479288.novalocal sudo[92071]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:33:26 np0005479288.novalocal sudo[92005]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:26 np0005479288.novalocal sudo[92092]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-c7a3d40d-7966-4ed5-bde5-262a48eb7cae Oct 09 23:33:26 np0005479288.novalocal sudo[92071]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:26 np0005479288.novalocal systemd[1]: Started Session c126 of User root. Oct 09 23:33:26 np0005479288.novalocal sudo[92092]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:27 np0005479288.novalocal sudo[92092]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:27 np0005479288.novalocal systemd[1]: session-c126.scope: Deactivated successfully. Oct 09 23:33:27 np0005479288.novalocal sudo[92097]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-c7a3d40d-7966-4ed5-bde5-262a48eb7cae iqn.2010-10.org.openstack:volume-c7a3d40d-7966-4ed5-bde5-262a48eb7cae Kk3T25nhMjwMVge47BGt GScv5jxk9V6MKqiV False -p3260 -a::1 Oct 09 23:33:27 np0005479288.novalocal systemd[1]: Started Session c127 of User root. Oct 09 23:33:27 np0005479288.novalocal sudo[92097]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:27 np0005479288.novalocal sudo[92097]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:27 np0005479288.novalocal systemd[1]: session-c127.scope: Deactivated successfully. Oct 09 23:33:27 np0005479288.novalocal sudo[92103]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 09 23:33:27 np0005479288.novalocal systemd[1]: Started Session c128 of User root. Oct 09 23:33:27 np0005479288.novalocal sudo[92103]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:28 np0005479288.novalocal sudo[92103]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:28 np0005479288.novalocal systemd[1]: session-c128.scope: Deactivated successfully. Oct 09 23:33:28 np0005479288.novalocal sudo[92108]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:33:28 np0005479288.novalocal systemd[1]: Started Session c129 of User root. Oct 09 23:33:28 np0005479288.novalocal sudo[92108]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:28 np0005479288.novalocal sudo[92108]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:28 np0005479288.novalocal systemd[1]: session-c129.scope: Deactivated successfully. Oct 09 23:33:28 np0005479288.novalocal sudo[92113]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-c7a3d40d-7966-4ed5-bde5-262a48eb7cae Kk3T25nhMjwMVge47BGt GScv5jxk9V6MKqiV iqn.1994-05.com.redhat:701b36c35245 Oct 09 23:33:28 np0005479288.novalocal systemd[1]: Started Session c130 of User root. Oct 09 23:33:28 np0005479288.novalocal sudo[92113]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:29 np0005479288.novalocal sudo[92113]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:29 np0005479288.novalocal systemd[1]: session-c130.scope: Deactivated successfully. Oct 09 23:33:29 np0005479288.novalocal sudo[92118]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:33:29 np0005479288.novalocal systemd[1]: Started Session c131 of User root. Oct 09 23:33:29 np0005479288.novalocal sudo[92118]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:29 np0005479288.novalocal sudo[92118]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:29 np0005479288.novalocal systemd[1]: session-c131.scope: Deactivated successfully. Oct 09 23:33:31 np0005479288.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 09 23:33:31 np0005479288.novalocal iscsid[69457]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-c7a3d40d-7966-4ed5-bde5-262a48eb7cae, portal: ::1,3260] through [iface: default] is operational now Oct 09 23:33:31 np0005479288.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 09 23:33:31 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 09 23:33:31 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405bca524524ac44984afd2cf5b7 port group 0 rel port 1 Oct 09 23:33:31 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 09 23:33:31 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 09 23:33:31 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 09 23:33:31 np0005479288.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Oct 09 23:33:31 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 09 23:33:31 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:33:31 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 09 23:33:31 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 09 23:33:31 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:33:31 np0005479288.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Oct 09 23:33:31 np0005479288.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 09 23:33:32 np0005479288.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 09 23:33:32 np0005479288.novalocal kernel: GPT:229375 != 2097151 Oct 09 23:33:32 np0005479288.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 09 23:33:32 np0005479288.novalocal kernel: GPT:229375 != 2097151 Oct 09 23:33:32 np0005479288.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 09 23:33:32 np0005479288.novalocal kernel: sda: sda1 sda15 Oct 09 23:33:32 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 09 23:33:32 np0005479288.novalocal systemd[1]: Listening on libvirt secret daemon admin socket. Oct 09 23:33:32 np0005479288.novalocal systemd[1]: Listening on libvirt secret daemon read-only socket. Oct 09 23:33:32 np0005479288.novalocal systemd[1]: Starting libvirt secret daemon... Oct 09 23:33:33 np0005479288.novalocal systemd[1]: Started libvirt secret daemon. Oct 09 23:33:35 np0005479288.novalocal NetworkManager[860]: [1760067215.1665] manager: (tap66cc639e-9c): new Tun device (/org/freedesktop/NetworkManager/Devices/17) Oct 09 23:33:35 np0005479288.novalocal kernel: tap66cc639e-9c: entered promiscuous mode Oct 09 23:33:35 np0005479288.novalocal virtqemud[88538]: Domain id=5 name='instance-00000005' uuid=f4eab76a-3778-46d1-a34e-a295c8048ec9 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 09 23:33:35 np0005479288.novalocal virtqemud[88538]: Domain id=5 name='instance-00000005' uuid=f4eab76a-3778-46d1-a34e-a295c8048ec9 is tainted: deprecated-config (CPU model 'qemu64') Oct 09 23:33:35 np0005479288.novalocal systemd-udevd[92195]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:33:35 np0005479288.novalocal systemd-machined[85828]: New machine qemu-5-instance-00000005. Oct 09 23:33:35 np0005479288.novalocal NetworkManager[860]: [1760067215.2627] device (tap66cc639e-9c): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 09 23:33:35 np0005479288.novalocal NetworkManager[860]: [1760067215.2638] device (tap66cc639e-9c): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 09 23:33:35 np0005479288.novalocal systemd[1]: Started Virtual Machine qemu-5-instance-00000005. Oct 09 23:33:35 np0005479288.novalocal NetworkManager[860]: [1760067215.3847] manager: (tapb140fa26-60): new Veth device (/org/freedesktop/NetworkManager/Devices/18) Oct 09 23:33:35 np0005479288.novalocal systemd-udevd[92203]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:33:35 np0005479288.novalocal NetworkManager[860]: [1760067215.4657] device (tapb140fa26-60): carrier: link connected Oct 09 23:33:35 np0005479288.novalocal kernel: tapb140fa26-60: entered promiscuous mode Oct 09 23:33:35 np0005479288.novalocal sudo[92246]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-b140fa26-6566-4244-8082-9600bbc9b168 env PROCESS_TAG=haproxy-b140fa26-6566-4244-8082-9600bbc9b168 haproxy -f /var/lib/neutron/ovn-metadata-proxy/b140fa26-6566-4244-8082-9600bbc9b168.conf Oct 09 23:33:35 np0005479288.novalocal systemd[1]: Started Session c132 of User root. Oct 09 23:33:35 np0005479288.novalocal sudo[92246]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:33:36 np0005479288.novalocal sudo[92246]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:41 np0005479288.novalocal kernel: tap66cc639e-9c (unregistering): left promiscuous mode Oct 09 23:33:41 np0005479288.novalocal NetworkManager[860]: [1760067221.6636] device (tap66cc639e-9c): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 09 23:33:41 np0005479288.novalocal systemd[1]: session-c132.scope: Deactivated successfully. Oct 09 23:33:41 np0005479288.novalocal kernel: tapb140fa26-60: left promiscuous mode Oct 09 23:33:41 np0005479288.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Deactivated successfully. Oct 09 23:33:41 np0005479288.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Consumed 6.216s CPU time. Oct 09 23:33:41 np0005479288.novalocal systemd-machined[85828]: Machine qemu-5-instance-00000005 terminated. Oct 09 23:33:41 np0005479288.novalocal systemd[1]: run-netns-ovnmeta\x2db140fa26\x2d6566\x2d4244\x2d8082\x2d9600bbc9b168.mount: Deactivated successfully. Oct 09 23:33:41 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:33:41 np0005479288.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 09 23:33:41 np0005479288.novalocal kernel: GPT:229375 != 2097151 Oct 09 23:33:41 np0005479288.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 09 23:33:41 np0005479288.novalocal kernel: GPT:229375 != 2097151 Oct 09 23:33:41 np0005479288.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 09 23:33:41 np0005479288.novalocal kernel: sda: sda1 sda15 Oct 09 23:33:41 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:33:41 np0005479288.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 09 23:33:41 np0005479288.novalocal kernel: GPT:229375 != 2097151 Oct 09 23:33:41 np0005479288.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 09 23:33:41 np0005479288.novalocal kernel: GPT:229375 != 2097151 Oct 09 23:33:41 np0005479288.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 09 23:33:41 np0005479288.novalocal kernel: sda: sda1 sda15 Oct 09 23:33:42 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 09 23:33:42 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 09 23:33:42 np0005479288.novalocal iscsid[69457]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-c7a3d40d-7966-4ed5-bde5-262a48eb7cae, portal: ::1,3260] through [iface: default] is shutdown. Oct 09 23:33:44 np0005479288.novalocal sudo[92352]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-c7a3d40d-7966-4ed5-bde5-262a48eb7cae iqn.1994-05.com.redhat:701b36c35245 Oct 09 23:33:44 np0005479288.novalocal systemd[1]: Started Session c133 of User root. Oct 09 23:33:44 np0005479288.novalocal sudo[92352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:45 np0005479288.novalocal sudo[92352]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:45 np0005479288.novalocal systemd[1]: session-c133.scope: Deactivated successfully. Oct 09 23:33:45 np0005479288.novalocal sudo[92357]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:33:45 np0005479288.novalocal systemd[1]: Started Session c134 of User root. Oct 09 23:33:45 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45720 [09/Oct/2025:23:33:45.352] listener listener/metadata 0/0/0/156/156 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 09 23:33:45 np0005479288.novalocal sudo[92357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:45 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45728 [09/Oct/2025:23:33:45.589] listener listener/metadata 0/0/0/14/14 200 148 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Oct 09 23:33:45 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45742 [09/Oct/2025:23:33:45.639] listener listener/metadata 0/0/0/16/16 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Oct 09 23:33:45 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45756 [09/Oct/2025:23:33:45.699] listener listener/metadata 0/0/0/16/16 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 09 23:33:45 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45762 [09/Oct/2025:23:33:45.756] listener listener/metadata 0/0/0/15/15 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Oct 09 23:33:45 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45772 [09/Oct/2025:23:33:45.807] listener listener/metadata 0/0/0/12/12 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Oct 09 23:33:45 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45778 [09/Oct/2025:23:33:45.853] listener listener/metadata 0/0/0/18/18 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Oct 09 23:33:45 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45788 [09/Oct/2025:23:33:45.903] listener listener/metadata 0/0/0/13/13 200 132 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Oct 09 23:33:45 np0005479288.novalocal sudo[92357]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:45 np0005479288.novalocal systemd[1]: session-c134.scope: Deactivated successfully. Oct 09 23:33:45 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45790 [09/Oct/2025:23:33:45.950] listener listener/metadata 0/0/0/17/17 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Oct 09 23:33:45 np0005479288.novalocal sudo[92362]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 09 23:33:46 np0005479288.novalocal systemd[1]: Started Session c135 of User root. Oct 09 23:33:46 np0005479288.novalocal sudo[92362]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:46 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45796 [09/Oct/2025:23:33:46.000] listener listener/metadata 0/0/0/16/16 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Oct 09 23:33:46 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45802 [09/Oct/2025:23:33:46.053] listener listener/metadata 0/0/0/14/14 200 215 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Oct 09 23:33:46 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45806 [09/Oct/2025:23:33:46.100] listener listener/metadata 0/0/0/14/14 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Oct 09 23:33:46 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45812 [09/Oct/2025:23:33:46.139] listener listener/metadata 0/0/0/13/13 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Oct 09 23:33:46 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45820 [09/Oct/2025:23:33:46.179] listener listener/metadata 0/0/0/13/13 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Oct 09 23:33:46 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45834 [09/Oct/2025:23:33:46.230] listener listener/metadata 0/0/0/15/15 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Oct 09 23:33:46 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92084]: 10.100.0.12:45844 [09/Oct/2025:23:33:46.281] listener listener/metadata 0/0/0/19/19 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Oct 09 23:33:46 np0005479288.novalocal sudo[92362]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:46 np0005479288.novalocal systemd[1]: session-c135.scope: Deactivated successfully. Oct 09 23:33:46 np0005479288.novalocal sudo[92367]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-c7a3d40d-7966-4ed5-bde5-262a48eb7cae Oct 09 23:33:46 np0005479288.novalocal systemd[1]: Started Session c136 of User root. Oct 09 23:33:46 np0005479288.novalocal sudo[92367]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:46 np0005479288.novalocal sudo[92367]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:47 np0005479288.novalocal systemd[1]: session-c136.scope: Deactivated successfully. Oct 09 23:33:47 np0005479288.novalocal sudo[92372]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:33:47 np0005479288.novalocal systemd[1]: Started Session c137 of User root. Oct 09 23:33:47 np0005479288.novalocal sudo[92372]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:47 np0005479288.novalocal sudo[92372]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:47 np0005479288.novalocal systemd[1]: session-c137.scope: Deactivated successfully. Oct 09 23:33:47 np0005479288.novalocal sudo[92377]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 09 23:33:47 np0005479288.novalocal systemd[1]: Started Session c138 of User root. Oct 09 23:33:47 np0005479288.novalocal sudo[92377]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:48 np0005479288.novalocal sudo[92377]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:48 np0005479288.novalocal systemd[1]: session-c138.scope: Deactivated successfully. Oct 09 23:33:48 np0005479288.novalocal sudo[92382]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-c7a3d40d-7966-4ed5-bde5-262a48eb7cae Oct 09 23:33:48 np0005479288.novalocal systemd[1]: Started Session c139 of User root. Oct 09 23:33:48 np0005479288.novalocal sudo[92382]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:48 np0005479288.novalocal sudo[92384]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:33:48 np0005479288.novalocal systemd[1]: Started Session c140 of User root. Oct 09 23:33:48 np0005479288.novalocal sudo[92384]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:48 np0005479288.novalocal sudo[92382]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:48 np0005479288.novalocal systemd[1]: session-c139.scope: Deactivated successfully. Oct 09 23:33:48 np0005479288.novalocal sudo[92390]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-c7a3d40d-7966-4ed5-bde5-262a48eb7cae Oct 09 23:33:48 np0005479288.novalocal sudo[92384]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:48 np0005479288.novalocal systemd[1]: Started Session c141 of User root. Oct 09 23:33:48 np0005479288.novalocal systemd[1]: session-c140.scope: Deactivated successfully. Oct 09 23:33:48 np0005479288.novalocal sudo[92390]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:48 np0005479288.novalocal sudo[92392]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:33:49 np0005479288.novalocal systemd[1]: Started Session c142 of User root. Oct 09 23:33:49 np0005479288.novalocal sudo[92392]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:49 np0005479288.novalocal sudo[92390]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:49 np0005479288.novalocal systemd[1]: session-c141.scope: Deactivated successfully. Oct 09 23:33:49 np0005479288.novalocal sudo[92398]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-c7a3d40d-7966-4ed5-bde5-262a48eb7cae Oct 09 23:33:49 np0005479288.novalocal sudo[92392]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:49 np0005479288.novalocal systemd[1]: Started Session c143 of User root. Oct 09 23:33:49 np0005479288.novalocal systemd[1]: session-c142.scope: Deactivated successfully. Oct 09 23:33:49 np0005479288.novalocal sudo[92398]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:49 np0005479288.novalocal sudo[92400]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:33:49 np0005479288.novalocal systemd[1]: Started Session c144 of User root. Oct 09 23:33:49 np0005479288.novalocal sudo[92400]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:49 np0005479288.novalocal lvm[92408]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:33:49 np0005479288.novalocal lvm[92408]: VG cinder-volumes finished Oct 09 23:33:49 np0005479288.novalocal sudo[92398]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:49 np0005479288.novalocal systemd[1]: session-c143.scope: Deactivated successfully. Oct 09 23:33:49 np0005479288.novalocal sudo[92400]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:49 np0005479288.novalocal systemd[1]: session-c144.scope: Deactivated successfully. Oct 09 23:33:49 np0005479288.novalocal sudo[92410]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:33:49 np0005479288.novalocal systemd[1]: Started Session c145 of User root. Oct 09 23:33:49 np0005479288.novalocal sudo[92411]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:33:49 np0005479288.novalocal sudo[92410]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:49 np0005479288.novalocal systemd[1]: Started Session c146 of User root. Oct 09 23:33:49 np0005479288.novalocal sudo[92411]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:50 np0005479288.novalocal sudo[92411]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:50 np0005479288.novalocal systemd[1]: session-c146.scope: Deactivated successfully. Oct 09 23:33:50 np0005479288.novalocal sudo[92410]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:50 np0005479288.novalocal systemd[1]: session-c145.scope: Deactivated successfully. Oct 09 23:33:50 np0005479288.novalocal sudo[92418]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:33:50 np0005479288.novalocal systemd[1]: Started Session c147 of User root. Oct 09 23:33:50 np0005479288.novalocal sudo[92418]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:50 np0005479288.novalocal sudo[92418]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:50 np0005479288.novalocal systemd[1]: session-c147.scope: Deactivated successfully. Oct 09 23:33:50 np0005479288.novalocal sudo[92424]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:33:50 np0005479288.novalocal systemd[1]: Started Session c148 of User root. Oct 09 23:33:50 np0005479288.novalocal sudo[92424]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:51 np0005479288.novalocal sudo[92424]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:51 np0005479288.novalocal systemd[1]: session-c148.scope: Deactivated successfully. Oct 09 23:33:51 np0005479288.novalocal sudo[92431]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:33:51 np0005479288.novalocal systemd[1]: Started Session c149 of User root. Oct 09 23:33:51 np0005479288.novalocal sudo[92431]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:33:51 np0005479288.novalocal sudo[92431]: pam_unix(sudo:session): session closed for user root Oct 09 23:33:51 np0005479288.novalocal systemd[1]: session-c149.scope: Deactivated successfully. Oct 09 23:33:55 np0005479288.novalocal kernel: tapb2449b62-b1 (unregistering): left promiscuous mode Oct 09 23:33:55 np0005479288.novalocal NetworkManager[860]: [1760067235.7933] device (tapb2449b62-b1): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 09 23:33:55 np0005479288.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Deactivated successfully. Oct 09 23:33:55 np0005479288.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Consumed 19.413s CPU time. Oct 09 23:33:55 np0005479288.novalocal systemd[1]: session-c125.scope: Deactivated successfully. Oct 09 23:33:55 np0005479288.novalocal systemd-machined[85828]: Machine qemu-4-instance-00000004 terminated. Oct 09 23:33:55 np0005479288.novalocal kernel: tap2faeb113-60: left promiscuous mode Oct 09 23:33:55 np0005479288.novalocal systemd[1]: run-netns-ovnmeta\x2d2faeb113\x2d6a95\x2d44d1\x2db2ce\x2d894227d84879.mount: Deactivated successfully. Oct 09 23:33:55 np0005479288.novalocal kernel: tapb2449b62-b1: entered promiscuous mode Oct 09 23:33:55 np0005479288.novalocal NetworkManager[860]: [1760067235.9996] manager: (tapb2449b62-b1): new Tun device (/org/freedesktop/NetworkManager/Devices/19) Oct 09 23:33:56 np0005479288.novalocal kernel: tapb2449b62-b1 (unregistering): left promiscuous mode Oct 09 23:33:59 np0005479288.novalocal kernel: tapb2449b62-b1: entered promiscuous mode Oct 09 23:33:59 np0005479288.novalocal NetworkManager[860]: [1760067239.1822] manager: (tapb2449b62-b1): new Tun device (/org/freedesktop/NetworkManager/Devices/20) Oct 09 23:33:59 np0005479288.novalocal virtqemud[88538]: Domain id=6 name='instance-00000004' uuid=182e7e4d-7b78-464a-a702-2f16908154f4 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 09 23:33:59 np0005479288.novalocal virtqemud[88538]: Domain id=6 name='instance-00000004' uuid=182e7e4d-7b78-464a-a702-2f16908154f4 is tainted: deprecated-config (CPU model 'qemu64') Oct 09 23:33:59 np0005479288.novalocal systemd-machined[85828]: New machine qemu-6-instance-00000004. Oct 09 23:33:59 np0005479288.novalocal systemd[1]: Started Virtual Machine qemu-6-instance-00000004. Oct 09 23:33:59 np0005479288.novalocal systemd-udevd[92497]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:33:59 np0005479288.novalocal NetworkManager[860]: [1760067239.3094] device (tapb2449b62-b1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 09 23:33:59 np0005479288.novalocal NetworkManager[860]: [1760067239.3106] device (tapb2449b62-b1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 09 23:33:59 np0005479288.novalocal NetworkManager[860]: [1760067239.3172] manager: (tap2faeb113-60): new Veth device (/org/freedesktop/NetworkManager/Devices/21) Oct 09 23:33:59 np0005479288.novalocal systemd-udevd[92504]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:33:59 np0005479288.novalocal NetworkManager[860]: [1760067239.3904] device (tap2faeb113-60): carrier: link connected Oct 09 23:33:59 np0005479288.novalocal kernel: tap2faeb113-60: entered promiscuous mode Oct 09 23:33:59 np0005479288.novalocal sudo[92540]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-2faeb113-6a95-44d1-b2ce-894227d84879 env PROCESS_TAG=haproxy-2faeb113-6a95-44d1-b2ce-894227d84879 haproxy -f /var/lib/neutron/ovn-metadata-proxy/2faeb113-6a95-44d1-b2ce-894227d84879.conf Oct 09 23:33:59 np0005479288.novalocal systemd[1]: Started Session c150 of User root. Oct 09 23:33:59 np0005479288.novalocal sudo[92540]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:33:59 np0005479288.novalocal sudo[92540]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:34:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:34:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:34:17 np0005479288.novalocal sudo[92610]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-cbb372a7-b861-4e77-8760-37533f3062f2 cinder-volumes/cinder-volumes-pool Oct 09 23:34:17 np0005479288.novalocal systemd[1]: Started Session c151 of User root. Oct 09 23:34:17 np0005479288.novalocal sudo[92610]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:17 np0005479288.novalocal lvm[92621]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:34:17 np0005479288.novalocal lvm[92621]: VG cinder-volumes finished Oct 09 23:34:17 np0005479288.novalocal sudo[92610]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:17 np0005479288.novalocal systemd[1]: session-c151.scope: Deactivated successfully. Oct 09 23:34:18 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:55912 [09/Oct/2025:23:34:17.393] listener listener/metadata 0/0/0/1081/1081 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 09 23:34:18 np0005479288.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 09 23:34:18 np0005479288.novalocal sudo[92623]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpe_7zbh8p/privsep.sock Oct 09 23:34:18 np0005479288.novalocal systemd[1]: Started Session c152 of User root. Oct 09 23:34:18 np0005479288.novalocal sudo[92623]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 09 23:34:18 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:55920 [09/Oct/2025:23:34:18.537] listener listener/metadata 0/0/0/14/14 200 148 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Oct 09 23:34:18 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:55926 [09/Oct/2025:23:34:18.576] listener listener/metadata 0/0/0/14/14 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Oct 09 23:34:18 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:55938 [09/Oct/2025:23:34:18.653] listener listener/metadata 0/0/0/11/11 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 09 23:34:18 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:55950 [09/Oct/2025:23:34:18.710] listener listener/metadata 0/0/0/15/15 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Oct 09 23:34:18 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:55958 [09/Oct/2025:23:34:18.768] listener listener/metadata 0/0/0/13/13 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Oct 09 23:34:18 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:55960 [09/Oct/2025:23:34:18.815] listener listener/metadata 0/0/0/13/13 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Oct 09 23:34:18 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:55976 [09/Oct/2025:23:34:18.859] listener listener/metadata 0/0/0/13/13 200 132 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Oct 09 23:34:18 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:55988 [09/Oct/2025:23:34:18.905] listener listener/metadata 0/0/0/12/12 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Oct 09 23:34:18 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:56002 [09/Oct/2025:23:34:18.948] listener listener/metadata 0/0/0/15/15 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Oct 09 23:34:19 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:56006 [09/Oct/2025:23:34:18.994] listener listener/metadata 0/0/0/12/12 200 215 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Oct 09 23:34:19 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:56018 [09/Oct/2025:23:34:19.038] listener listener/metadata 0/0/0/11/11 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Oct 09 23:34:19 np0005479288.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 09 23:34:19 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:56032 [09/Oct/2025:23:34:19.077] listener listener/metadata 0/0/0/12/12 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Oct 09 23:34:19 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:56036 [09/Oct/2025:23:34:19.112] listener listener/metadata 0/0/0/13/13 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Oct 09 23:34:19 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:56048 [09/Oct/2025:23:34:19.164] listener listener/metadata 0/0/0/32/32 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Oct 09 23:34:19 np0005479288.novalocal sudo[92623]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:19 np0005479288.novalocal haproxy-metadata-proxy-2faeb113-6a95-44d1-b2ce-894227d84879[92545]: 10.100.0.12:56054 [09/Oct/2025:23:34:19.258] listener listener/metadata 0/0/0/24/24 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Oct 09 23:34:19 np0005479288.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service. Oct 09 23:34:19 np0005479288.novalocal sudo[92654]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-cbb372a7-b861-4e77-8760-37533f3062f2 Oct 09 23:34:19 np0005479288.novalocal systemd[1]: Started Session c153 of User root. Oct 09 23:34:19 np0005479288.novalocal sudo[92654]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:20 np0005479288.novalocal sudo[92654]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:20 np0005479288.novalocal systemd[1]: session-c153.scope: Deactivated successfully. Oct 09 23:34:20 np0005479288.novalocal sudo[92660]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-cbb372a7-b861-4e77-8760-37533f3062f2 iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 fuWBZAiswkDeUrGn44GF G5E8HXsds6F8hSTq False -p3260 -a::1 Oct 09 23:34:20 np0005479288.novalocal systemd[1]: Started Session c154 of User root. Oct 09 23:34:20 np0005479288.novalocal sudo[92660]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:20 np0005479288.novalocal sudo[92660]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:20 np0005479288.novalocal systemd[1]: session-c154.scope: Deactivated successfully. Oct 09 23:34:20 np0005479288.novalocal sudo[92668]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 09 23:34:20 np0005479288.novalocal systemd[1]: Started Session c155 of User root. Oct 09 23:34:20 np0005479288.novalocal sudo[92668]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:20 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 580c9d1a-c075-4354-8f77-defc34398a93 Oct 09 23:34:20 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:20 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l f62f0bad-04b6-40e4-af22-09ea88d5152a Oct 09 23:34:20 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:34:20 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 55a8e46c-10b8-44a1-a34a-7c6dbc68dc64 Oct 09 23:34:20 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:34:20 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 04b3f43d-513d-48c4-bcc6-1c057695263b Oct 09 23:34:20 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:34:20 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l c914a636-e48b-4394-96fc-0657322acf32 Oct 09 23:34:20 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:20 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 34b3005d-ec43-4582-9098-a3ff4b24db83 Oct 09 23:34:20 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:20 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l c914a636-e48b-4394-96fc-0657322acf32 Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 34b3005d-ec43-4582-9098-a3ff4b24db83 Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 580c9d1a-c075-4354-8f77-defc34398a93 Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 738e66f8-c112-4f94-9e7d-d971ef2c26b6 Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l b3376cbd-1c92-4c14-9466-9e428f379ca6 Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: failed to retrieve rpm info for path '/dev/vda1': Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 6be27083-15ad-4f1f-b48e-efa906b0859c Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 14d38920-cb48-40c2-935c-a26041501c6f Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2bd29111-e416-4465-b7fe-a7c46628db7c Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 7b0ef69d-4b6e-4d0b-ab56-bd2bf09123ac Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 5bfc2b7f-7160-40a7-87eb-9e5fed9fa33e Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l a42d949c-988f-41ef-9952-1f17d0d6812b Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 4a93d412-dfad-4ee2-9ddc-78ab7241b9d0 Oct 09 23:34:21 np0005479288.novalocal sudo[92668]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:21 np0005479288.novalocal systemd[1]: session-c155.scope: Deactivated successfully. Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 344e0f1d-8b38-42b8-99b9-6dc419c5550c Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-LqqmC1. For complete SELinux messages run: sealert -l e1806d25-65e9-46ca-82c6-442966259a72 Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-LqqmC1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-LqqmC1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:21 np0005479288.novalocal sudo[92680]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l a1ae6920-fc93-4425-abf4-2f7cb64d91db Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 6f986960-f0ce-4c6f-a9d7-0ebae6f78629 Oct 09 23:34:21 np0005479288.novalocal systemd[1]: Started Session c156 of User root. Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:21 np0005479288.novalocal sudo[92680]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 0d2c88e9-9957-4266-8aa9-be5d94626169 Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 2ce9074c-4519-4bfd-b674-0f768909eee4 Oct 09 23:34:21 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:21 np0005479288.novalocal sudo[92680]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:21 np0005479288.novalocal systemd[1]: session-c156.scope: Deactivated successfully. Oct 09 23:34:21 np0005479288.novalocal sudo[92685]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 fuWBZAiswkDeUrGn44GF G5E8HXsds6F8hSTq iqn.1994-05.com.redhat:701b36c35245 Oct 09 23:34:21 np0005479288.novalocal systemd[1]: Started Session c157 of User root. Oct 09 23:34:21 np0005479288.novalocal sudo[92685]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:22 np0005479288.novalocal sudo[92685]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:22 np0005479288.novalocal systemd[1]: session-c157.scope: Deactivated successfully. Oct 09 23:34:22 np0005479288.novalocal sudo[92690]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:34:22 np0005479288.novalocal systemd[1]: Started Session c158 of User root. Oct 09 23:34:22 np0005479288.novalocal sudo[92690]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:22 np0005479288.novalocal sudo[92690]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:22 np0005479288.novalocal systemd[1]: session-c158.scope: Deactivated successfully. Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f9f0cf74-f509-4811-9d5f-45b3b5157bf8 Oct 09 23:34:23 np0005479288.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 09 23:34:23 np0005479288.novalocal iscsid[69457]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2, portal: ::1,3260] through [iface: default] is operational now Oct 09 23:34:23 np0005479288.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 09 23:34:23 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 09 23:34:23 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405bf87d2a720fa44d3b55b4968d port group 0 rel port 1 Oct 09 23:34:23 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 09 23:34:23 np0005479288.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Oct 09 23:34:23 np0005479288.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 09 23:34:23 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 09 23:34:23 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 09 23:34:23 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 09 23:34:23 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:34:23 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 09 23:34:23 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 09 23:34:23 np0005479288.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Oct 09 23:34:23 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:34:23 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 4e9cdfe8-f206-48b7-9b64-81ab8e33c667 Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l d9af9e66-a433-40b9-8ea7-ceb3338aca1c Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l a66fde19-028d-4ffd-bc65-c8b5e31395e6 Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l aa2d6ca9-53fa-4721-ae6b-ee33c5acaf71 Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1950d9f1-f441-45a5-b0c6-58ca56967aa5 Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 7fbd5eeb-fab2-4eab-8312-454640da3553 Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l cc30f29d-0b94-4478-bf50-bdc210816d74 Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 04b55ce8-a9c7-472e-9d6b-2ec03079dd5d Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 49bed2ff-ba36-4d3f-aa8a-ca26adf29fcc Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8dc3e0bc-3b81-48fe-9955-90bd33af2ef0 Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l ecf165f0-3d66-4d97-902f-d5ab0bbd0767 Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 848112b1-63ea-4efe-964d-2da8b7684e3f Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2/::1,3260. For complete SELinux messages run: sealert -l 445643fc-d54e-4da9-873e-26b5af26c32c Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2/::1,3260. For complete SELinux messages run: sealert -l faeb1fdf-dbd9-45d1-a03d-4c8baba9fc86 Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l c9740a8c-9bdb-43ef-ae28-d51efe7b67b2 Oct 09 23:34:23 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:24 np0005479288.novalocal sudo[92742]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Oct 09 23:34:24 np0005479288.novalocal systemd[1]: Started Session c159 of User root. Oct 09 23:34:24 np0005479288.novalocal sudo[92742]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l d68c3fab-3e5b-47ec-8b86-4d0fa9473216 Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l f00662c7-efc7-4064-9f8d-398cfbce27d5 Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 5ffa4d18-5cc5-467f-8925-b752c3f05b25 Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: failed to retrieve rpm info for path '/dev/sda': Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 6be27083-15ad-4f1f-b48e-efa906b0859c Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 580c9d1a-c075-4354-8f77-defc34398a93 Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l f62f0bad-04b6-40e4-af22-09ea88d5152a Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 55a8e46c-10b8-44a1-a34a-7c6dbc68dc64 Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 04b3f43d-513d-48c4-bcc6-1c057695263b Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l c914a636-e48b-4394-96fc-0657322acf32 Oct 09 23:34:24 np0005479288.novalocal sudo[92742]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:24 np0005479288.novalocal systemd[1]: session-c159.scope: Deactivated successfully. Oct 09 23:34:24 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:34:24 np0005479288.novalocal sudo[92750]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Oct 09 23:34:24 np0005479288.novalocal systemd[1]: Started Session c160 of User root. Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:24 np0005479288.novalocal sudo[92750]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 34b3005d-ec43-4582-9098-a3ff4b24db83 Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l cd2b0daa-b290-40ab-adaa-f24a46b97467 Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 6772abca-872d-4358-88e4-a562b1e39dd1 Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:34:24 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2bd29111-e416-4465-b7fe-a7c46628db7c Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 7b0ef69d-4b6e-4d0b-ab56-bd2bf09123ac Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l f62f0bad-04b6-40e4-af22-09ea88d5152a Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 55a8e46c-10b8-44a1-a34a-7c6dbc68dc64 Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 04b3f43d-513d-48c4-bcc6-1c057695263b Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:34:25 np0005479288.novalocal sudo[92750]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:25 np0005479288.novalocal systemd[1]: session-c160.scope: Deactivated successfully. Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l c914a636-e48b-4394-96fc-0657322acf32 Oct 09 23:34:25 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 09 23:34:25 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:25 np0005479288.novalocal iscsid[69457]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2, portal: ::1,3260] through [iface: default] is shutdown. Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 34b3005d-ec43-4582-9098-a3ff4b24db83 Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 7fbd5eeb-fab2-4eab-8312-454640da3553 Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2/::1,3260. For complete SELinux messages run: sealert -l faeb1fdf-dbd9-45d1-a03d-4c8baba9fc86 Oct 09 23:34:25 np0005479288.novalocal sudo[92801]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 iqn.1994-05.com.redhat:701b36c35245 Oct 09 23:34:25 np0005479288.novalocal systemd[1]: Started Session c161 of User root. Oct 09 23:34:25 np0005479288.novalocal sudo[92801]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 4e9cdfe8-f206-48b7-9b64-81ab8e33c667 Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l d9af9e66-a433-40b9-8ea7-ceb3338aca1c Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l a66fde19-028d-4ffd-bc65-c8b5e31395e6 Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l aa2d6ca9-53fa-4721-ae6b-ee33c5acaf71 Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1950d9f1-f441-45a5-b0c6-58ca56967aa5 Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l c9740a8c-9bdb-43ef-ae28-d51efe7b67b2 Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2/::1,3260. For complete SELinux messages run: sealert -l 17bc03da-71cc-45ca-9c14-6dbf622e7894 Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l cc30f29d-0b94-4478-bf50-bdc210816d74 Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 04b55ce8-a9c7-472e-9d6b-2ec03079dd5d Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l f59fc602-81e4-4d6b-99d4-ddb5a0371877 Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l d2ccef81-30fc-464b-8ab7-9b2c905a9a9d Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 180f8f9f-db14-423e-b3f8-a3814ebf4ed6 Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 14d38920-cb48-40c2-935c-a26041501c6f Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 5ffa4d18-5cc5-467f-8925-b752c3f05b25 Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 6d808843-713e-4c15-879c-0b4845187666 Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2. For complete SELinux messages run: sealert -l 49bed2ff-ba36-4d3f-aa8a-ca26adf29fcc Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l e9009c94-113c-4cf8-87aa-5d343dbed19c Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 87ef9ea2-fbff-4282-88c1-68fbccb0902d Oct 09 23:34:25 np0005479288.novalocal sudo[92801]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:25 np0005479288.novalocal systemd[1]: session-c161.scope: Deactivated successfully. Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2. For complete SELinux messages run: sealert -l 6ad29123-5352-4ad5-8cd7-49a75a1556b1 Oct 09 23:34:25 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:25 np0005479288.novalocal sudo[92814]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:34:25 np0005479288.novalocal systemd[1]: Started Session c162 of User root. Oct 09 23:34:25 np0005479288.novalocal sudo[92814]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:26 np0005479288.novalocal sudo[92814]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:26 np0005479288.novalocal systemd[1]: session-c162.scope: Deactivated successfully. Oct 09 23:34:26 np0005479288.novalocal sudo[92819]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 09 23:34:26 np0005479288.novalocal systemd[1]: Started Session c163 of User root. Oct 09 23:34:26 np0005479288.novalocal sudo[92819]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:27 np0005479288.novalocal sudo[92819]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:27 np0005479288.novalocal systemd[1]: session-c163.scope: Deactivated successfully. Oct 09 23:34:27 np0005479288.novalocal sudo[92825]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 Oct 09 23:34:27 np0005479288.novalocal systemd[1]: Started Session c164 of User root. Oct 09 23:34:27 np0005479288.novalocal sudo[92825]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:27 np0005479288.novalocal sudo[92825]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:27 np0005479288.novalocal systemd[1]: session-c164.scope: Deactivated successfully. Oct 09 23:34:27 np0005479288.novalocal sudo[92830]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:34:27 np0005479288.novalocal systemd[1]: Started Session c165 of User root. Oct 09 23:34:27 np0005479288.novalocal sudo[92830]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:28 np0005479288.novalocal sudo[92830]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:28 np0005479288.novalocal systemd[1]: session-c165.scope: Deactivated successfully. Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 738e66f8-c112-4f94-9e7d-d971ef2c26b6 Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:29 np0005479288.novalocal sudo[92849]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-cbb372a7-b861-4e77-8760-37533f3062f2 Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l b3376cbd-1c92-4c14-9466-9e428f379ca6 Oct 09 23:34:29 np0005479288.novalocal systemd[1]: Started Session c166 of User root. Oct 09 23:34:29 np0005479288.novalocal sudo[92849]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 6be27083-15ad-4f1f-b48e-efa906b0859c Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 14d38920-cb48-40c2-935c-a26041501c6f Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2bd29111-e416-4465-b7fe-a7c46628db7c Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 7b0ef69d-4b6e-4d0b-ab56-bd2bf09123ac Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 5bfc2b7f-7160-40a7-87eb-9e5fed9fa33e Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l a42d949c-988f-41ef-9952-1f17d0d6812b Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 4a93d412-dfad-4ee2-9ddc-78ab7241b9d0 Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 344e0f1d-8b38-42b8-99b9-6dc419c5550c Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-vTJALz. For complete SELinux messages run: sealert -l e1806d25-65e9-46ca-82c6-442966259a72 Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-vTJALz. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-vTJALz file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l a1ae6920-fc93-4425-abf4-2f7cb64d91db Oct 09 23:34:29 np0005479288.novalocal kernel: tapb2449b62-b1 (unregistering): left promiscuous mode Oct 09 23:34:29 np0005479288.novalocal NetworkManager[860]: [1760067269.5590] device (tapb2449b62-b1): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 6f986960-f0ce-4c6f-a9d7-0ebae6f78629 Oct 09 23:34:29 np0005479288.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000004.scope: Deactivated successfully. Oct 09 23:34:29 np0005479288.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000004.scope: Consumed 20.038s CPU time. Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:29 np0005479288.novalocal systemd-machined[85828]: Machine qemu-6-instance-00000004 terminated. Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 0d2c88e9-9957-4266-8aa9-be5d94626169 Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:29 np0005479288.novalocal kernel: tap2faeb113-60: left promiscuous mode Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 2ce9074c-4519-4bfd-b674-0f768909eee4 Oct 09 23:34:29 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:29 np0005479288.novalocal systemd[1]: session-c150.scope: Deactivated successfully. Oct 09 23:34:29 np0005479288.novalocal systemd[1]: run-netns-ovnmeta\x2d2faeb113\x2d6a95\x2d44d1\x2db2ce\x2d894227d84879.mount: Deactivated successfully. Oct 09 23:34:29 np0005479288.novalocal sudo[92849]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:29 np0005479288.novalocal systemd[1]: session-c166.scope: Deactivated successfully. Oct 09 23:34:29 np0005479288.novalocal sudo[92876]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-cbb372a7-b861-4e77-8760-37533f3062f2 iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 fuWBZAiswkDeUrGn44GF G5E8HXsds6F8hSTq False -p3260 -a::1 Oct 09 23:34:29 np0005479288.novalocal systemd[1]: Started Session c167 of User root. Oct 09 23:34:29 np0005479288.novalocal sudo[92876]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:30 np0005479288.novalocal sudo[92876]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:30 np0005479288.novalocal systemd[1]: session-c167.scope: Deactivated successfully. Oct 09 23:34:30 np0005479288.novalocal sudo[92891]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 09 23:34:30 np0005479288.novalocal systemd[1]: Started Session c168 of User root. Oct 09 23:34:30 np0005479288.novalocal sudo[92891]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:30 np0005479288.novalocal sudo[92891]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:30 np0005479288.novalocal systemd[1]: session-c168.scope: Deactivated successfully. Oct 09 23:34:30 np0005479288.novalocal sudo[92898]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:34:30 np0005479288.novalocal systemd[1]: Started Session c169 of User root. Oct 09 23:34:30 np0005479288.novalocal sudo[92898]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:31 np0005479288.novalocal sudo[92898]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:31 np0005479288.novalocal systemd[1]: session-c169.scope: Deactivated successfully. Oct 09 23:34:31 np0005479288.novalocal sudo[92905]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 fuWBZAiswkDeUrGn44GF G5E8HXsds6F8hSTq iqn.1994-05.com.redhat:701b36c35245 Oct 09 23:34:31 np0005479288.novalocal systemd[1]: Started Session c170 of User root. Oct 09 23:34:31 np0005479288.novalocal sudo[92905]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:31 np0005479288.novalocal sudo[92905]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:31 np0005479288.novalocal systemd[1]: session-c170.scope: Deactivated successfully. Oct 09 23:34:31 np0005479288.novalocal sudo[92910]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:34:32 np0005479288.novalocal systemd[1]: Started Session c171 of User root. Oct 09 23:34:32 np0005479288.novalocal sudo[92910]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:32 np0005479288.novalocal sudo[92910]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:32 np0005479288.novalocal systemd[1]: session-c171.scope: Deactivated successfully. Oct 09 23:34:32 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f9f0cf74-f509-4811-9d5f-45b3b5157bf8 Oct 09 23:34:32 np0005479288.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 09 23:34:32 np0005479288.novalocal iscsid[69457]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2, portal: ::1,3260] through [iface: default] is operational now Oct 09 23:34:32 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 09 23:34:33 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 09 23:34:33 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014053a7fe6e35bd142659979cf3b1 port group 0 rel port 1 Oct 09 23:34:33 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 09 23:34:33 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 09 23:34:33 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 09 23:34:33 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 09 23:34:33 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:34:33 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 09 23:34:33 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 09 23:34:33 np0005479288.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Oct 09 23:34:33 np0005479288.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 4e9cdfe8-f206-48b7-9b64-81ab8e33c667 Oct 09 23:34:33 np0005479288.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Oct 09 23:34:33 np0005479288.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 09 23:34:33 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l d9af9e66-a433-40b9-8ea7-ceb3338aca1c Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l a66fde19-028d-4ffd-bc65-c8b5e31395e6 Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l aa2d6ca9-53fa-4721-ae6b-ee33c5acaf71 Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1950d9f1-f441-45a5-b0c6-58ca56967aa5 Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 7fbd5eeb-fab2-4eab-8312-454640da3553 Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l cc30f29d-0b94-4478-bf50-bdc210816d74 Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 04b55ce8-a9c7-472e-9d6b-2ec03079dd5d Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 4e9cdfe8-f206-48b7-9b64-81ab8e33c667 Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l d9af9e66-a433-40b9-8ea7-ceb3338aca1c Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 1950d9f1-f441-45a5-b0c6-58ca56967aa5 Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 49bed2ff-ba36-4d3f-aa8a-ca26adf29fcc Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8dc3e0bc-3b81-48fe-9955-90bd33af2ef0 Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l ecf165f0-3d66-4d97-902f-d5ab0bbd0767 Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 848112b1-63ea-4efe-964d-2da8b7684e3f Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2/::1,3260. For complete SELinux messages run: sealert -l 445643fc-d54e-4da9-873e-26b5af26c32c Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2/::1,3260. For complete SELinux messages run: sealert -l faeb1fdf-dbd9-45d1-a03d-4c8baba9fc86 Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 04b55ce8-a9c7-472e-9d6b-2ec03079dd5d Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l c9740a8c-9bdb-43ef-ae28-d51efe7b67b2 Oct 09 23:34:33 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:34 np0005479288.novalocal sudo[92964]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Oct 09 23:34:34 np0005479288.novalocal systemd[1]: Started Session c172 of User root. Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l d68c3fab-3e5b-47ec-8b86-4d0fa9473216 Oct 09 23:34:34 np0005479288.novalocal sudo[92964]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l f00662c7-efc7-4064-9f8d-398cfbce27d5 Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 5ffa4d18-5cc5-467f-8925-b752c3f05b25 Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 6be27083-15ad-4f1f-b48e-efa906b0859c Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 580c9d1a-c075-4354-8f77-defc34398a93 Oct 09 23:34:34 np0005479288.novalocal sudo[92964]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:34 np0005479288.novalocal systemd[1]: session-c172.scope: Deactivated successfully. Oct 09 23:34:34 np0005479288.novalocal sudo[92969]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Oct 09 23:34:34 np0005479288.novalocal systemd[1]: Started Session c173 of User root. Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:34 np0005479288.novalocal sudo[92969]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l f62f0bad-04b6-40e4-af22-09ea88d5152a Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 55a8e46c-10b8-44a1-a34a-7c6dbc68dc64 Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 04b3f43d-513d-48c4-bcc6-1c057695263b Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l c914a636-e48b-4394-96fc-0657322acf32 Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 34b3005d-ec43-4582-9098-a3ff4b24db83 Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l c914a636-e48b-4394-96fc-0657322acf32 Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 34b3005d-ec43-4582-9098-a3ff4b24db83 Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 580c9d1a-c075-4354-8f77-defc34398a93 Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l cd2b0daa-b290-40ab-adaa-f24a46b97467 Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 14d38920-cb48-40c2-935c-a26041501c6f Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2bd29111-e416-4465-b7fe-a7c46628db7c Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 7b0ef69d-4b6e-4d0b-ab56-bd2bf09123ac Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 09 23:34:34 np0005479288.novalocal sudo[92969]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:34 np0005479288.novalocal systemd[1]: session-c173.scope: Deactivated successfully. Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 7fbd5eeb-fab2-4eab-8312-454640da3553 Oct 09 23:34:34 np0005479288.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 09 23:34:34 np0005479288.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l a66fde19-028d-4ffd-bc65-c8b5e31395e6 Oct 09 23:34:34 np0005479288.novalocal iscsid[69457]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2, portal: ::1,3260] through [iface: default] is shutdown. Oct 09 23:34:34 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l aa2d6ca9-53fa-4721-ae6b-ee33c5acaf71 Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l cc30f29d-0b94-4478-bf50-bdc210816d74 Oct 09 23:34:35 np0005479288.novalocal sudo[93009]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 iqn.1994-05.com.redhat:701b36c35245 Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l f59fc602-81e4-4d6b-99d4-ddb5a0371877 Oct 09 23:34:35 np0005479288.novalocal systemd[1]: Started Session c174 of User root. Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l d2ccef81-30fc-464b-8ab7-9b2c905a9a9d Oct 09 23:34:35 np0005479288.novalocal sudo[93009]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 180f8f9f-db14-423e-b3f8-a3814ebf4ed6 Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f9f0cf74-f509-4811-9d5f-45b3b5157bf8 Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2. For complete SELinux messages run: sealert -l 49bed2ff-ba36-4d3f-aa8a-ca26adf29fcc Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l e9009c94-113c-4cf8-87aa-5d343dbed19c Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 87ef9ea2-fbff-4282-88c1-68fbccb0902d Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2. For complete SELinux messages run: sealert -l 6ad29123-5352-4ad5-8cd7-49a75a1556b1 Oct 09 23:34:35 np0005479288.novalocal setroubleshoot[92624]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 09 23:34:35 np0005479288.novalocal sudo[93009]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:35 np0005479288.novalocal systemd[1]: session-c174.scope: Deactivated successfully. Oct 09 23:34:35 np0005479288.novalocal sudo[93016]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:34:35 np0005479288.novalocal systemd[1]: Started Session c175 of User root. Oct 09 23:34:35 np0005479288.novalocal sudo[93016]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:36 np0005479288.novalocal sudo[93016]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:36 np0005479288.novalocal systemd[1]: session-c175.scope: Deactivated successfully. Oct 09 23:34:36 np0005479288.novalocal sudo[93021]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 09 23:34:36 np0005479288.novalocal systemd[1]: Started Session c176 of User root. Oct 09 23:34:36 np0005479288.novalocal sudo[93021]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:36 np0005479288.novalocal sudo[93021]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:36 np0005479288.novalocal systemd[1]: session-c176.scope: Deactivated successfully. Oct 09 23:34:36 np0005479288.novalocal sudo[93026]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-cbb372a7-b861-4e77-8760-37533f3062f2 Oct 09 23:34:36 np0005479288.novalocal systemd[1]: Started Session c177 of User root. Oct 09 23:34:36 np0005479288.novalocal sudo[93026]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:37 np0005479288.novalocal sudo[93026]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:37 np0005479288.novalocal systemd[1]: session-c177.scope: Deactivated successfully. Oct 09 23:34:37 np0005479288.novalocal sudo[93031]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 09 23:34:37 np0005479288.novalocal systemd[1]: Started Session c178 of User root. Oct 09 23:34:37 np0005479288.novalocal sudo[93031]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:37 np0005479288.novalocal sudo[93031]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:37 np0005479288.novalocal systemd[1]: session-c178.scope: Deactivated successfully. Oct 09 23:34:40 np0005479288.novalocal sudo[93039]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 09 23:34:40 np0005479288.novalocal systemd[1]: Started Session c179 of User root. Oct 09 23:34:40 np0005479288.novalocal sudo[93039]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:41 np0005479288.novalocal sudo[93039]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:41 np0005479288.novalocal systemd[1]: session-c179.scope: Deactivated successfully. Oct 09 23:34:41 np0005479288.novalocal sudo[93045]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-cbb372a7-b861-4e77-8760-37533f3062f2 Oct 09 23:34:41 np0005479288.novalocal systemd[1]: Started Session c180 of User root. Oct 09 23:34:41 np0005479288.novalocal sudo[93045]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:41 np0005479288.novalocal sudo[93045]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:41 np0005479288.novalocal systemd[1]: session-c180.scope: Deactivated successfully. Oct 09 23:34:41 np0005479288.novalocal sudo[93049]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-cbb372a7-b861-4e77-8760-37533f3062f2 Oct 09 23:34:41 np0005479288.novalocal systemd[1]: Started Session c181 of User root. Oct 09 23:34:41 np0005479288.novalocal sudo[93049]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:42 np0005479288.novalocal sudo[93049]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:42 np0005479288.novalocal systemd[1]: session-c181.scope: Deactivated successfully. Oct 09 23:34:42 np0005479288.novalocal sudo[93053]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-cbb372a7-b861-4e77-8760-37533f3062f2 Oct 09 23:34:42 np0005479288.novalocal systemd[1]: Started Session c182 of User root. Oct 09 23:34:42 np0005479288.novalocal sudo[93053]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:42 np0005479288.novalocal lvm[93060]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:34:42 np0005479288.novalocal lvm[93060]: VG cinder-volumes finished Oct 09 23:34:42 np0005479288.novalocal sudo[93053]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:42 np0005479288.novalocal systemd[1]: session-c182.scope: Deactivated successfully. Oct 09 23:34:42 np0005479288.novalocal sudo[93061]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:34:42 np0005479288.novalocal systemd[1]: Started Session c183 of User root. Oct 09 23:34:42 np0005479288.novalocal sudo[93061]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:43 np0005479288.novalocal sudo[93061]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:43 np0005479288.novalocal systemd[1]: session-c183.scope: Deactivated successfully. Oct 09 23:34:43 np0005479288.novalocal sudo[93065]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:34:43 np0005479288.novalocal systemd[1]: Started Session c184 of User root. Oct 09 23:34:43 np0005479288.novalocal sudo[93065]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:43 np0005479288.novalocal sudo[93065]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:43 np0005479288.novalocal systemd[1]: session-c184.scope: Deactivated successfully. Oct 09 23:34:43 np0005479288.novalocal sudo[93069]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:34:43 np0005479288.novalocal systemd[1]: Started Session c185 of User root. Oct 09 23:34:43 np0005479288.novalocal sudo[93069]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:44 np0005479288.novalocal sudo[93069]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:44 np0005479288.novalocal systemd[1]: session-c185.scope: Deactivated successfully. Oct 09 23:34:44 np0005479288.novalocal sudo[93073]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:34:44 np0005479288.novalocal systemd[1]: Started Session c186 of User root. Oct 09 23:34:44 np0005479288.novalocal sudo[93073]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:44 np0005479288.novalocal sudo[93073]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:44 np0005479288.novalocal systemd[1]: session-c186.scope: Deactivated successfully. Oct 09 23:34:44 np0005479288.novalocal sshd-session[93077]: Connection closed by 158.160.80.249 port 33154 Oct 09 23:34:45 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Deactivated successfully. Oct 09 23:34:45 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Consumed 1.244s CPU time. Oct 09 23:34:45 np0005479288.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 09 23:34:45 np0005479288.novalocal systemd[1]: setroubleshootd.service: Consumed 6.130s CPU time. Oct 09 23:34:48 np0005479288.novalocal sudo[93079]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:34:48 np0005479288.novalocal systemd[1]: Started Session c187 of User root. Oct 09 23:34:48 np0005479288.novalocal sudo[93079]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:48 np0005479288.novalocal sudo[93079]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:48 np0005479288.novalocal systemd[1]: session-c187.scope: Deactivated successfully. Oct 09 23:34:48 np0005479288.novalocal sudo[93083]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:34:48 np0005479288.novalocal systemd[1]: Started Session c188 of User root. Oct 09 23:34:49 np0005479288.novalocal sudo[93083]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:49 np0005479288.novalocal sudo[93083]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:49 np0005479288.novalocal systemd[1]: session-c188.scope: Deactivated successfully. Oct 09 23:34:49 np0005479288.novalocal sudo[93087]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:34:49 np0005479288.novalocal systemd[1]: Started Session c189 of User root. Oct 09 23:34:49 np0005479288.novalocal sudo[93087]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:49 np0005479288.novalocal sudo[93087]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:49 np0005479288.novalocal systemd[1]: session-c189.scope: Deactivated successfully. Oct 09 23:34:49 np0005479288.novalocal sudo[93091]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:34:49 np0005479288.novalocal systemd[1]: Started Session c190 of User root. Oct 09 23:34:49 np0005479288.novalocal sudo[93091]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:34:50 np0005479288.novalocal sudo[93091]: pam_unix(sudo:session): session closed for user root Oct 09 23:34:50 np0005479288.novalocal systemd[1]: session-c190.scope: Deactivated successfully. Oct 09 23:34:57 np0005479288.novalocal kernel: tap47f86376-53: entered promiscuous mode Oct 09 23:34:57 np0005479288.novalocal NetworkManager[860]: [1760067297.9267] manager: (tap47f86376-53): new Tun device (/org/freedesktop/NetworkManager/Devices/22) Oct 09 23:34:57 np0005479288.novalocal virtqemud[88538]: Domain id=7 name='instance-00000006' uuid=e2b7f8e3-5d48-4be3-baa9-acff030983c6 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 09 23:34:57 np0005479288.novalocal virtqemud[88538]: Domain id=7 name='instance-00000006' uuid=e2b7f8e3-5d48-4be3-baa9-acff030983c6 is tainted: deprecated-config (CPU model 'qemu64') Oct 09 23:34:57 np0005479288.novalocal systemd-machined[85828]: New machine qemu-7-instance-00000006. Oct 09 23:34:57 np0005479288.novalocal systemd[1]: Started Virtual Machine qemu-7-instance-00000006. Oct 09 23:34:57 np0005479288.novalocal systemd-udevd[93132]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:34:58 np0005479288.novalocal NetworkManager[860]: [1760067298.0072] device (tap47f86376-53): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 09 23:34:58 np0005479288.novalocal NetworkManager[860]: [1760067298.0078] device (tap47f86376-53): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 09 23:34:58 np0005479288.novalocal NetworkManager[860]: [1760067298.0743] manager: (tapd00be105-d0): new Veth device (/org/freedesktop/NetworkManager/Devices/23) Oct 09 23:34:58 np0005479288.novalocal systemd-udevd[93135]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:34:58 np0005479288.novalocal NetworkManager[860]: [1760067298.1519] device (tapd00be105-d0): carrier: link connected Oct 09 23:34:58 np0005479288.novalocal kernel: tapd00be105-d0: entered promiscuous mode Oct 09 23:34:58 np0005479288.novalocal sudo[93176]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-d00be105-d9dd-4ba3-a70b-2d6abbea2b85 env PROCESS_TAG=haproxy-d00be105-d9dd-4ba3-a70b-2d6abbea2b85 haproxy -f /var/lib/neutron/ovn-metadata-proxy/d00be105-d9dd-4ba3-a70b-2d6abbea2b85.conf Oct 09 23:34:58 np0005479288.novalocal systemd[1]: Started Session c191 of User root. Oct 09 23:34:58 np0005479288.novalocal sudo[93176]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:34:58 np0005479288.novalocal sudo[93176]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:35:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:35:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:35:10 np0005479288.novalocal kernel: tap47f86376-53 (unregistering): left promiscuous mode Oct 09 23:35:10 np0005479288.novalocal NetworkManager[860]: [1760067310.0875] device (tap47f86376-53): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 09 23:35:10 np0005479288.novalocal systemd[1]: session-c191.scope: Deactivated successfully. Oct 09 23:35:10 np0005479288.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Deactivated successfully. Oct 09 23:35:10 np0005479288.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Consumed 12.044s CPU time. Oct 09 23:35:10 np0005479288.novalocal systemd-machined[85828]: Machine qemu-7-instance-00000006 terminated. Oct 09 23:35:10 np0005479288.novalocal kernel: tapd00be105-d0: left promiscuous mode Oct 09 23:35:10 np0005479288.novalocal systemd[1]: run-netns-ovnmeta\x2dd00be105\x2dd9dd\x2d4ba3\x2da70b\x2d2d6abbea2b85.mount: Deactivated successfully. Oct 09 23:35:48 np0005479288.novalocal sudo[93298]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:35:48 np0005479288.novalocal systemd[1]: Started Session c192 of User root. Oct 09 23:35:48 np0005479288.novalocal sudo[93298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:49 np0005479288.novalocal sudo[93298]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:49 np0005479288.novalocal systemd[1]: session-c192.scope: Deactivated successfully. Oct 09 23:35:49 np0005479288.novalocal sudo[93302]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:35:49 np0005479288.novalocal systemd[1]: Started Session c193 of User root. Oct 09 23:35:49 np0005479288.novalocal sudo[93302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:49 np0005479288.novalocal sudo[93302]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:49 np0005479288.novalocal systemd[1]: session-c193.scope: Deactivated successfully. Oct 09 23:35:49 np0005479288.novalocal sudo[93306]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:35:49 np0005479288.novalocal systemd[1]: Started Session c194 of User root. Oct 09 23:35:49 np0005479288.novalocal sudo[93306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:49 np0005479288.novalocal sudo[93306]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:49 np0005479288.novalocal systemd[1]: session-c194.scope: Deactivated successfully. Oct 09 23:35:49 np0005479288.novalocal sudo[93310]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:35:49 np0005479288.novalocal systemd[1]: Started Session c195 of User root. Oct 09 23:35:49 np0005479288.novalocal sudo[93310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:50 np0005479288.novalocal sudo[93310]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:50 np0005479288.novalocal systemd[1]: session-c195.scope: Deactivated successfully. Oct 09 23:35:50 np0005479288.novalocal sudo[93314]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-6c70d635-0840-4765-a7ea-7d0cc3e048a5 cinder-volumes/cinder-volumes-pool Oct 09 23:35:50 np0005479288.novalocal systemd[1]: Started Session c196 of User root. Oct 09 23:35:50 np0005479288.novalocal sudo[93314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:50 np0005479288.novalocal lvm[93327]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:35:50 np0005479288.novalocal lvm[93327]: VG cinder-volumes finished Oct 09 23:35:50 np0005479288.novalocal sudo[93314]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:50 np0005479288.novalocal systemd[1]: session-c196.scope: Deactivated successfully. Oct 09 23:35:51 np0005479288.novalocal sudo[93329]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-9c764f0b-52d6-4f4a-b27f-b910b8afa2d7 cinder-volumes/cinder-volumes-pool Oct 09 23:35:51 np0005479288.novalocal systemd[1]: Started Session c197 of User root. Oct 09 23:35:51 np0005479288.novalocal sudo[93329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:52 np0005479288.novalocal lvm[93338]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:35:52 np0005479288.novalocal lvm[93338]: VG cinder-volumes finished Oct 09 23:35:52 np0005479288.novalocal sudo[93329]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:52 np0005479288.novalocal systemd[1]: session-c197.scope: Deactivated successfully. Oct 09 23:35:53 np0005479288.novalocal sudo[93339]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-499760f3-721d-4df2-aa08-d23f343d84b5 cinder-volumes/cinder-volumes-pool Oct 09 23:35:53 np0005479288.novalocal systemd[1]: Started Session c198 of User root. Oct 09 23:35:53 np0005479288.novalocal sudo[93339]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:53 np0005479288.novalocal lvm[93348]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:35:53 np0005479288.novalocal lvm[93348]: VG cinder-volumes finished Oct 09 23:35:53 np0005479288.novalocal sudo[93339]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:53 np0005479288.novalocal systemd[1]: session-c198.scope: Deactivated successfully. Oct 09 23:35:54 np0005479288.novalocal sudo[93349]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-499760f3-721d-4df2-aa08-d23f343d84b5 Oct 09 23:35:54 np0005479288.novalocal systemd[1]: Started Session c199 of User root. Oct 09 23:35:54 np0005479288.novalocal sudo[93349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:54 np0005479288.novalocal sudo[93349]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:54 np0005479288.novalocal systemd[1]: session-c199.scope: Deactivated successfully. Oct 09 23:35:54 np0005479288.novalocal sudo[93353]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-499760f3-721d-4df2-aa08-d23f343d84b5 Oct 09 23:35:54 np0005479288.novalocal systemd[1]: Started Session c200 of User root. Oct 09 23:35:54 np0005479288.novalocal sudo[93353]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:55 np0005479288.novalocal sudo[93353]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:55 np0005479288.novalocal systemd[1]: session-c200.scope: Deactivated successfully. Oct 09 23:35:55 np0005479288.novalocal sudo[93357]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-499760f3-721d-4df2-aa08-d23f343d84b5 Oct 09 23:35:55 np0005479288.novalocal systemd[1]: Started Session c201 of User root. Oct 09 23:35:55 np0005479288.novalocal sudo[93357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:55 np0005479288.novalocal lvm[93364]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:35:55 np0005479288.novalocal lvm[93364]: VG cinder-volumes finished Oct 09 23:35:55 np0005479288.novalocal sudo[93357]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:55 np0005479288.novalocal systemd[1]: session-c201.scope: Deactivated successfully. Oct 09 23:35:55 np0005479288.novalocal sudo[93365]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:35:55 np0005479288.novalocal systemd[1]: Started Session c202 of User root. Oct 09 23:35:55 np0005479288.novalocal sudo[93365]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:56 np0005479288.novalocal sudo[93365]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:56 np0005479288.novalocal systemd[1]: session-c202.scope: Deactivated successfully. Oct 09 23:35:56 np0005479288.novalocal sudo[93369]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:35:56 np0005479288.novalocal systemd[1]: Started Session c203 of User root. Oct 09 23:35:56 np0005479288.novalocal sudo[93369]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:56 np0005479288.novalocal sudo[93373]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-9c764f0b-52d6-4f4a-b27f-b910b8afa2d7 Oct 09 23:35:56 np0005479288.novalocal sudo[93369]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:56 np0005479288.novalocal systemd[1]: session-c203.scope: Deactivated successfully. Oct 09 23:35:56 np0005479288.novalocal systemd[1]: Started Session c204 of User root. Oct 09 23:35:56 np0005479288.novalocal sudo[93373]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:56 np0005479288.novalocal sudo[93375]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:35:56 np0005479288.novalocal systemd[1]: Started Session c205 of User root. Oct 09 23:35:56 np0005479288.novalocal sudo[93375]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:56 np0005479288.novalocal sudo[93373]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:56 np0005479288.novalocal systemd[1]: session-c204.scope: Deactivated successfully. Oct 09 23:35:56 np0005479288.novalocal sudo[93381]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-9c764f0b-52d6-4f4a-b27f-b910b8afa2d7 Oct 09 23:35:57 np0005479288.novalocal systemd[1]: Started Session c206 of User root. Oct 09 23:35:57 np0005479288.novalocal sudo[93381]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:57 np0005479288.novalocal sudo[93375]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:57 np0005479288.novalocal systemd[1]: session-c205.scope: Deactivated successfully. Oct 09 23:35:57 np0005479288.novalocal sudo[93384]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:35:57 np0005479288.novalocal systemd[1]: Started Session c207 of User root. Oct 09 23:35:57 np0005479288.novalocal sudo[93384]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:57 np0005479288.novalocal sudo[93381]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:57 np0005479288.novalocal systemd[1]: session-c206.scope: Deactivated successfully. Oct 09 23:35:57 np0005479288.novalocal sudo[93388]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-9c764f0b-52d6-4f4a-b27f-b910b8afa2d7 Oct 09 23:35:57 np0005479288.novalocal systemd[1]: Started Session c208 of User root. Oct 09 23:35:57 np0005479288.novalocal sudo[93388]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:57 np0005479288.novalocal sudo[93384]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:57 np0005479288.novalocal systemd[1]: session-c207.scope: Deactivated successfully. Oct 09 23:35:57 np0005479288.novalocal lvm[93394]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:35:57 np0005479288.novalocal lvm[93394]: VG cinder-volumes finished Oct 09 23:35:57 np0005479288.novalocal sudo[93388]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:57 np0005479288.novalocal systemd[1]: session-c208.scope: Deactivated successfully. Oct 09 23:35:57 np0005479288.novalocal sudo[93395]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:35:57 np0005479288.novalocal systemd[1]: Started Session c209 of User root. Oct 09 23:35:57 np0005479288.novalocal sudo[93395]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:58 np0005479288.novalocal sudo[93395]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:58 np0005479288.novalocal systemd[1]: session-c209.scope: Deactivated successfully. Oct 09 23:35:58 np0005479288.novalocal sudo[93399]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:35:58 np0005479288.novalocal systemd[1]: Started Session c210 of User root. Oct 09 23:35:58 np0005479288.novalocal sudo[93399]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:58 np0005479288.novalocal sudo[93399]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:58 np0005479288.novalocal systemd[1]: session-c210.scope: Deactivated successfully. Oct 09 23:35:58 np0005479288.novalocal sudo[93403]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:35:58 np0005479288.novalocal systemd[1]: Started Session c211 of User root. Oct 09 23:35:58 np0005479288.novalocal sudo[93403]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:58 np0005479288.novalocal sudo[93406]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-6c70d635-0840-4765-a7ea-7d0cc3e048a5 Oct 09 23:35:58 np0005479288.novalocal systemd[1]: Started Session c212 of User root. Oct 09 23:35:58 np0005479288.novalocal sudo[93406]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:59 np0005479288.novalocal sudo[93403]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:59 np0005479288.novalocal systemd[1]: session-c211.scope: Deactivated successfully. Oct 09 23:35:59 np0005479288.novalocal sudo[93410]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:35:59 np0005479288.novalocal systemd[1]: Started Session c213 of User root. Oct 09 23:35:59 np0005479288.novalocal sudo[93410]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:59 np0005479288.novalocal sudo[93406]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:59 np0005479288.novalocal systemd[1]: session-c212.scope: Deactivated successfully. Oct 09 23:35:59 np0005479288.novalocal sudo[93414]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-6c70d635-0840-4765-a7ea-7d0cc3e048a5 Oct 09 23:35:59 np0005479288.novalocal systemd[1]: Started Session c214 of User root. Oct 09 23:35:59 np0005479288.novalocal sudo[93414]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:35:59 np0005479288.novalocal sudo[93410]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:59 np0005479288.novalocal systemd[1]: session-c213.scope: Deactivated successfully. Oct 09 23:35:59 np0005479288.novalocal sudo[93414]: pam_unix(sudo:session): session closed for user root Oct 09 23:35:59 np0005479288.novalocal systemd[1]: session-c214.scope: Deactivated successfully. Oct 09 23:35:59 np0005479288.novalocal sudo[93419]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-6c70d635-0840-4765-a7ea-7d0cc3e048a5 Oct 09 23:35:59 np0005479288.novalocal systemd[1]: Started Session c215 of User root. Oct 09 23:35:59 np0005479288.novalocal sudo[93419]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:36:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:36:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:36:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:36:00 np0005479288.novalocal lvm[93428]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:36:00 np0005479288.novalocal lvm[93428]: VG cinder-volumes finished Oct 09 23:36:00 np0005479288.novalocal sudo[93419]: pam_unix(sudo:session): session closed for user root Oct 09 23:36:00 np0005479288.novalocal systemd[1]: session-c215.scope: Deactivated successfully. Oct 09 23:36:00 np0005479288.novalocal sudo[93429]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:36:00 np0005479288.novalocal systemd[1]: Started Session c216 of User root. Oct 09 23:36:00 np0005479288.novalocal sudo[93429]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:36:00 np0005479288.novalocal sudo[93429]: pam_unix(sudo:session): session closed for user root Oct 09 23:36:00 np0005479288.novalocal systemd[1]: session-c216.scope: Deactivated successfully. Oct 09 23:36:00 np0005479288.novalocal sudo[93435]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:36:00 np0005479288.novalocal systemd[1]: Started Session c217 of User root. Oct 09 23:36:00 np0005479288.novalocal sudo[93435]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:36:01 np0005479288.novalocal sudo[93435]: pam_unix(sudo:session): session closed for user root Oct 09 23:36:01 np0005479288.novalocal systemd[1]: session-c217.scope: Deactivated successfully. Oct 09 23:36:01 np0005479288.novalocal sudo[93439]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:36:01 np0005479288.novalocal systemd[1]: Started Session c218 of User root. Oct 09 23:36:01 np0005479288.novalocal sudo[93439]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:36:01 np0005479288.novalocal sudo[93439]: pam_unix(sudo:session): session closed for user root Oct 09 23:36:01 np0005479288.novalocal systemd[1]: session-c218.scope: Deactivated successfully. Oct 09 23:36:01 np0005479288.novalocal sudo[93443]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:36:01 np0005479288.novalocal systemd[1]: Started Session c219 of User root. Oct 09 23:36:01 np0005479288.novalocal sudo[93443]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:36:01 np0005479288.novalocal sudo[93443]: pam_unix(sudo:session): session closed for user root Oct 09 23:36:01 np0005479288.novalocal systemd[1]: session-c219.scope: Deactivated successfully. Oct 09 23:36:28 np0005479288.novalocal sshd-session[93510]: error: kex_exchange_identification: read: Connection reset by peer Oct 09 23:36:28 np0005479288.novalocal sshd-session[93510]: Connection reset by 45.140.17.97 port 31206 Oct 09 23:36:31 np0005479288.novalocal kernel: tap0e0be446-e9: entered promiscuous mode Oct 09 23:36:31 np0005479288.novalocal NetworkManager[860]: [1760067391.3137] manager: (tap0e0be446-e9): new Tun device (/org/freedesktop/NetworkManager/Devices/24) Oct 09 23:36:31 np0005479288.novalocal virtqemud[88538]: Domain id=8 name='instance-00000007' uuid=1a6f2de0-82f2-443b-9c39-ef5dbd2458ca is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 09 23:36:31 np0005479288.novalocal virtqemud[88538]: Domain id=8 name='instance-00000007' uuid=1a6f2de0-82f2-443b-9c39-ef5dbd2458ca is tainted: deprecated-config (CPU model 'qemu64') Oct 09 23:36:31 np0005479288.novalocal systemd-machined[85828]: New machine qemu-8-instance-00000007. Oct 09 23:36:31 np0005479288.novalocal systemd[1]: Started Virtual Machine qemu-8-instance-00000007. Oct 09 23:36:31 np0005479288.novalocal systemd-udevd[93550]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:36:31 np0005479288.novalocal NetworkManager[860]: [1760067391.4710] manager: (tap2c990493-30): new Veth device (/org/freedesktop/NetworkManager/Devices/25) Oct 09 23:36:31 np0005479288.novalocal systemd-udevd[93554]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:36:31 np0005479288.novalocal NetworkManager[860]: [1760067391.4882] device (tap0e0be446-e9): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 09 23:36:31 np0005479288.novalocal NetworkManager[860]: [1760067391.4887] device (tap0e0be446-e9): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 09 23:36:31 np0005479288.novalocal NetworkManager[860]: [1760067391.5309] device (tap2c990493-30): carrier: link connected Oct 09 23:36:31 np0005479288.novalocal kernel: tap2c990493-30: entered promiscuous mode Oct 09 23:36:31 np0005479288.novalocal sudo[93591]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-2c990493-38a3-4176-a763-dd9e585d5dc2 env PROCESS_TAG=haproxy-2c990493-38a3-4176-a763-dd9e585d5dc2 haproxy -f /var/lib/neutron/ovn-metadata-proxy/2c990493-38a3-4176-a763-dd9e585d5dc2.conf Oct 09 23:36:31 np0005479288.novalocal systemd[1]: Started Session c220 of User root. Oct 09 23:36:31 np0005479288.novalocal sudo[93591]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:36:32 np0005479288.novalocal sudo[93591]: pam_unix(sudo:session): session closed for user root Oct 09 23:36:48 np0005479288.novalocal sudo[93635]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:36:48 np0005479288.novalocal systemd[1]: Started Session c221 of User root. Oct 09 23:36:48 np0005479288.novalocal sudo[93635]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:36:48 np0005479288.novalocal sudo[93635]: pam_unix(sudo:session): session closed for user root Oct 09 23:36:48 np0005479288.novalocal systemd[1]: session-c221.scope: Deactivated successfully. Oct 09 23:36:49 np0005479288.novalocal sudo[93639]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:36:49 np0005479288.novalocal systemd[1]: Started Session c222 of User root. Oct 09 23:36:49 np0005479288.novalocal sudo[93639]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:36:49 np0005479288.novalocal sudo[93639]: pam_unix(sudo:session): session closed for user root Oct 09 23:36:49 np0005479288.novalocal systemd[1]: session-c222.scope: Deactivated successfully. Oct 09 23:36:49 np0005479288.novalocal sudo[93643]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:36:49 np0005479288.novalocal systemd[1]: Started Session c223 of User root. Oct 09 23:36:49 np0005479288.novalocal sudo[93643]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:36:49 np0005479288.novalocal sudo[93643]: pam_unix(sudo:session): session closed for user root Oct 09 23:36:49 np0005479288.novalocal systemd[1]: session-c223.scope: Deactivated successfully. Oct 09 23:36:49 np0005479288.novalocal sudo[93647]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:36:49 np0005479288.novalocal systemd[1]: Started Session c224 of User root. Oct 09 23:36:49 np0005479288.novalocal sudo[93647]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:36:50 np0005479288.novalocal sudo[93647]: pam_unix(sudo:session): session closed for user root Oct 09 23:36:50 np0005479288.novalocal systemd[1]: session-c224.scope: Deactivated successfully. Oct 09 23:36:51 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60620 [09/Oct/2025:23:36:51.189] listener listener/metadata 0/0/0/108/108 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 09 23:36:51 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60632 [09/Oct/2025:23:36:51.377] listener listener/metadata 0/0/0/12/12 200 160 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Oct 09 23:36:51 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60646 [09/Oct/2025:23:36:51.422] listener listener/metadata 0/0/0/13/13 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Oct 09 23:36:51 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60658 [09/Oct/2025:23:36:51.482] listener listener/metadata 0/0/0/13/13 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 09 23:36:51 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60668 [09/Oct/2025:23:36:51.532] listener listener/metadata 0/0/0/14/14 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Oct 09 23:36:51 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60684 [09/Oct/2025:23:36:51.583] listener listener/metadata 0/0/0/12/12 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Oct 09 23:36:51 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60698 [09/Oct/2025:23:36:51.628] listener listener/metadata 0/0/0/14/14 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Oct 09 23:36:51 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60704 [09/Oct/2025:23:36:51.676] listener listener/metadata 0/0/0/16/16 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Oct 09 23:36:51 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60708 [09/Oct/2025:23:36:51.727] listener listener/metadata 0/0/0/10/10 200 175 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Oct 09 23:36:51 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60710 [09/Oct/2025:23:36:51.774] listener listener/metadata 0/0/0/13/13 200 175 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Oct 09 23:36:51 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60712 [09/Oct/2025:23:36:51.823] listener listener/metadata 0/0/0/12/12 404 281 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Oct 09 23:36:51 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60714 [09/Oct/2025:23:36:51.868] listener listener/metadata 0/0/0/16/16 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Oct 09 23:36:51 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60730 [09/Oct/2025:23:36:51.910] listener listener/metadata 0/0/0/12/12 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Oct 09 23:36:51 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60738 [09/Oct/2025:23:36:51.946] listener listener/metadata 0/0/0/18/18 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Oct 09 23:36:52 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60744 [09/Oct/2025:23:36:52.006] listener listener/metadata 0/0/0/32/32 200 175 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Oct 09 23:36:52 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.13:60756 [09/Oct/2025:23:36:52.090] listener listener/metadata 0/0/0/19/19 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Oct 09 23:37:04 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:37:04 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:37:04 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:37:13 np0005479288.novalocal kernel: tap2174fb89-25: entered promiscuous mode Oct 09 23:37:13 np0005479288.novalocal NetworkManager[860]: [1760067433.6560] manager: (tap2174fb89-25): new Tun device (/org/freedesktop/NetworkManager/Devices/26) Oct 09 23:37:13 np0005479288.novalocal virtqemud[88538]: Domain id=9 name='instance-00000008' uuid=c2a23d44-5deb-45c0-8dd8-44ec9810b793 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 09 23:37:13 np0005479288.novalocal virtqemud[88538]: Domain id=9 name='instance-00000008' uuid=c2a23d44-5deb-45c0-8dd8-44ec9810b793 is tainted: deprecated-config (CPU model 'qemu64') Oct 09 23:37:13 np0005479288.novalocal systemd-machined[85828]: New machine qemu-9-instance-00000008. Oct 09 23:37:13 np0005479288.novalocal systemd[1]: Started Virtual Machine qemu-9-instance-00000008. Oct 09 23:37:13 np0005479288.novalocal systemd-udevd[93754]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:37:13 np0005479288.novalocal NetworkManager[860]: [1760067433.7856] device (tap2174fb89-25): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 09 23:37:13 np0005479288.novalocal NetworkManager[860]: [1760067433.7862] device (tap2174fb89-25): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 09 23:37:18 np0005479288.novalocal sudo[93773]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-6eca571e-2e93-4525-b60d-3dc1310cb73d cinder-volumes/cinder-volumes-pool Oct 09 23:37:18 np0005479288.novalocal systemd[1]: Started Session c225 of User root. Oct 09 23:37:18 np0005479288.novalocal sudo[93773]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:37:18 np0005479288.novalocal lvm[93784]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:37:18 np0005479288.novalocal lvm[93784]: VG cinder-volumes finished Oct 09 23:37:18 np0005479288.novalocal sudo[93773]: pam_unix(sudo:session): session closed for user root Oct 09 23:37:18 np0005479288.novalocal systemd[1]: session-c225.scope: Deactivated successfully. Oct 09 23:37:29 np0005479288.novalocal kernel: tap3068312c-70: entered promiscuous mode Oct 09 23:37:29 np0005479288.novalocal NetworkManager[860]: [1760067449.0333] manager: (tap3068312c-70): new Tun device (/org/freedesktop/NetworkManager/Devices/27) Oct 09 23:37:29 np0005479288.novalocal virtqemud[88538]: Domain id=10 name='instance-00000009' uuid=6e57cd9f-460a-41e8-9fcc-64a92599128b is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 09 23:37:29 np0005479288.novalocal virtqemud[88538]: Domain id=10 name='instance-00000009' uuid=6e57cd9f-460a-41e8-9fcc-64a92599128b is tainted: deprecated-config (CPU model 'qemu64') Oct 09 23:37:29 np0005479288.novalocal systemd-machined[85828]: New machine qemu-10-instance-00000009. Oct 09 23:37:29 np0005479288.novalocal systemd[1]: Started Virtual Machine qemu-10-instance-00000009. Oct 09 23:37:29 np0005479288.novalocal systemd-udevd[93861]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:37:29 np0005479288.novalocal NetworkManager[860]: [1760067449.1611] device (tap3068312c-70): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 09 23:37:29 np0005479288.novalocal NetworkManager[860]: [1760067449.1631] device (tap3068312c-70): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 09 23:37:29 np0005479288.novalocal NetworkManager[860]: [1760067449.4143] manager: (tape80b637a-30): new Veth device (/org/freedesktop/NetworkManager/Devices/28) Oct 09 23:37:29 np0005479288.novalocal NetworkManager[860]: [1760067449.5048] device (tape80b637a-30): carrier: link connected Oct 09 23:37:29 np0005479288.novalocal kernel: tape80b637a-30: entered promiscuous mode Oct 09 23:37:29 np0005479288.novalocal sudo[93907]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-e80b637a-3561-4500-9f3a-e9d3ed05f0d9 env PROCESS_TAG=haproxy-e80b637a-3561-4500-9f3a-e9d3ed05f0d9 haproxy -f /var/lib/neutron/ovn-metadata-proxy/e80b637a-3561-4500-9f3a-e9d3ed05f0d9.conf Oct 09 23:37:29 np0005479288.novalocal systemd[1]: Started Session c226 of User root. Oct 09 23:37:29 np0005479288.novalocal sudo[93907]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:37:30 np0005479288.novalocal sudo[93907]: pam_unix(sudo:session): session closed for user root Oct 09 23:37:34 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46048 [09/Oct/2025:23:37:33.995] listener listener/metadata 0/0/0/209/209 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 09 23:37:34 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46050 [09/Oct/2025:23:37:34.300] listener listener/metadata 0/0/0/15/15 200 159 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Oct 09 23:37:34 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46054 [09/Oct/2025:23:37:34.343] listener listener/metadata 0/0/0/17/17 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Oct 09 23:37:34 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46058 [09/Oct/2025:23:37:34.402] listener listener/metadata 0/0/0/13/13 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 09 23:37:34 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46062 [09/Oct/2025:23:37:34.466] listener listener/metadata 0/0/0/12/12 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Oct 09 23:37:34 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46076 [09/Oct/2025:23:37:34.552] listener listener/metadata 0/0/0/14/14 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Oct 09 23:37:34 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46080 [09/Oct/2025:23:37:34.614] listener listener/metadata 0/0/0/15/15 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Oct 09 23:37:34 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46094 [09/Oct/2025:23:37:34.682] listener listener/metadata 0/0/0/14/14 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Oct 09 23:37:34 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46110 [09/Oct/2025:23:37:34.770] listener listener/metadata 0/0/0/17/17 200 175 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Oct 09 23:37:34 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46124 [09/Oct/2025:23:37:34.844] listener listener/metadata 0/0/0/16/16 200 175 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Oct 09 23:37:34 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46136 [09/Oct/2025:23:37:34.907] listener listener/metadata 0/0/0/15/15 404 281 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Oct 09 23:37:34 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46150 [09/Oct/2025:23:37:34.965] listener listener/metadata 0/0/0/17/17 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Oct 09 23:37:35 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46154 [09/Oct/2025:23:37:35.015] listener listener/metadata 0/0/0/15/15 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Oct 09 23:37:35 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46156 [09/Oct/2025:23:37:35.062] listener listener/metadata 0/0/0/17/17 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Oct 09 23:37:35 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46160 [09/Oct/2025:23:37:35.126] listener listener/metadata 0/0/0/16/16 200 175 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Oct 09 23:37:35 np0005479288.novalocal haproxy-metadata-proxy-2c990493-38a3-4176-a763-dd9e585d5dc2[93596]: 10.100.0.7:46164 [09/Oct/2025:23:37:35.179] listener listener/metadata 0/0/0/13/13 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Oct 09 23:37:42 np0005479288.novalocal kernel: tap3068312c-70 (unregistering): left promiscuous mode Oct 09 23:37:42 np0005479288.novalocal NetworkManager[860]: [1760067462.2746] device (tap3068312c-70): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 09 23:37:42 np0005479288.novalocal systemd[1]: session-c226.scope: Deactivated successfully. Oct 09 23:37:42 np0005479288.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Deactivated successfully. Oct 09 23:37:42 np0005479288.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Consumed 13.122s CPU time. Oct 09 23:37:42 np0005479288.novalocal systemd-machined[85828]: Machine qemu-10-instance-00000009 terminated. Oct 09 23:37:42 np0005479288.novalocal kernel: tape80b637a-30: left promiscuous mode Oct 09 23:37:42 np0005479288.novalocal systemd[1]: run-netns-ovnmeta\x2de80b637a\x2d3561\x2d4500\x2d9f3a\x2de9d3ed05f0d9.mount: Deactivated successfully. Oct 09 23:37:42 np0005479288.novalocal kernel: tap3068312c-70: entered promiscuous mode Oct 09 23:37:42 np0005479288.novalocal NetworkManager[860]: [1760067462.4857] manager: (tap3068312c-70): new Tun device (/org/freedesktop/NetworkManager/Devices/29) Oct 09 23:37:42 np0005479288.novalocal systemd-udevd[93952]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:37:42 np0005479288.novalocal kernel: tap3068312c-70 (unregistering): left promiscuous mode Oct 09 23:37:42 np0005479288.novalocal NetworkManager[860]: [1760067462.6198] manager: (tape80b637a-30): new Veth device (/org/freedesktop/NetworkManager/Devices/30) Oct 09 23:37:42 np0005479288.novalocal NetworkManager[860]: [1760067462.6865] device (tape80b637a-30): carrier: link connected Oct 09 23:37:42 np0005479288.novalocal kernel: tape80b637a-30: entered promiscuous mode Oct 09 23:37:43 np0005479288.novalocal sudo[94011]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-e80b637a-3561-4500-9f3a-e9d3ed05f0d9 env PROCESS_TAG=haproxy-e80b637a-3561-4500-9f3a-e9d3ed05f0d9 haproxy -f /var/lib/neutron/ovn-metadata-proxy/e80b637a-3561-4500-9f3a-e9d3ed05f0d9.conf Oct 09 23:37:43 np0005479288.novalocal systemd[1]: Started Session c227 of User root. Oct 09 23:37:43 np0005479288.novalocal sudo[94011]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:37:43 np0005479288.novalocal sudo[94011]: pam_unix(sudo:session): session closed for user root Oct 09 23:37:43 np0005479288.novalocal systemd[1]: session-c227.scope: Deactivated successfully. Oct 09 23:37:43 np0005479288.novalocal kernel: tape80b637a-30: left promiscuous mode Oct 09 23:37:43 np0005479288.novalocal systemd[1]: run-netns-ovnmeta\x2de80b637a\x2d3561\x2d4500\x2d9f3a\x2de9d3ed05f0d9.mount: Deactivated successfully. Oct 09 23:37:45 np0005479288.novalocal kernel: tap2174fb89-25 (unregistering): left promiscuous mode Oct 09 23:37:45 np0005479288.novalocal NetworkManager[860]: [1760067465.2646] device (tap2174fb89-25): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 09 23:37:45 np0005479288.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Deactivated successfully. Oct 09 23:37:45 np0005479288.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Consumed 23.365s CPU time. Oct 09 23:37:45 np0005479288.novalocal systemd-machined[85828]: Machine qemu-9-instance-00000008 terminated. Oct 09 23:37:45 np0005479288.novalocal kernel: tap2174fb89-25: entered promiscuous mode Oct 09 23:37:45 np0005479288.novalocal kernel: tap2174fb89-25 (unregistering): left promiscuous mode Oct 09 23:37:48 np0005479288.novalocal sudo[94077]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:37:48 np0005479288.novalocal systemd[1]: Started Session c228 of User root. Oct 09 23:37:48 np0005479288.novalocal sudo[94077]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:37:48 np0005479288.novalocal sudo[94077]: pam_unix(sudo:session): session closed for user root Oct 09 23:37:48 np0005479288.novalocal systemd[1]: session-c228.scope: Deactivated successfully. Oct 09 23:37:49 np0005479288.novalocal sudo[94081]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:37:49 np0005479288.novalocal systemd[1]: Started Session c229 of User root. Oct 09 23:37:49 np0005479288.novalocal sudo[94081]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:37:49 np0005479288.novalocal sudo[94081]: pam_unix(sudo:session): session closed for user root Oct 09 23:37:49 np0005479288.novalocal systemd[1]: session-c229.scope: Deactivated successfully. Oct 09 23:37:49 np0005479288.novalocal sudo[94085]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:37:49 np0005479288.novalocal systemd[1]: Started Session c230 of User root. Oct 09 23:37:49 np0005479288.novalocal sudo[94085]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:37:49 np0005479288.novalocal sudo[94085]: pam_unix(sudo:session): session closed for user root Oct 09 23:37:49 np0005479288.novalocal systemd[1]: session-c230.scope: Deactivated successfully. Oct 09 23:37:49 np0005479288.novalocal sudo[94089]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:37:49 np0005479288.novalocal systemd[1]: Started Session c231 of User root. Oct 09 23:37:49 np0005479288.novalocal sudo[94089]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:37:50 np0005479288.novalocal sudo[94089]: pam_unix(sudo:session): session closed for user root Oct 09 23:37:50 np0005479288.novalocal systemd[1]: session-c231.scope: Deactivated successfully. Oct 09 23:37:52 np0005479288.novalocal sudo[94096]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-6eca571e-2e93-4525-b60d-3dc1310cb73d Oct 09 23:37:52 np0005479288.novalocal systemd[1]: Started Session c232 of User root. Oct 09 23:37:52 np0005479288.novalocal sudo[94096]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:37:52 np0005479288.novalocal sudo[94096]: pam_unix(sudo:session): session closed for user root Oct 09 23:37:52 np0005479288.novalocal systemd[1]: session-c232.scope: Deactivated successfully. Oct 09 23:37:52 np0005479288.novalocal sudo[94100]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-6eca571e-2e93-4525-b60d-3dc1310cb73d Oct 09 23:37:52 np0005479288.novalocal systemd[1]: Started Session c233 of User root. Oct 09 23:37:52 np0005479288.novalocal sudo[94100]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:37:53 np0005479288.novalocal sudo[94100]: pam_unix(sudo:session): session closed for user root Oct 09 23:37:53 np0005479288.novalocal systemd[1]: session-c233.scope: Deactivated successfully. Oct 09 23:37:53 np0005479288.novalocal sudo[94104]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-6eca571e-2e93-4525-b60d-3dc1310cb73d Oct 09 23:37:53 np0005479288.novalocal systemd[1]: Started Session c234 of User root. Oct 09 23:37:53 np0005479288.novalocal sudo[94104]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:37:53 np0005479288.novalocal lvm[94111]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:37:53 np0005479288.novalocal lvm[94111]: VG cinder-volumes finished Oct 09 23:37:53 np0005479288.novalocal sudo[94104]: pam_unix(sudo:session): session closed for user root Oct 09 23:37:53 np0005479288.novalocal systemd[1]: session-c234.scope: Deactivated successfully. Oct 09 23:37:53 np0005479288.novalocal sudo[94112]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:37:53 np0005479288.novalocal systemd[1]: Started Session c235 of User root. Oct 09 23:37:53 np0005479288.novalocal sudo[94112]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:37:54 np0005479288.novalocal sudo[94112]: pam_unix(sudo:session): session closed for user root Oct 09 23:37:54 np0005479288.novalocal systemd[1]: session-c235.scope: Deactivated successfully. Oct 09 23:37:54 np0005479288.novalocal sudo[94116]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:37:54 np0005479288.novalocal systemd[1]: Started Session c236 of User root. Oct 09 23:37:54 np0005479288.novalocal sudo[94116]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:37:54 np0005479288.novalocal sudo[94116]: pam_unix(sudo:session): session closed for user root Oct 09 23:37:54 np0005479288.novalocal systemd[1]: session-c236.scope: Deactivated successfully. Oct 09 23:37:54 np0005479288.novalocal sudo[94120]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:37:54 np0005479288.novalocal systemd[1]: Started Session c237 of User root. Oct 09 23:37:54 np0005479288.novalocal sudo[94120]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:37:55 np0005479288.novalocal sudo[94120]: pam_unix(sudo:session): session closed for user root Oct 09 23:37:55 np0005479288.novalocal systemd[1]: session-c237.scope: Deactivated successfully. Oct 09 23:37:55 np0005479288.novalocal sudo[94125]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:37:55 np0005479288.novalocal systemd[1]: Started Session c238 of User root. Oct 09 23:37:55 np0005479288.novalocal sudo[94125]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:37:55 np0005479288.novalocal sudo[94125]: pam_unix(sudo:session): session closed for user root Oct 09 23:37:55 np0005479288.novalocal systemd[1]: session-c238.scope: Deactivated successfully. Oct 09 23:37:56 np0005479288.novalocal kernel: tap0e0be446-e9 (unregistering): left promiscuous mode Oct 09 23:37:56 np0005479288.novalocal NetworkManager[860]: [1760067476.2082] device (tap0e0be446-e9): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 09 23:37:56 np0005479288.novalocal systemd[1]: session-c220.scope: Deactivated successfully. Oct 09 23:37:56 np0005479288.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Deactivated successfully. Oct 09 23:37:56 np0005479288.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Consumed 23.718s CPU time. Oct 09 23:37:56 np0005479288.novalocal systemd-machined[85828]: Machine qemu-8-instance-00000007 terminated. Oct 09 23:37:56 np0005479288.novalocal kernel: tap2c990493-30: left promiscuous mode Oct 09 23:37:56 np0005479288.novalocal systemd[1]: run-netns-ovnmeta\x2d2c990493\x2d38a3\x2d4176\x2da763\x2ddd9e585d5dc2.mount: Deactivated successfully. Oct 09 23:37:59 np0005479288.novalocal sudo[94152]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-d59173d6-2850-4ef4-9eea-b8950392aae6 cinder-volumes/cinder-volumes-pool Oct 09 23:37:59 np0005479288.novalocal systemd[1]: Started Session c239 of User root. Oct 09 23:37:59 np0005479288.novalocal sudo[94152]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:37:59 np0005479288.novalocal lvm[94163]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:37:59 np0005479288.novalocal lvm[94163]: VG cinder-volumes finished Oct 09 23:37:59 np0005479288.novalocal sudo[94152]: pam_unix(sudo:session): session closed for user root Oct 09 23:37:59 np0005479288.novalocal systemd[1]: session-c239.scope: Deactivated successfully. Oct 09 23:38:01 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:38:01 np0005479288.novalocal sudo[94166]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-87407659-ce56-49c1-9760-2108acc3c98a cinder-volumes/cinder-volumes-pool Oct 09 23:38:01 np0005479288.novalocal systemd[1]: Started Session c240 of User root. Oct 09 23:38:01 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:38:01 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:38:01 np0005479288.novalocal sudo[94166]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:01 np0005479288.novalocal lvm[94176]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:38:01 np0005479288.novalocal lvm[94176]: VG cinder-volumes finished Oct 09 23:38:01 np0005479288.novalocal sudo[94166]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:01 np0005479288.novalocal systemd[1]: session-c240.scope: Deactivated successfully. Oct 09 23:38:02 np0005479288.novalocal sudo[94177]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-87407659-ce56-49c1-9760-2108acc3c98a Oct 09 23:38:02 np0005479288.novalocal systemd[1]: Started Session c241 of User root. Oct 09 23:38:02 np0005479288.novalocal sudo[94177]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:02 np0005479288.novalocal sudo[94177]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:02 np0005479288.novalocal systemd[1]: session-c241.scope: Deactivated successfully. Oct 09 23:38:02 np0005479288.novalocal sudo[94181]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-87407659-ce56-49c1-9760-2108acc3c98a Oct 09 23:38:02 np0005479288.novalocal systemd[1]: Started Session c242 of User root. Oct 09 23:38:02 np0005479288.novalocal sudo[94181]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:03 np0005479288.novalocal sudo[94181]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:03 np0005479288.novalocal systemd[1]: session-c242.scope: Deactivated successfully. Oct 09 23:38:03 np0005479288.novalocal sudo[94185]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-87407659-ce56-49c1-9760-2108acc3c98a Oct 09 23:38:03 np0005479288.novalocal systemd[1]: Started Session c243 of User root. Oct 09 23:38:03 np0005479288.novalocal sudo[94185]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:03 np0005479288.novalocal lvm[94192]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:38:03 np0005479288.novalocal lvm[94192]: VG cinder-volumes finished Oct 09 23:38:03 np0005479288.novalocal sudo[94185]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:03 np0005479288.novalocal systemd[1]: session-c243.scope: Deactivated successfully. Oct 09 23:38:03 np0005479288.novalocal sudo[94193]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:38:03 np0005479288.novalocal systemd[1]: Started Session c244 of User root. Oct 09 23:38:03 np0005479288.novalocal sudo[94193]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:04 np0005479288.novalocal sudo[94193]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:04 np0005479288.novalocal systemd[1]: session-c244.scope: Deactivated successfully. Oct 09 23:38:04 np0005479288.novalocal sudo[94197]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:38:04 np0005479288.novalocal systemd[1]: Started Session c245 of User root. Oct 09 23:38:04 np0005479288.novalocal sudo[94197]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:04 np0005479288.novalocal sudo[94197]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:04 np0005479288.novalocal systemd[1]: session-c245.scope: Deactivated successfully. Oct 09 23:38:04 np0005479288.novalocal sudo[94201]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:38:04 np0005479288.novalocal systemd[1]: Started Session c246 of User root. Oct 09 23:38:04 np0005479288.novalocal sudo[94201]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:04 np0005479288.novalocal sudo[94203]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-d59173d6-2850-4ef4-9eea-b8950392aae6 Oct 09 23:38:04 np0005479288.novalocal systemd[1]: Started Session c247 of User root. Oct 09 23:38:04 np0005479288.novalocal sudo[94203]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:04 np0005479288.novalocal sudo[94201]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:04 np0005479288.novalocal systemd[1]: session-c246.scope: Deactivated successfully. Oct 09 23:38:04 np0005479288.novalocal sudo[94209]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:38:04 np0005479288.novalocal sudo[94203]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:04 np0005479288.novalocal systemd[1]: Started Session c248 of User root. Oct 09 23:38:04 np0005479288.novalocal systemd[1]: session-c247.scope: Deactivated successfully. Oct 09 23:38:04 np0005479288.novalocal sudo[94209]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:04 np0005479288.novalocal sudo[94211]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-d59173d6-2850-4ef4-9eea-b8950392aae6 Oct 09 23:38:04 np0005479288.novalocal systemd[1]: Started Session c249 of User root. Oct 09 23:38:04 np0005479288.novalocal sudo[94211]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:05 np0005479288.novalocal sudo[94209]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:05 np0005479288.novalocal systemd[1]: session-c248.scope: Deactivated successfully. Oct 09 23:38:05 np0005479288.novalocal sudo[94211]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:05 np0005479288.novalocal systemd[1]: session-c249.scope: Deactivated successfully. Oct 09 23:38:05 np0005479288.novalocal sudo[94217]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-d59173d6-2850-4ef4-9eea-b8950392aae6 Oct 09 23:38:05 np0005479288.novalocal systemd[1]: Started Session c250 of User root. Oct 09 23:38:05 np0005479288.novalocal sudo[94217]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:05 np0005479288.novalocal lvm[94222]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:38:05 np0005479288.novalocal lvm[94222]: VG cinder-volumes finished Oct 09 23:38:05 np0005479288.novalocal sudo[94217]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:05 np0005479288.novalocal systemd[1]: session-c250.scope: Deactivated successfully. Oct 09 23:38:05 np0005479288.novalocal sudo[94223]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:38:05 np0005479288.novalocal systemd[1]: Started Session c251 of User root. Oct 09 23:38:05 np0005479288.novalocal sudo[94223]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:06 np0005479288.novalocal sudo[94223]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:06 np0005479288.novalocal systemd[1]: session-c251.scope: Deactivated successfully. Oct 09 23:38:06 np0005479288.novalocal sudo[94227]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:38:06 np0005479288.novalocal systemd[1]: Started Session c252 of User root. Oct 09 23:38:06 np0005479288.novalocal sudo[94227]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:06 np0005479288.novalocal sudo[94227]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:06 np0005479288.novalocal systemd[1]: session-c252.scope: Deactivated successfully. Oct 09 23:38:06 np0005479288.novalocal sudo[94231]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:38:06 np0005479288.novalocal systemd[1]: Started Session c253 of User root. Oct 09 23:38:06 np0005479288.novalocal sudo[94231]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:07 np0005479288.novalocal sudo[94231]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:07 np0005479288.novalocal systemd[1]: session-c253.scope: Deactivated successfully. Oct 09 23:38:07 np0005479288.novalocal sudo[94236]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:38:07 np0005479288.novalocal systemd[1]: Started Session c254 of User root. Oct 09 23:38:07 np0005479288.novalocal sudo[94236]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:07 np0005479288.novalocal sudo[94236]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:07 np0005479288.novalocal systemd[1]: session-c254.scope: Deactivated successfully. Oct 09 23:38:08 np0005479288.novalocal sudo[94241]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-64bf1556-569c-4437-af21-25cf5e1116d0 Oct 09 23:38:08 np0005479288.novalocal systemd[1]: Started Session c255 of User root. Oct 09 23:38:08 np0005479288.novalocal sudo[94241]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:09 np0005479288.novalocal sudo[94241]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:09 np0005479288.novalocal systemd[1]: session-c255.scope: Deactivated successfully. Oct 09 23:38:09 np0005479288.novalocal sudo[94245]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate --name volume-0a92779a-c150-46af-b085-1fa7e2da11d4 --snapshot cinder-volumes/volume-64bf1556-569c-4437-af21-25cf5e1116d0 Oct 09 23:38:09 np0005479288.novalocal systemd[1]: Started Session c256 of User root. Oct 09 23:38:09 np0005479288.novalocal sudo[94245]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:09 np0005479288.novalocal dmeventd[84378]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Oct 09 23:38:09 np0005479288.novalocal dmeventd[84378]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Oct 09 23:38:09 np0005479288.novalocal lvm[94255]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:38:09 np0005479288.novalocal lvm[94255]: VG cinder-volumes finished Oct 09 23:38:09 np0005479288.novalocal sudo[94245]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:09 np0005479288.novalocal systemd[1]: session-c256.scope: Deactivated successfully. Oct 09 23:38:09 np0005479288.novalocal sudo[94256]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -k n cinder-volumes/volume-0a92779a-c150-46af-b085-1fa7e2da11d4 Oct 09 23:38:09 np0005479288.novalocal systemd[1]: Started Session c257 of User root. Oct 09 23:38:09 np0005479288.novalocal sudo[94256]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:09 np0005479288.novalocal lvm[94261]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:38:09 np0005479288.novalocal lvm[94261]: VG cinder-volumes finished Oct 09 23:38:10 np0005479288.novalocal sudo[94256]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:10 np0005479288.novalocal systemd[1]: session-c257.scope: Deactivated successfully. Oct 09 23:38:11 np0005479288.novalocal sudo[94270]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-5877715b-75ab-4ca4-b1ae-df26f1a98a9d cinder-volumes/cinder-volumes-pool Oct 09 23:38:11 np0005479288.novalocal systemd[1]: Started Session c258 of User root. Oct 09 23:38:11 np0005479288.novalocal sudo[94270]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:11 np0005479288.novalocal lvm[94279]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:38:11 np0005479288.novalocal lvm[94279]: VG cinder-volumes finished Oct 09 23:38:11 np0005479288.novalocal sudo[94270]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:11 np0005479288.novalocal systemd[1]: session-c258.scope: Deactivated successfully. Oct 09 23:38:12 np0005479288.novalocal sudo[94280]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-5877715b-75ab-4ca4-b1ae-df26f1a98a9d Oct 09 23:38:12 np0005479288.novalocal systemd[1]: Started Session c259 of User root. Oct 09 23:38:12 np0005479288.novalocal sudo[94280]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:12 np0005479288.novalocal sudo[94280]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:12 np0005479288.novalocal systemd[1]: session-c259.scope: Deactivated successfully. Oct 09 23:38:12 np0005479288.novalocal sudo[94284]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-5877715b-75ab-4ca4-b1ae-df26f1a98a9d Oct 09 23:38:12 np0005479288.novalocal systemd[1]: Started Session c260 of User root. Oct 09 23:38:12 np0005479288.novalocal sudo[94284]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:13 np0005479288.novalocal sudo[94284]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:13 np0005479288.novalocal systemd[1]: session-c260.scope: Deactivated successfully. Oct 09 23:38:13 np0005479288.novalocal sudo[94288]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-5877715b-75ab-4ca4-b1ae-df26f1a98a9d Oct 09 23:38:13 np0005479288.novalocal systemd[1]: Started Session c261 of User root. Oct 09 23:38:13 np0005479288.novalocal sudo[94288]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:13 np0005479288.novalocal lvm[94296]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:38:13 np0005479288.novalocal lvm[94296]: VG cinder-volumes finished Oct 09 23:38:13 np0005479288.novalocal sudo[94288]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:13 np0005479288.novalocal systemd[1]: session-c261.scope: Deactivated successfully. Oct 09 23:38:13 np0005479288.novalocal sudo[94297]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:38:13 np0005479288.novalocal systemd[1]: Started Session c262 of User root. Oct 09 23:38:13 np0005479288.novalocal sudo[94297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:14 np0005479288.novalocal sudo[94297]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:14 np0005479288.novalocal systemd[1]: session-c262.scope: Deactivated successfully. Oct 09 23:38:14 np0005479288.novalocal sudo[94337]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:38:14 np0005479288.novalocal systemd[1]: Started Session c263 of User root. Oct 09 23:38:14 np0005479288.novalocal sudo[94337]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:14 np0005479288.novalocal sudo[94341]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-0a92779a-c150-46af-b085-1fa7e2da11d4 Oct 09 23:38:14 np0005479288.novalocal systemd[1]: Started Session c264 of User root. Oct 09 23:38:14 np0005479288.novalocal sudo[94341]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:14 np0005479288.novalocal sudo[94337]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:14 np0005479288.novalocal systemd[1]: session-c263.scope: Deactivated successfully. Oct 09 23:38:14 np0005479288.novalocal sudo[94344]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:38:14 np0005479288.novalocal systemd[1]: Started Session c265 of User root. Oct 09 23:38:14 np0005479288.novalocal sudo[94344]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:15 np0005479288.novalocal sudo[94341]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:15 np0005479288.novalocal systemd[1]: session-c264.scope: Deactivated successfully. Oct 09 23:38:15 np0005479288.novalocal sudo[94349]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-0a92779a-c150-46af-b085-1fa7e2da11d4 Oct 09 23:38:15 np0005479288.novalocal sudo[94344]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:15 np0005479288.novalocal systemd[1]: Started Session c266 of User root. Oct 09 23:38:15 np0005479288.novalocal systemd[1]: session-c265.scope: Deactivated successfully. Oct 09 23:38:15 np0005479288.novalocal sudo[94349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:15 np0005479288.novalocal sudo[94352]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:38:15 np0005479288.novalocal systemd[1]: Started Session c267 of User root. Oct 09 23:38:15 np0005479288.novalocal sudo[94352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:15 np0005479288.novalocal sudo[94349]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:15 np0005479288.novalocal systemd[1]: session-c266.scope: Deactivated successfully. Oct 09 23:38:15 np0005479288.novalocal sudo[94352]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:15 np0005479288.novalocal systemd[1]: session-c267.scope: Deactivated successfully. Oct 09 23:38:15 np0005479288.novalocal sudo[94357]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-0a92779a-c150-46af-b085-1fa7e2da11d4 Oct 09 23:38:15 np0005479288.novalocal systemd[1]: Started Session c268 of User root. Oct 09 23:38:15 np0005479288.novalocal sudo[94357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:15 np0005479288.novalocal lvm[94362]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 09 23:38:15 np0005479288.novalocal lvm[94362]: VG cinder-volumes finished Oct 09 23:38:15 np0005479288.novalocal sudo[94357]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:15 np0005479288.novalocal systemd[1]: session-c268.scope: Deactivated successfully. Oct 09 23:38:16 np0005479288.novalocal sudo[94363]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:38:16 np0005479288.novalocal systemd[1]: Started Session c269 of User root. Oct 09 23:38:16 np0005479288.novalocal sudo[94363]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:16 np0005479288.novalocal sudo[94363]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:16 np0005479288.novalocal systemd[1]: session-c269.scope: Deactivated successfully. Oct 09 23:38:16 np0005479288.novalocal sudo[94367]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:38:16 np0005479288.novalocal systemd[1]: Started Session c270 of User root. Oct 09 23:38:16 np0005479288.novalocal sudo[94367]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:16 np0005479288.novalocal sudo[94367]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:16 np0005479288.novalocal systemd[1]: session-c270.scope: Deactivated successfully. Oct 09 23:38:16 np0005479288.novalocal sudo[94371]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:38:16 np0005479288.novalocal systemd[1]: Started Session c271 of User root. Oct 09 23:38:16 np0005479288.novalocal sudo[94371]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:17 np0005479288.novalocal sudo[94371]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:17 np0005479288.novalocal systemd[1]: session-c271.scope: Deactivated successfully. Oct 09 23:38:17 np0005479288.novalocal sudo[94375]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:38:17 np0005479288.novalocal systemd[1]: Started Session c272 of User root. Oct 09 23:38:17 np0005479288.novalocal sudo[94375]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:17 np0005479288.novalocal sudo[94375]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:17 np0005479288.novalocal systemd[1]: session-c272.scope: Deactivated successfully. Oct 09 23:38:31 np0005479288.novalocal sudo[94401]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmprcu77_98/privsep.sock Oct 09 23:38:31 np0005479288.novalocal systemd[1]: Started Session c273 of User root. Oct 09 23:38:31 np0005479288.novalocal sudo[94401]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:38:32 np0005479288.novalocal sudo[94401]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:32 np0005479288.novalocal kernel: tap6fefccb1-24: entered promiscuous mode Oct 09 23:38:32 np0005479288.novalocal NetworkManager[860]: [1760067512.9374] manager: (tap6fefccb1-24): new Tun device (/org/freedesktop/NetworkManager/Devices/31) Oct 09 23:38:32 np0005479288.novalocal virtqemud[88538]: Domain id=11 name='instance-0000000a' uuid=ad6247d6-4637-469f-9f16-75aab97c1da4 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 09 23:38:32 np0005479288.novalocal virtqemud[88538]: Domain id=11 name='instance-0000000a' uuid=ad6247d6-4637-469f-9f16-75aab97c1da4 is tainted: deprecated-config (CPU model 'qemu64') Oct 09 23:38:32 np0005479288.novalocal systemd-machined[85828]: New machine qemu-11-instance-0000000a. Oct 09 23:38:32 np0005479288.novalocal systemd[1]: Started Virtual Machine qemu-11-instance-0000000a. Oct 09 23:38:33 np0005479288.novalocal systemd-udevd[94431]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:38:33 np0005479288.novalocal NetworkManager[860]: [1760067513.0433] device (tap6fefccb1-24): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 09 23:38:33 np0005479288.novalocal NetworkManager[860]: [1760067513.0438] device (tap6fefccb1-24): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 09 23:38:33 np0005479288.novalocal NetworkManager[860]: [1760067513.0891] manager: (tap8f933aa5-10): new Veth device (/org/freedesktop/NetworkManager/Devices/32) Oct 09 23:38:33 np0005479288.novalocal NetworkManager[860]: [1760067513.1483] device (tap8f933aa5-10): carrier: link connected Oct 09 23:38:33 np0005479288.novalocal kernel: tap8f933aa5-10: entered promiscuous mode Oct 09 23:38:33 np0005479288.novalocal sudo[94473]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-8f933aa5-1c5a-4f5a-bfd9-8adf44b56989 env PROCESS_TAG=haproxy-8f933aa5-1c5a-4f5a-bfd9-8adf44b56989 haproxy -f /var/lib/neutron/ovn-metadata-proxy/8f933aa5-1c5a-4f5a-bfd9-8adf44b56989.conf Oct 09 23:38:33 np0005479288.novalocal systemd[1]: Started Session c274 of User root. Oct 09 23:38:33 np0005479288.novalocal sudo[94473]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:38:33 np0005479288.novalocal sudo[94473]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:34 np0005479288.novalocal sudo[94489]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmpyi9trvbf/privsep.sock Oct 09 23:38:34 np0005479288.novalocal systemd[1]: Started Session c275 of User root. Oct 09 23:38:34 np0005479288.novalocal sudo[94489]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:38:35 np0005479288.novalocal sudo[94489]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:36 np0005479288.novalocal sudo[94501]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap-daemon /etc/neutron/rootwrap.conf Oct 09 23:38:36 np0005479288.novalocal systemd[1]: Started Session c276 of User root. Oct 09 23:38:36 np0005479288.novalocal sudo[94501]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 09 23:38:36 np0005479288.novalocal kernel: vgd665c14a-312: entered promiscuous mode Oct 09 23:38:36 np0005479288.novalocal NetworkManager[860]: [1760067516.5968] manager: (vgd665c14a-312): 'openvswitch' plugin not available; creating generic device Oct 09 23:38:36 np0005479288.novalocal NetworkManager[860]: [1760067516.5988] manager: (vgd665c14a-312): new Generic device (/org/freedesktop/NetworkManager/Devices/33) Oct 09 23:38:37 np0005479288.novalocal kernel: vr2d8258ba-648: entered promiscuous mode Oct 09 23:38:37 np0005479288.novalocal NetworkManager[860]: [1760067517.6156] manager: (vr2d8258ba-648): 'openvswitch' plugin not available; creating generic device Oct 09 23:38:37 np0005479288.novalocal NetworkManager[860]: [1760067517.6174] manager: (vr2d8258ba-648): new Generic device (/org/freedesktop/NetworkManager/Devices/34) Oct 09 23:38:37 np0005479288.novalocal systemd-udevd[94530]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:38:37 np0005479288.novalocal virtnodedevd[88618]: libvirt version: 10.10.0, package: 15.el9 (builder@centos.org, 2025-08-18-13:22:20, ) Oct 09 23:38:37 np0005479288.novalocal virtnodedevd[88618]: hostname: np0005479288.novalocal Oct 09 23:38:37 np0005479288.novalocal virtnodedevd[88618]: ethtool ioctl error on vr2d8258ba-648: No such device Oct 09 23:38:37 np0005479288.novalocal virtnodedevd[88618]: ethtool ioctl error on vr2d8258ba-648: No such device Oct 09 23:38:37 np0005479288.novalocal virtnodedevd[88618]: ethtool ioctl error on vr2d8258ba-648: No such device Oct 09 23:38:37 np0005479288.novalocal virtnodedevd[88618]: ethtool ioctl error on vr2d8258ba-648: No such device Oct 09 23:38:37 np0005479288.novalocal virtnodedevd[88618]: ethtool ioctl error on vr2d8258ba-648: No such device Oct 09 23:38:37 np0005479288.novalocal virtnodedevd[88618]: ethtool ioctl error on vr2d8258ba-648: No such device Oct 09 23:38:37 np0005479288.novalocal virtnodedevd[88618]: ethtool ioctl error on vr2d8258ba-648: No such device Oct 09 23:38:37 np0005479288.novalocal virtnodedevd[88618]: ethtool ioctl error on vr2d8258ba-648: No such device Oct 09 23:38:40 np0005479288.novalocal kernel: IPv4 over IPsec tunneling driver Oct 09 23:38:40 np0005479288.novalocal NetworkManager[860]: [1760067520.4101] manager: (ip_vti0): new IPTunnel device (/org/freedesktop/NetworkManager/Devices/35) Oct 09 23:38:40 np0005479288.novalocal systemd-udevd[94649]: Network interface NamePolicy= disabled on kernel command line. Oct 09 23:38:40 np0005479288.novalocal kernel: IPsec XFRM device driver Oct 09 23:38:48 np0005479288.novalocal sudo[94879]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:38:48 np0005479288.novalocal systemd[1]: Started Session c277 of User root. Oct 09 23:38:48 np0005479288.novalocal sudo[94879]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:48 np0005479288.novalocal sudo[94879]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:48 np0005479288.novalocal systemd[1]: session-c277.scope: Deactivated successfully. Oct 09 23:38:48 np0005479288.novalocal sudo[94883]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:38:48 np0005479288.novalocal systemd[1]: Started Session c278 of User root. Oct 09 23:38:49 np0005479288.novalocal sudo[94883]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:49 np0005479288.novalocal sudo[94883]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:49 np0005479288.novalocal systemd[1]: session-c278.scope: Deactivated successfully. Oct 09 23:38:49 np0005479288.novalocal sudo[94887]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:38:49 np0005479288.novalocal systemd[1]: Started Session c279 of User root. Oct 09 23:38:49 np0005479288.novalocal sudo[94887]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:49 np0005479288.novalocal sudo[94887]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:49 np0005479288.novalocal systemd[1]: session-c279.scope: Deactivated successfully. Oct 09 23:38:49 np0005479288.novalocal sudo[94897]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:38:49 np0005479288.novalocal systemd[1]: Started Session c280 of User root. Oct 09 23:38:49 np0005479288.novalocal sudo[94897]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:38:50 np0005479288.novalocal sudo[94897]: pam_unix(sudo:session): session closed for user root Oct 09 23:38:50 np0005479288.novalocal systemd[1]: session-c280.scope: Deactivated successfully. Oct 09 23:38:59 np0005479288.novalocal kernel: vr2d8258ba-648: left promiscuous mode Oct 09 23:38:59 np0005479288.novalocal kernel: vgd665c14a-312: left promiscuous mode Oct 09 23:38:59 np0005479288.novalocal systemd[1]: run-netns-qvpn\x2d44b081a2\x2d612a\x2d45f4\x2dbddd\x2d120589aee914.mount: Deactivated successfully. Oct 09 23:39:01 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:39:01 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:39:01 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:39:10 np0005479288.novalocal haproxy-metadata-proxy-8f933aa5-1c5a-4f5a-bfd9-8adf44b56989[94478]: 10.100.0.8:56828 [09/Oct/2025:23:39:10.418] listener listener/metadata 0/0/0/144/144 200 131 - - ---- 1/1/0/0/0 0/0 "GET /latest/meta-data/public-ipv4 HTTP/1.1" Oct 09 23:39:11 np0005479288.novalocal haproxy-metadata-proxy-8f933aa5-1c5a-4f5a-bfd9-8adf44b56989[94478]: 10.100.0.8:56834 [09/Oct/2025:23:39:10.881] listener listener/metadata 0/0/0/267/267 200 118 - - ---- 1/1/0/0/0 0/0 "POST /openstack/2013-10-17/password HTTP/1.1" Oct 09 23:39:14 np0005479288.novalocal kernel: tap6fefccb1-24 (unregistering): left promiscuous mode Oct 09 23:39:14 np0005479288.novalocal NetworkManager[860]: [1760067554.3237] device (tap6fefccb1-24): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 09 23:39:14 np0005479288.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Deactivated successfully. Oct 09 23:39:14 np0005479288.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Consumed 19.932s CPU time. Oct 09 23:39:14 np0005479288.novalocal systemd-machined[85828]: Machine qemu-11-instance-0000000a terminated. Oct 09 23:39:14 np0005479288.novalocal kernel: tap8f933aa5-10: left promiscuous mode Oct 09 23:39:14 np0005479288.novalocal systemd[1]: session-c274.scope: Deactivated successfully. Oct 09 23:39:20 np0005479288.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 09 23:39:20 np0005479288.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 09 23:39:21 np0005479288.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@12.service. Oct 09 23:39:22 np0005479288.novalocal setroubleshoot[95086]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l 52667ddf-7243-4774-a446-940efe48974b Oct 09 23:39:22 np0005479288.novalocal setroubleshoot[95086]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:39:24 np0005479288.novalocal setroubleshoot[95086]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l 52667ddf-7243-4774-a446-940efe48974b Oct 09 23:39:24 np0005479288.novalocal setroubleshoot[95086]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 09 23:39:34 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@12.service: Deactivated successfully. Oct 09 23:39:34 np0005479288.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@12.service: Consumed 1.309s CPU time. Oct 09 23:39:34 np0005479288.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 09 23:39:34 np0005479288.novalocal systemd[1]: setroubleshootd.service: Consumed 1.392s CPU time. Oct 09 23:39:48 np0005479288.novalocal sudo[95136]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:39:48 np0005479288.novalocal systemd[1]: Started Session c281 of User root. Oct 09 23:39:48 np0005479288.novalocal sudo[95136]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:39:48 np0005479288.novalocal sudo[95136]: pam_unix(sudo:session): session closed for user root Oct 09 23:39:48 np0005479288.novalocal systemd[1]: session-c281.scope: Deactivated successfully. Oct 09 23:39:49 np0005479288.novalocal sudo[95140]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:39:49 np0005479288.novalocal systemd[1]: Started Session c282 of User root. Oct 09 23:39:49 np0005479288.novalocal sudo[95140]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:39:49 np0005479288.novalocal sudo[95140]: pam_unix(sudo:session): session closed for user root Oct 09 23:39:49 np0005479288.novalocal systemd[1]: session-c282.scope: Deactivated successfully. Oct 09 23:39:49 np0005479288.novalocal sudo[95145]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:39:49 np0005479288.novalocal systemd[1]: Started Session c283 of User root. Oct 09 23:39:49 np0005479288.novalocal sudo[95145]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:39:49 np0005479288.novalocal sudo[95145]: pam_unix(sudo:session): session closed for user root Oct 09 23:39:49 np0005479288.novalocal systemd[1]: session-c283.scope: Deactivated successfully. Oct 09 23:39:49 np0005479288.novalocal sudo[95149]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:39:49 np0005479288.novalocal systemd[1]: Started Session c284 of User root. Oct 09 23:39:49 np0005479288.novalocal sudo[95149]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:39:50 np0005479288.novalocal sudo[95149]: pam_unix(sudo:session): session closed for user root Oct 09 23:39:50 np0005479288.novalocal systemd[1]: session-c284.scope: Deactivated successfully. Oct 09 23:40:01 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:40:01 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:40:01 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:40:48 np0005479288.novalocal sudo[95241]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:40:48 np0005479288.novalocal systemd[1]: Started Session c285 of User root. Oct 09 23:40:48 np0005479288.novalocal sudo[95241]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:40:48 np0005479288.novalocal sudo[95241]: pam_unix(sudo:session): session closed for user root Oct 09 23:40:48 np0005479288.novalocal systemd[1]: session-c285.scope: Deactivated successfully. Oct 09 23:40:49 np0005479288.novalocal sudo[95245]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:40:49 np0005479288.novalocal systemd[1]: Started Session c286 of User root. Oct 09 23:40:49 np0005479288.novalocal sudo[95245]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:40:49 np0005479288.novalocal sudo[95245]: pam_unix(sudo:session): session closed for user root Oct 09 23:40:49 np0005479288.novalocal systemd[1]: session-c286.scope: Deactivated successfully. Oct 09 23:40:49 np0005479288.novalocal sudo[95249]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:40:49 np0005479288.novalocal systemd[1]: Started Session c287 of User root. Oct 09 23:40:49 np0005479288.novalocal sudo[95249]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:40:49 np0005479288.novalocal sudo[95249]: pam_unix(sudo:session): session closed for user root Oct 09 23:40:49 np0005479288.novalocal systemd[1]: session-c287.scope: Deactivated successfully. Oct 09 23:40:49 np0005479288.novalocal sudo[95253]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:40:49 np0005479288.novalocal systemd[1]: Started Session c288 of User root. Oct 09 23:40:49 np0005479288.novalocal sudo[95253]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:40:50 np0005479288.novalocal sudo[95253]: pam_unix(sudo:session): session closed for user root Oct 09 23:40:50 np0005479288.novalocal systemd[1]: session-c288.scope: Deactivated successfully. Oct 09 23:41:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:41:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:41:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:41:48 np0005479288.novalocal sudo[95341]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:41:48 np0005479288.novalocal systemd[1]: Started Session c289 of User root. Oct 09 23:41:48 np0005479288.novalocal sudo[95341]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:41:48 np0005479288.novalocal sudo[95341]: pam_unix(sudo:session): session closed for user root Oct 09 23:41:48 np0005479288.novalocal systemd[1]: session-c289.scope: Deactivated successfully. Oct 09 23:41:49 np0005479288.novalocal sudo[95345]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:41:49 np0005479288.novalocal systemd[1]: Started Session c290 of User root. Oct 09 23:41:49 np0005479288.novalocal sudo[95345]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:41:49 np0005479288.novalocal sudo[95345]: pam_unix(sudo:session): session closed for user root Oct 09 23:41:49 np0005479288.novalocal systemd[1]: session-c290.scope: Deactivated successfully. Oct 09 23:41:49 np0005479288.novalocal sudo[95349]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:41:49 np0005479288.novalocal systemd[1]: Started Session c291 of User root. Oct 09 23:41:49 np0005479288.novalocal sudo[95349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:41:49 np0005479288.novalocal sudo[95349]: pam_unix(sudo:session): session closed for user root Oct 09 23:41:49 np0005479288.novalocal systemd[1]: session-c291.scope: Deactivated successfully. Oct 09 23:41:49 np0005479288.novalocal sudo[95354]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:41:49 np0005479288.novalocal systemd[1]: Started Session c292 of User root. Oct 09 23:41:49 np0005479288.novalocal sudo[95354]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:41:50 np0005479288.novalocal sudo[95354]: pam_unix(sudo:session): session closed for user root Oct 09 23:41:50 np0005479288.novalocal systemd[1]: session-c292.scope: Deactivated successfully. Oct 09 23:42:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:42:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:42:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:42:48 np0005479288.novalocal sudo[95443]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:42:48 np0005479288.novalocal systemd[1]: Started Session c293 of User root. Oct 09 23:42:48 np0005479288.novalocal sudo[95443]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:42:49 np0005479288.novalocal sudo[95443]: pam_unix(sudo:session): session closed for user root Oct 09 23:42:49 np0005479288.novalocal systemd[1]: session-c293.scope: Deactivated successfully. Oct 09 23:42:49 np0005479288.novalocal sudo[95450]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:42:49 np0005479288.novalocal systemd[1]: Started Session c294 of User root. Oct 09 23:42:49 np0005479288.novalocal sudo[95450]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:42:49 np0005479288.novalocal sudo[95450]: pam_unix(sudo:session): session closed for user root Oct 09 23:42:49 np0005479288.novalocal systemd[1]: session-c294.scope: Deactivated successfully. Oct 09 23:42:49 np0005479288.novalocal sudo[95454]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:42:49 np0005479288.novalocal systemd[1]: Started Session c295 of User root. Oct 09 23:42:49 np0005479288.novalocal sudo[95454]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:42:49 np0005479288.novalocal sudo[95454]: pam_unix(sudo:session): session closed for user root Oct 09 23:42:49 np0005479288.novalocal systemd[1]: session-c295.scope: Deactivated successfully. Oct 09 23:42:49 np0005479288.novalocal sudo[95458]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:42:50 np0005479288.novalocal systemd[1]: Started Session c296 of User root. Oct 09 23:42:50 np0005479288.novalocal sudo[95458]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:42:50 np0005479288.novalocal sudo[95458]: pam_unix(sudo:session): session closed for user root Oct 09 23:42:50 np0005479288.novalocal systemd[1]: session-c296.scope: Deactivated successfully. Oct 09 23:43:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:43:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:43:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:43:48 np0005479288.novalocal sudo[95543]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:43:48 np0005479288.novalocal systemd[1]: Started Session c297 of User root. Oct 09 23:43:48 np0005479288.novalocal sudo[95543]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:43:48 np0005479288.novalocal sudo[95543]: pam_unix(sudo:session): session closed for user root Oct 09 23:43:48 np0005479288.novalocal systemd[1]: session-c297.scope: Deactivated successfully. Oct 09 23:43:49 np0005479288.novalocal sudo[95547]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:43:49 np0005479288.novalocal systemd[1]: Started Session c298 of User root. Oct 09 23:43:49 np0005479288.novalocal sudo[95547]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:43:49 np0005479288.novalocal sudo[95547]: pam_unix(sudo:session): session closed for user root Oct 09 23:43:49 np0005479288.novalocal systemd[1]: session-c298.scope: Deactivated successfully. Oct 09 23:43:49 np0005479288.novalocal sudo[95551]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:43:49 np0005479288.novalocal systemd[1]: Started Session c299 of User root. Oct 09 23:43:49 np0005479288.novalocal sudo[95551]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:43:49 np0005479288.novalocal sudo[95551]: pam_unix(sudo:session): session closed for user root Oct 09 23:43:49 np0005479288.novalocal systemd[1]: session-c299.scope: Deactivated successfully. Oct 09 23:43:49 np0005479288.novalocal sudo[95555]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:43:49 np0005479288.novalocal systemd[1]: Started Session c300 of User root. Oct 09 23:43:49 np0005479288.novalocal sudo[95555]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:43:50 np0005479288.novalocal sudo[95555]: pam_unix(sudo:session): session closed for user root Oct 09 23:43:50 np0005479288.novalocal systemd[1]: session-c300.scope: Deactivated successfully. Oct 09 23:43:54 np0005479288.novalocal lvm[95573]: PV /dev/loop3 online, VG lvm-shares is complete. Oct 09 23:43:54 np0005479288.novalocal lvm[95573]: VG lvm-shares finished Oct 09 23:43:55 np0005479288.novalocal kernel: EXT4-fs (dm-6): mounted filesystem 1a8a1046-bf42-4a81-a7bf-4964a514bbab r/w with ordered data mode. Quota mode: none. Oct 09 23:43:57 np0005479288.novalocal systemd[1]: var-lib-manila-mnt-share\x2d3fcde73b\x2d3e80\x2d477a\x2daa7f\x2d5058b63726c6.mount: Deactivated successfully. Oct 09 23:43:57 np0005479288.novalocal kernel: EXT4-fs (dm-6): unmounting filesystem 1a8a1046-bf42-4a81-a7bf-4964a514bbab. Oct 09 23:43:58 np0005479288.novalocal lvm[95589]: PV /dev/loop3 online, VG lvm-shares is complete. Oct 09 23:43:58 np0005479288.novalocal lvm[95589]: VG lvm-shares finished Oct 09 23:44:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:44:01 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:44:01 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:44:05 np0005479288.novalocal sshd-session[95595]: banner exchange: Connection from 195.178.110.109 port 60764: invalid format Oct 09 23:44:05 np0005479288.novalocal sshd-session[95596]: banner exchange: Connection from 195.178.110.109 port 60772: invalid format Oct 09 23:44:06 np0005479288.novalocal sudo[50344]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:08 np0005479288.novalocal sudo[96298]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yzmcoyajkddgngnkkhpzflmaeusbccms ; WORKSPACE=/var/log/weirdo-project /usr/bin/python3' Oct 09 23:44:08 np0005479288.novalocal sudo[96298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:44:08 np0005479288.novalocal python3[96300]: ansible-command Invoked with chdir=/tmp/puppet-openstack creates=/var/log/weirdo-project/logs _raw_params=./copy_logs.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None removes=None stdin=None Oct 09 23:44:09 np0005479288.novalocal sudo[96423]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ceph /var/log/weirdo-project/logs/etc/ Oct 09 23:44:09 np0005479288.novalocal sudo[96423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96423]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96426]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/cinder /var/log/weirdo-project/logs/etc/ Oct 09 23:44:09 np0005479288.novalocal sudo[96426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96426]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96429]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/cinder /var/log/weirdo-project/logs Oct 09 23:44:09 np0005479288.novalocal sudo[96429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96429]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96432]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/glance /var/log/weirdo-project/logs/etc/ Oct 09 23:44:09 np0005479288.novalocal sudo[96432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96432]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96435]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/glance /var/log/weirdo-project/logs Oct 09 23:44:09 np0005479288.novalocal sudo[96435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96435]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96438]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/horizon /var/log/weirdo-project/logs Oct 09 23:44:09 np0005479288.novalocal sudo[96438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96438]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96441]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/keystone /var/log/weirdo-project/logs/etc/ Oct 09 23:44:09 np0005479288.novalocal sudo[96441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96441]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96444]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/keystone /var/log/weirdo-project/logs Oct 09 23:44:09 np0005479288.novalocal sudo[96444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96444]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96447]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/manila /var/log/weirdo-project/logs/etc/ Oct 09 23:44:09 np0005479288.novalocal sudo[96447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96447]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96450]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/manila /var/log/weirdo-project/logs Oct 09 23:44:09 np0005479288.novalocal sudo[96450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96450]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96453]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/neutron /var/log/weirdo-project/logs/etc/ Oct 09 23:44:09 np0005479288.novalocal sudo[96453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96453]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96456]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/neutron /var/log/weirdo-project/logs Oct 09 23:44:09 np0005479288.novalocal sudo[96456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96456]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96459]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/nova /var/log/weirdo-project/logs/etc/ Oct 09 23:44:09 np0005479288.novalocal sudo[96459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96459]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96462]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/nova /var/log/weirdo-project/logs Oct 09 23:44:09 np0005479288.novalocal sudo[96462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96462]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96465]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/octavia /var/log/weirdo-project/logs/etc/ Oct 09 23:44:09 np0005479288.novalocal sudo[96465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96465]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96468]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/octavia /var/log/weirdo-project/logs Oct 09 23:44:09 np0005479288.novalocal sudo[96468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96468]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96471]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ovn /var/log/weirdo-project/logs/etc/ Oct 09 23:44:09 np0005479288.novalocal sudo[96471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96471]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:09 np0005479288.novalocal sudo[96474]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/ovn /var/log/weirdo-project/logs Oct 09 23:44:09 np0005479288.novalocal sudo[96474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:09 np0005479288.novalocal sudo[96474]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96477]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/placement /var/log/weirdo-project/logs/etc/ Oct 09 23:44:10 np0005479288.novalocal sudo[96477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96477]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96480]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/placement /var/log/weirdo-project/logs Oct 09 23:44:10 np0005479288.novalocal sudo[96480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96480]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96483]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/tempest /var/log/weirdo-project/logs/etc/ Oct 09 23:44:10 np0005479288.novalocal sudo[96483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96483]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96486]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/puppet/puppet.conf /var/log/weirdo-project/logs/ Oct 09 23:44:10 np0005479288.novalocal sudo[96486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96486]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96490]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/journalctl --no-pager Oct 09 23:44:10 np0005479288.novalocal sudo[96490]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96490]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96493]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rsyslog.d /var/log/weirdo-project/logs/etc/ Oct 09 23:44:10 np0005479288.novalocal sudo[96493]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96493]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96496]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyslog.conf /var/log/weirdo-project/logs/etc/ Oct 09 23:44:10 np0005479288.novalocal sudo[96496]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96496]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96499]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/network-scripts /var/log/weirdo-project/logs/etc/sysconfig/ Oct 09 23:44:10 np0005479288.novalocal sudo[96499]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96499]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96502]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rabbitmq /var/log/weirdo-project/logs/etc/ Oct 09 23:44:10 np0005479288.novalocal sudo[96502]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96502]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96505]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/rabbitmq /var/log/weirdo-project/logs Oct 09 23:44:10 np0005479288.novalocal sudo[96505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96505]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96508]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/my.cnf /var/log/weirdo-project/logs/etc/ Oct 09 23:44:10 np0005479288.novalocal sudo[96508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96508]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96511]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/my.cnf.d /var/log/weirdo-project/logs/etc/ Oct 09 23:44:10 np0005479288.novalocal sudo[96511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96511]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96514]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/mariadb /var/log/weirdo-project/logs/ Oct 09 23:44:10 np0005479288.novalocal sudo[96514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96514]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96517]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/iscsi /var/log/weirdo-project/logs/etc/ Oct 09 23:44:10 np0005479288.novalocal sudo[96517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96517]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96520]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/tempest.log /var/log/weirdo-project/logs/ Oct 09 23:44:10 np0005479288.novalocal sudo[96520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96520]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96523]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testrepository.subunit /var/log/weirdo-project/logs/testrepository.subunit Oct 09 23:44:10 np0005479288.novalocal sudo[96523]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96523]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96526]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testr_results.html /var/log/weirdo-project/logs/testr_results.html Oct 09 23:44:10 np0005479288.novalocal sudo[96526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96526]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96529]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dstat.log /var/log/weirdo-project/logs/ Oct 09 23:44:10 np0005479288.novalocal sudo[96529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96529]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96532]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iostat.log /var/log/weirdo-project/logs/ Oct 09 23:44:10 np0005479288.novalocal sudo[96532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96532]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96535]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iotop.log /var/log/weirdo-project/logs/ Oct 09 23:44:10 np0005479288.novalocal sudo[96535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96535]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96538]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/libvirt /var/log/weirdo-project/logs/ Oct 09 23:44:10 np0005479288.novalocal sudo[96538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:10 np0005479288.novalocal sudo[96538]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:10 np0005479288.novalocal sudo[96541]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/virsh net-list --all Oct 09 23:44:10 np0005479288.novalocal sudo[96541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal virtqemud[88538]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Oct 09 23:44:11 np0005479288.novalocal sudo[96541]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96545]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/libvirt /var/log/weirdo-project/logs/etc/ Oct 09 23:44:11 np0005479288.novalocal sudo[96545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96545]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96548]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig Oct 09 23:44:11 np0005479288.novalocal sudo[96548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96548]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96551]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openvswitch /var/log/weirdo-project/logs/etc/ Oct 09 23:44:11 np0005479288.novalocal sudo[96551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96551]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96554]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/openvswitch /var/log/weirdo-project/logs/ Oct 09 23:44:11 np0005479288.novalocal sudo[96554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96554]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96558]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Oct 09 23:44:11 np0005479288.novalocal sudo[96558]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96558]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96561]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Oct 09 23:44:11 np0005479288.novalocal sudo[96561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96561]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96564]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-ssl Oct 09 23:44:11 np0005479288.novalocal sudo[96564]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96564]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96569]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Oct 09 23:44:11 np0005479288.novalocal sudo[96569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96569]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96572]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Oct 09 23:44:11 np0005479288.novalocal sudo[96572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96572]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96575]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-ssl Oct 09 23:44:11 np0005479288.novalocal sudo[96575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96575]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96578]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ Oct 09 23:44:11 np0005479288.novalocal sudo[96578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96578]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96581]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ Oct 09 23:44:11 np0005479288.novalocal sudo[96581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96581]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96584]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sudoers.d /var/log/weirdo-project/logs/ Oct 09 23:44:11 np0005479288.novalocal sudo[96584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96584]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96587]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sudoers /var/log/weirdo-project/logs/sudoers.txt Oct 09 23:44:11 np0005479288.novalocal sudo[96587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96587]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96591]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/magic /etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ Oct 09 23:44:11 np0005479288.novalocal sudo[96591]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96591]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96595]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.d/10-cinder_wsgi.conf /etc/httpd/conf.d/10-glance_wsgi.conf /etc/httpd/conf.d/10-keystone_wsgi.conf /etc/httpd/conf.d/10-manila_wsgi.conf /etc/httpd/conf.d/10-nova_api_wsgi.conf /etc/httpd/conf.d/10-nova_metadata_wsgi.conf /etc/httpd/conf.d/10-octavia_wsgi.conf /etc/httpd/conf.d/10-placement_wsgi.conf /etc/httpd/conf.d/15-horizon_ssl_vhost.conf /etc/httpd/conf.d/15-horizon_vhost.conf /etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/ Oct 09 23:44:11 np0005479288.novalocal sudo[96595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96595]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96599]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.modules.d/alias.conf /etc/httpd/conf.modules.d/alias.load /etc/httpd/conf.modules.d/authz_core.load /etc/httpd/conf.modules.d/authz_host.load /etc/httpd/conf.modules.d/filter.load /etc/httpd/conf.modules.d/log_config.load /etc/httpd/conf.modules.d/mime.conf /etc/httpd/conf.modules.d/mime.load /etc/httpd/conf.modules.d/prefork.conf /etc/httpd/conf.modules.d/prefork.load /etc/httpd/conf.modules.d/setenvif.conf /etc/httpd/conf.modules.d/setenvif.load /etc/httpd/conf.modules.d/socache_shmcb.load /etc/httpd/conf.modules.d/ssl.conf /etc/httpd/conf.modules.d/ssl.load /etc/httpd/conf.modules.d/systemd.load /etc/httpd/conf.modules.d/unixd.load /etc/httpd/conf.modules.d/wsgi.conf /etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ Oct 09 23:44:11 np0005479288.novalocal sudo[96599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96599]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96602]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/httpd /var/log/weirdo-project/logs/apache Oct 09 23:44:11 np0005479288.novalocal sudo[96602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96602]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96605]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/redis /var/log/weirdo-project/logs/ Oct 09 23:44:11 np0005479288.novalocal sudo[96605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96605]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96608]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/redis /var/log/weirdo-project/logs/etc/ Oct 09 23:44:11 np0005479288.novalocal sudo[96608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96608]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:11 np0005479288.novalocal sudo[96611]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/audit/audit.log /var/log/weirdo-project/logs/audit.log.txt Oct 09 23:44:11 np0005479288.novalocal sudo[96611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:11 np0005479288.novalocal sudo[96611]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96614]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/spool/cron /var/log/weirdo-project/logs/ Oct 09 23:44:12 np0005479288.novalocal sudo[96614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96614]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96617]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/etc/tempest.conf /var/log/weirdo-project/logs/tempest.conf.txt Oct 09 23:44:12 np0005479288.novalocal sudo[96617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96617]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96620]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack-dashboard /var/log/weirdo-project/logs/etc/openstack-dashboard Oct 09 23:44:12 np0005479288.novalocal sudo[96620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96620]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96624]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt Oct 09 23:44:12 np0005479288.novalocal sudo[96624]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96624]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96627]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt Oct 09 23:44:12 np0005479288.novalocal sudo[96627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96627]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96630]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt Oct 09 23:44:12 np0005479288.novalocal sudo[96630]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96630]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96633]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt Oct 09 23:44:12 np0005479288.novalocal sudo[96633]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96633]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96636]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt Oct 09 23:44:12 np0005479288.novalocal sudo[96636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96636]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96639]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt Oct 09 23:44:12 np0005479288.novalocal sudo[96639]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96639]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96642]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt Oct 09 23:44:12 np0005479288.novalocal sudo[96642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96642]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96645]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt Oct 09 23:44:12 np0005479288.novalocal sudo[96645]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96645]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96648]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt Oct 09 23:44:12 np0005479288.novalocal sudo[96648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96648]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96651]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt Oct 09 23:44:12 np0005479288.novalocal sudo[96651]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96651]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96654]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt Oct 09 23:44:12 np0005479288.novalocal sudo[96654]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96654]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96657]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt Oct 09 23:44:12 np0005479288.novalocal sudo[96657]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96657]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:12 np0005479288.novalocal sudo[96661]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf Oct 09 23:44:12 np0005479288.novalocal sudo[96661]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:12 np0005479288.novalocal sudo[96661]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:13 np0005479288.novalocal sudo[96668]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf repolist -v Oct 09 23:44:13 np0005479288.novalocal sudo[96668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:14 np0005479288.novalocal sudo[96668]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:14 np0005479288.novalocal sudo[96671]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf list installed Oct 09 23:44:14 np0005479288.novalocal sudo[96671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:15 np0005479288.novalocal sudo[96671]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:15 np0005479288.novalocal sudo[96710]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf module list Oct 09 23:44:15 np0005479288.novalocal sudo[96710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:16 np0005479288.novalocal sudo[96710]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:16 np0005479288.novalocal sudo[96713]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/yum.repos.d /var/log/weirdo-project/logs/etc/yum.repos.d Oct 09 23:44:16 np0005479288.novalocal sudo[96713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:16 np0005479288.novalocal sudo[96713]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:16 np0005479288.novalocal sudo[96717]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.log /var/log/weirdo-project/logs/dnf Oct 09 23:44:16 np0005479288.novalocal sudo[96717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:16 np0005479288.novalocal sudo[96717]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:16 np0005479288.novalocal sudo[96720]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.rpm.log /var/log/weirdo-project/logs/dnf Oct 09 23:44:16 np0005479288.novalocal sudo[96720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:16 np0005479288.novalocal sudo[96720]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:17 np0005479288.novalocal sudo[96726]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/passwd /var/log/weirdo-project/logs/etc Oct 09 23:44:17 np0005479288.novalocal sudo[96726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:17 np0005479288.novalocal sudo[96726]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:17 np0005479288.novalocal sudo[96729]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/group /var/log/weirdo-project/logs/etc Oct 09 23:44:17 np0005479288.novalocal sudo[96729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:17 np0005479288.novalocal sudo[96729]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:17 np0005479288.novalocal sudo[96732]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack /var/log/weirdo-project/logs/etc Oct 09 23:44:17 np0005479288.novalocal sudo[96732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:17 np0005479288.novalocal sudo[96732]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:17 np0005479288.novalocal sudo[96735]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml Oct 09 23:44:17 np0005479288.novalocal sudo[96735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:17 np0005479288.novalocal sudo[96735]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:17 np0005479288.novalocal sudo[96742]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ps -eo user,pid,ppid,lwp,%cpu,%mem,size,rss,cmd Oct 09 23:44:17 np0005479288.novalocal sudo[96742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:17 np0005479288.novalocal sudo[96742]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:17 np0005479288.novalocal sudo[96745]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/ip -d address Oct 09 23:44:17 np0005479288.novalocal sudo[96745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:17 np0005479288.novalocal sudo[96745]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:17 np0005479288.novalocal sudo[96751]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl show Oct 09 23:44:17 np0005479288.novalocal sudo[96751]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:17 np0005479288.novalocal sudo[96751]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:17 np0005479288.novalocal sudo[96754]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl list open_vswitch Oct 09 23:44:17 np0005479288.novalocal sudo[96754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:17 np0005479288.novalocal sudo[96754]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:17 np0005479288.novalocal sudo[96758]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Oct 09 23:44:17 np0005479288.novalocal sudo[96758]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:17 np0005479288.novalocal sudo[96758]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:17 np0005479288.novalocal sudo[96762]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Oct 09 23:44:17 np0005479288.novalocal sudo[96762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:17 np0005479288.novalocal sudo[96762]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:17 np0005479288.novalocal sudo[96765]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/netstat -tulpn Oct 09 23:44:17 np0005479288.novalocal sudo[96765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:17 np0005479288.novalocal sudo[96765]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:17 np0005479288.novalocal sudo[96768]: root : PWD=/tmp/puppet-openstack ; USER=root ; ENV=LC_CTYPE=C SYSTEMD_COLORS=false ; COMMAND=/bin/systemctl status --all --no-pager Oct 09 23:44:17 np0005479288.novalocal sudo[96768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:20 np0005479288.novalocal sudo[96768]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:20 np0005479288.novalocal sudo[96771]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t raw -vnxL Oct 09 23:44:20 np0005479288.novalocal sudo[96771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:20 np0005479288.novalocal sudo[96771]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:20 np0005479288.novalocal sudo[96774]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t filter -vnxL Oct 09 23:44:20 np0005479288.novalocal sudo[96774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:20 np0005479288.novalocal sudo[96774]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:20 np0005479288.novalocal sudo[96777]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t nat -vnxL Oct 09 23:44:20 np0005479288.novalocal sudo[96777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:20 np0005479288.novalocal sudo[96777]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:20 np0005479288.novalocal sudo[96780]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t mangle -vnxL Oct 09 23:44:20 np0005479288.novalocal sudo[96780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:20 np0005479288.novalocal sudo[96780]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:20 np0005479288.novalocal sudo[96783]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/fstab /var/log/weirdo-project/logs/etc/ Oct 09 23:44:20 np0005479288.novalocal sudo[96783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:20 np0005479288.novalocal sudo[96783]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:20 np0005479288.novalocal sudo[96786]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mount Oct 09 23:44:20 np0005479288.novalocal sudo[96786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:20 np0005479288.novalocal sudo[96786]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:20 np0005479288.novalocal sudo[96789]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/losetup -al Oct 09 23:44:20 np0005479288.novalocal sudo[96789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:20 np0005479288.novalocal sudo[96789]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:20 np0005479288.novalocal sudo[96792]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/pvs Oct 09 23:44:20 np0005479288.novalocal sudo[96792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:20 np0005479288.novalocal sudo[96792]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:20 np0005479288.novalocal sudo[96795]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/vgs Oct 09 23:44:20 np0005479288.novalocal sudo[96795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:20 np0005479288.novalocal sudo[96795]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:20 np0005479288.novalocal sudo[96798]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/lvs Oct 09 23:44:20 np0005479288.novalocal sudo[96798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:20 np0005479288.novalocal sudo[96798]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:20 np0005479288.novalocal sudo[96802]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/semanage boolean --list Oct 09 23:44:20 np0005479288.novalocal sudo[96802]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:21 np0005479288.novalocal sudo[96802]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:25 np0005479288.novalocal sudo[96811]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_cells --verbose Oct 09 23:44:25 np0005479288.novalocal sudo[96811]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Oct 09 23:44:28 np0005479288.novalocal sudo[96811]: pam_unix(sudo:session): session closed for user nova Oct 09 23:44:28 np0005479288.novalocal sudo[96815]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_hosts Oct 09 23:44:28 np0005479288.novalocal sudo[96815]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Oct 09 23:44:31 np0005479288.novalocal sudo[96815]: pam_unix(sudo:session): session closed for user nova Oct 09 23:44:43 np0005479288.novalocal sudo[96830]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type d -execdir sudo chmod 755 {} ; Oct 09 23:44:43 np0005479288.novalocal sudo[96830]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96833]: root : PWD=/var/log/weirdo-project ; USER=root ; COMMAND=/bin/chmod 755 ./logs Oct 09 23:44:43 np0005479288.novalocal sudo[96833]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96833]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96836]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./etc Oct 09 23:44:43 np0005479288.novalocal sudo[96836]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96836]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96839]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./sysconfig Oct 09 23:44:43 np0005479288.novalocal sudo[96839]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96839]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96842]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 755 ./network-scripts Oct 09 23:44:43 np0005479288.novalocal sudo[96842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96842]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96845]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ceph Oct 09 23:44:43 np0005479288.novalocal sudo[96845]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96845]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96848]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Oct 09 23:44:43 np0005479288.novalocal sudo[96848]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96848]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96851]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 09 23:44:43 np0005479288.novalocal sudo[96851]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96851]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96854]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 09 23:44:43 np0005479288.novalocal sudo[96854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96854]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96857]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Oct 09 23:44:43 np0005479288.novalocal sudo[96857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96857]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96860]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./volumes Oct 09 23:44:43 np0005479288.novalocal sudo[96860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96860]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96863]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./glance Oct 09 23:44:43 np0005479288.novalocal sudo[96863]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96863]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96866]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./metadefs Oct 09 23:44:43 np0005479288.novalocal sudo[96866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96866]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96869]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Oct 09 23:44:43 np0005479288.novalocal sudo[96869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96869]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96872]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 09 23:44:43 np0005479288.novalocal sudo[96872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96872]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96875]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 09 23:44:43 np0005479288.novalocal sudo[96875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96875]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96878]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Oct 09 23:44:43 np0005479288.novalocal sudo[96878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96878]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96881]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./fernet-keys Oct 09 23:44:43 np0005479288.novalocal sudo[96881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96881]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96884]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./credential-keys Oct 09 23:44:43 np0005479288.novalocal sudo[96884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:43 np0005479288.novalocal sudo[96884]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:43 np0005479288.novalocal sudo[96887]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 09 23:44:44 np0005479288.novalocal sudo[96887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96887]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96890]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 09 23:44:44 np0005479288.novalocal sudo[96890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96890]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96893]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./policy.d Oct 09 23:44:44 np0005479288.novalocal sudo[96893]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96893]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96896]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./manila Oct 09 23:44:44 np0005479288.novalocal sudo[96896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96896]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96899]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 09 23:44:44 np0005479288.novalocal sudo[96899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96899]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96902]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 09 23:44:44 np0005479288.novalocal sudo[96902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96902]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96905]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Oct 09 23:44:44 np0005479288.novalocal sudo[96905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96905]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96908]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./kill_scripts Oct 09 23:44:44 np0005479288.novalocal sudo[96908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96908]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96911]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Oct 09 23:44:44 np0005479288.novalocal sudo[96911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96911]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96914]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-vpn-agent Oct 09 23:44:44 np0005479288.novalocal sudo[96914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96914]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96917]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-metadata-agent Oct 09 23:44:44 np0005479288.novalocal sudo[96917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96917]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96920]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-netns-cleanup Oct 09 23:44:44 np0005479288.novalocal sudo[96920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96920]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96923]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovs-cleanup Oct 09 23:44:44 np0005479288.novalocal sudo[96923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96923]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96926]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-server Oct 09 23:44:44 np0005479288.novalocal sudo[96926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96926]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96929]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovn-agent Oct 09 23:44:44 np0005479288.novalocal sudo[96929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96929]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96932]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Oct 09 23:44:44 np0005479288.novalocal sudo[96932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96932]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96935]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-dhcp-agent Oct 09 23:44:44 np0005479288.novalocal sudo[96935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96935]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96938]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-l3-agent Oct 09 23:44:44 np0005479288.novalocal sudo[96938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96938]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96941]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-linuxbridge-cleanup Oct 09 23:44:44 np0005479288.novalocal sudo[96941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96941]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96944]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./plugins Oct 09 23:44:44 np0005479288.novalocal sudo[96944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96944]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96947]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./networking-ovn Oct 09 23:44:44 np0005479288.novalocal sudo[96947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96947]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96950]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./ml2 Oct 09 23:44:44 np0005479288.novalocal sudo[96950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96950]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96953]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 09 23:44:44 np0005479288.novalocal sudo[96953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96953]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96956]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 09 23:44:44 np0005479288.novalocal sudo[96956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96956]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96959]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./nova Oct 09 23:44:44 np0005479288.novalocal sudo[96959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:44 np0005479288.novalocal sudo[96959]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:44 np0005479288.novalocal sudo[96962]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 09 23:44:44 np0005479288.novalocal sudo[96962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[96962]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[96965]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 09 23:44:45 np0005479288.novalocal sudo[96965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[96965]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[96968]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Oct 09 23:44:45 np0005479288.novalocal sudo[96968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[96968]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[96971]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./certs Oct 09 23:44:45 np0005479288.novalocal sudo[96971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[96971]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[96974]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Oct 09 23:44:45 np0005479288.novalocal sudo[96974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[96974]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[96977]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-worker Oct 09 23:44:45 np0005479288.novalocal sudo[96977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[96977]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[96980]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-housekeeping Oct 09 23:44:45 np0005479288.novalocal sudo[96980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[96980]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[96983]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-api Oct 09 23:44:45 np0005479288.novalocal sudo[96983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[96983]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[96986]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-health-manager Oct 09 23:44:45 np0005479288.novalocal sudo[96986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[96986]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[96989]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-driver-agent Oct 09 23:44:45 np0005479288.novalocal sudo[96989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[96989]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[96992]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Oct 09 23:44:45 np0005479288.novalocal sudo[96992]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[96992]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[96995]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 09 23:44:45 np0005479288.novalocal sudo[96995]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[96995]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[96998]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 09 23:44:45 np0005479288.novalocal sudo[96998]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[96998]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[97001]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Oct 09 23:44:45 np0005479288.novalocal sudo[97001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[97001]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[97004]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./placement Oct 09 23:44:45 np0005479288.novalocal sudo[97004]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[97004]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[97007]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 09 23:44:45 np0005479288.novalocal sudo[97007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[97007]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[97010]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 09 23:44:45 np0005479288.novalocal sudo[97010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[97010]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[97013]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./tempest Oct 09 23:44:45 np0005479288.novalocal sudo[97013]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[97013]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[97016]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rsyslog.d Oct 09 23:44:45 np0005479288.novalocal sudo[97016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[97016]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[97019]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Oct 09 23:44:45 np0005479288.novalocal sudo[97019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[97019]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[97022]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 09 23:44:45 np0005479288.novalocal sudo[97022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[97022]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[97025]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 09 23:44:45 np0005479288.novalocal sudo[97025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[97025]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[97028]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./my.cnf.d Oct 09 23:44:45 np0005479288.novalocal sudo[97028]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[97028]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[97031]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./iscsi Oct 09 23:44:45 np0005479288.novalocal sudo[97031]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[97031]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:45 np0005479288.novalocal sudo[97034]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Oct 09 23:44:45 np0005479288.novalocal sudo[97034]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:45 np0005479288.novalocal sudo[97034]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97037]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./nwfilter Oct 09 23:44:46 np0005479288.novalocal sudo[97037]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97037]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97040]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./storage Oct 09 23:44:46 np0005479288.novalocal sudo[97040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97040]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97043]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/storage ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Oct 09 23:44:46 np0005479288.novalocal sudo[97043]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97043]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97046]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./secrets Oct 09 23:44:46 np0005479288.novalocal sudo[97046]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97046]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97049]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Oct 09 23:44:46 np0005479288.novalocal sudo[97049]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97049]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97052]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Oct 09 23:44:46 np0005479288.novalocal sudo[97052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97052]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97055]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./networks Oct 09 23:44:46 np0005479288.novalocal sudo[97055]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97055]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97058]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Oct 09 23:44:46 np0005479288.novalocal sudo[97058]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97058]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97061]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Oct 09 23:44:46 np0005479288.novalocal sudo[97061]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97061]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97064]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./httpd Oct 09 23:44:46 np0005479288.novalocal sudo[97064]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97064]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97067]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf Oct 09 23:44:46 np0005479288.novalocal sudo[97067]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97067]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97070]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Oct 09 23:44:46 np0005479288.novalocal sudo[97070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97070]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97073]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.modules.d Oct 09 23:44:46 np0005479288.novalocal sudo[97073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97073]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97076]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./redis Oct 09 23:44:46 np0005479288.novalocal sudo[97076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97076]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97079]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 09 23:44:46 np0005479288.novalocal sudo[97079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97079]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97082]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 09 23:44:46 np0005479288.novalocal sudo[97082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97082]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97085]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack-dashboard Oct 09 23:44:46 np0005479288.novalocal sudo[97085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97085]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97088]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./default_policies.txt Oct 09 23:44:46 np0005479288.novalocal sudo[97088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97088]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97091]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./enabled.txt Oct 09 23:44:46 np0005479288.novalocal sudo[97091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97091]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97094]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./local_settings.d.txt Oct 09 23:44:46 np0005479288.novalocal sudo[97094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97094]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97097]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./nova_policy.d.txt Oct 09 23:44:46 np0005479288.novalocal sudo[97097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97097]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97100]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./ssl.txt Oct 09 23:44:46 np0005479288.novalocal sudo[97100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97100]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97103]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 09 23:44:46 np0005479288.novalocal sudo[97103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97103]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97106]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./yum.repos.d Oct 09 23:44:46 np0005479288.novalocal sudo[97106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:46 np0005479288.novalocal sudo[97106]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:46 np0005479288.novalocal sudo[97109]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack Oct 09 23:44:47 np0005479288.novalocal sudo[97109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97109]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97112]: root : PWD=/var/log/weirdo-project/logs/etc/openstack ; USER=root ; COMMAND=/bin/chmod 755 ./puppet Oct 09 23:44:47 np0005479288.novalocal sudo[97112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97112]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97115]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Oct 09 23:44:47 np0005479288.novalocal sudo[97115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97115]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97118]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./glance Oct 09 23:44:47 np0005479288.novalocal sudo[97118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97118]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97121]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./horizon Oct 09 23:44:47 np0005479288.novalocal sudo[97121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97121]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97124]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Oct 09 23:44:47 np0005479288.novalocal sudo[97124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97124]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97127]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./manila Oct 09 23:44:47 np0005479288.novalocal sudo[97127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97127]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97130]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Oct 09 23:44:47 np0005479288.novalocal sudo[97130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97130]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97133]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./nova Oct 09 23:44:47 np0005479288.novalocal sudo[97133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97133]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97136]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Oct 09 23:44:47 np0005479288.novalocal sudo[97136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97136]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97139]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Oct 09 23:44:47 np0005479288.novalocal sudo[97139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97139]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97142]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./placement Oct 09 23:44:47 np0005479288.novalocal sudo[97142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97142]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97145]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Oct 09 23:44:47 np0005479288.novalocal sudo[97145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97145]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97148]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./mariadb Oct 09 23:44:47 np0005479288.novalocal sudo[97148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97148]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97151]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Oct 09 23:44:47 np0005479288.novalocal sudo[97151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97151]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97154]: root : PWD=/var/log/weirdo-project/logs/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Oct 09 23:44:47 np0005479288.novalocal sudo[97154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97154]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97157]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Oct 09 23:44:47 np0005479288.novalocal sudo[97157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97157]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97160]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./sudoers.d Oct 09 23:44:47 np0005479288.novalocal sudo[97160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97160]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97163]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./apache Oct 09 23:44:47 np0005479288.novalocal sudo[97163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97163]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97166]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./redis Oct 09 23:44:47 np0005479288.novalocal sudo[97166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97166]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97169]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cron Oct 09 23:44:47 np0005479288.novalocal sudo[97169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97169]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97172]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./dnf Oct 09 23:44:47 np0005479288.novalocal sudo[97172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97172]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97175]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openstack_resources Oct 09 23:44:47 np0005479288.novalocal sudo[97175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97175]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[96830]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97178]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type f -execdir sudo chmod 644 {} ; Oct 09 23:44:47 np0005479288.novalocal sudo[97178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97181]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20251009_232817.log Oct 09 23:44:47 np0005479288.novalocal sudo[97181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97181]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:47 np0005479288.novalocal sudo[97184]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20251009_233110.log Oct 09 23:44:47 np0005479288.novalocal sudo[97184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:47 np0005479288.novalocal sudo[97184]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97187]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-eth0 Oct 09 23:44:48 np0005479288.novalocal sudo[97187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97187]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97190]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./readme-ifcfg-rh.txt Oct 09 23:44:48 np0005479288.novalocal sudo[97190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97190]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97193]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-loop1 Oct 09 23:44:48 np0005479288.novalocal sudo[97193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97193]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97196]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-br-ex Oct 09 23:44:48 np0005479288.novalocal sudo[97196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97196]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97199]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-lo Oct 09 23:44:48 np0005479288.novalocal sudo[97199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97199]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97202]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown Oct 09 23:44:48 np0005479288.novalocal sudo[97202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97202]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97205]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-eth Oct 09 23:44:48 np0005479288.novalocal sudo[97205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97205]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97208]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ipv6 Oct 09 23:44:48 np0005479288.novalocal sudo[97208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97208]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97211]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ovs Oct 09 23:44:48 np0005479288.novalocal sudo[97211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97211]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97214]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-post Oct 09 23:44:48 np0005479288.novalocal sudo[97214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97214]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97217]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-routes Oct 09 23:44:48 np0005479288.novalocal sudo[97217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97217]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97220]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-tunnel Oct 09 23:44:48 np0005479288.novalocal sudo[97220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97220]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97223]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup Oct 09 23:44:48 np0005479288.novalocal sudo[97223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97223]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97226]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-aliases Oct 09 23:44:48 np0005479288.novalocal sudo[97226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97226]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97229]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-eth Oct 09 23:44:48 np0005479288.novalocal sudo[97229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97229]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97233]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ipv6 Oct 09 23:44:48 np0005479288.novalocal sudo[97233]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97231]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 09 23:44:48 np0005479288.novalocal sudo[97233]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal systemd[1]: Started Session c301 of User root. Oct 09 23:44:48 np0005479288.novalocal sudo[97231]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:44:48 np0005479288.novalocal sudo[97237]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ovs Oct 09 23:44:48 np0005479288.novalocal sudo[97237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97237]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97241]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-post Oct 09 23:44:48 np0005479288.novalocal sudo[97241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97241]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97244]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-routes Oct 09 23:44:48 np0005479288.novalocal sudo[97244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97244]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97247]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-tunnel Oct 09 23:44:48 np0005479288.novalocal sudo[97247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97247]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97250]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./init.ipv6-global Oct 09 23:44:48 np0005479288.novalocal sudo[97250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97250]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97253]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions Oct 09 23:44:48 np0005479288.novalocal sudo[97253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97253]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97256]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions-ipv6 Oct 09 23:44:48 np0005479288.novalocal sudo[97256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97256]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97259]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-guests Oct 09 23:44:48 np0005479288.novalocal sudo[97259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97259]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97262]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd Oct 09 23:44:48 np0005479288.novalocal sudo[97262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97262]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97266]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller Oct 09 23:44:48 np0005479288.novalocal sudo[97266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97266]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97269]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005479288.novalocal.pem Oct 09 23:44:48 np0005479288.novalocal sudo[97269]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97269]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97272]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Oct 09 23:44:48 np0005479288.novalocal sudo[97272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal sudo[97272]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97275]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.conf Oct 09 23:44:48 np0005479288.novalocal sudo[97231]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97275]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:48 np0005479288.novalocal systemd[1]: session-c301.scope: Deactivated successfully. Oct 09 23:44:48 np0005479288.novalocal sudo[97275]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:48 np0005479288.novalocal sudo[97278]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./resource_filters.json Oct 09 23:44:49 np0005479288.novalocal sudo[97278]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97278]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97279]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:44:49 np0005479288.novalocal systemd[1]: Started Session c302 of User root. Oct 09 23:44:49 np0005479288.novalocal sudo[97279]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:44:49 np0005479288.novalocal sudo[97283]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Oct 09 23:44:49 np0005479288.novalocal sudo[97283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97283]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97287]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 09 23:44:49 np0005479288.novalocal sudo[97287]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97287]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97290]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api-paste.ini Oct 09 23:44:49 np0005479288.novalocal sudo[97290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97290]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97293]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api.conf Oct 09 23:44:49 np0005479288.novalocal sudo[97293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97293]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97296]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-cache.conf Oct 09 23:44:49 np0005479288.novalocal sudo[97296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97296]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97299]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-image-import.conf Oct 09 23:44:49 np0005479288.novalocal sudo[97299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97299]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97302]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-scrubber.conf Oct 09 23:44:49 np0005479288.novalocal sudo[97302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97302]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97305]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-swift.conf Oct 09 23:44:49 np0005479288.novalocal sudo[97305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97305]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97309]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Oct 09 23:44:49 np0005479288.novalocal sudo[97309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97309]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97312]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./schema-image.json Oct 09 23:44:49 np0005479288.novalocal sudo[97279]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal systemd[1]: session-c302.scope: Deactivated successfully. Oct 09 23:44:49 np0005479288.novalocal sudo[97312]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97316]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 09 23:44:49 np0005479288.novalocal sudo[97316]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97316]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97315]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 09 23:44:49 np0005479288.novalocal systemd[1]: Started Session c303 of User root. Oct 09 23:44:49 np0005479288.novalocal sudo[97319]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-processor-allocation-setting-data.json Oct 09 23:44:49 np0005479288.novalocal sudo[97315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:44:49 np0005479288.novalocal sudo[97319]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97319]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97324]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-resource-allocation-setting-data.json Oct 09 23:44:49 np0005479288.novalocal sudo[97324]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97324]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97327]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-storage-allocation-setting-data.json Oct 09 23:44:49 np0005479288.novalocal sudo[97327]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97327]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97330]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-virtual-system-setting-data.json Oct 09 23:44:49 np0005479288.novalocal sudo[97330]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97330]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97333]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-disk-filter.json Oct 09 23:44:49 np0005479288.novalocal sudo[97333]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97333]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97336]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-iops-filter.json Oct 09 23:44:49 np0005479288.novalocal sudo[97336]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97336]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97339]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-num-instances.json Oct 09 23:44:49 np0005479288.novalocal sudo[97339]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97339]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97343]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-mode.json Oct 09 23:44:49 np0005479288.novalocal sudo[97343]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97343]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97346]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-pinning.json Oct 09 23:44:49 np0005479288.novalocal sudo[97346]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97346]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97315]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal systemd[1]: session-c303.scope: Deactivated successfully. Oct 09 23:44:49 np0005479288.novalocal sudo[97349]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-memory-backing.json Oct 09 23:44:49 np0005479288.novalocal sudo[97349]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97349]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97350]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 09 23:44:49 np0005479288.novalocal sudo[97353]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-shutdown.json Oct 09 23:44:49 np0005479288.novalocal systemd[1]: Started Session c304 of User root. Oct 09 23:44:49 np0005479288.novalocal sudo[97350]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 09 23:44:49 np0005479288.novalocal sudo[97353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97353]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97358]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-host-capabilities.json Oct 09 23:44:49 np0005479288.novalocal sudo[97358]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97358]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:49 np0005479288.novalocal sudo[97361]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-hypervisor.json Oct 09 23:44:49 np0005479288.novalocal sudo[97361]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:49 np0005479288.novalocal sudo[97361]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97364]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-instance-data.json Oct 09 23:44:50 np0005479288.novalocal sudo[97364]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97364]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97367]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt-image.json Oct 09 23:44:50 np0005479288.novalocal sudo[97367]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97367]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97370]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt.json Oct 09 23:44:50 np0005479288.novalocal sudo[97370]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97370]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97374]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-quota.json Oct 09 23:44:50 np0005479288.novalocal sudo[97374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97374]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97377]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-randomgen.json Oct 09 23:44:50 np0005479288.novalocal sudo[97377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97377]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97350]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97380]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vcputopology.json Oct 09 23:44:50 np0005479288.novalocal systemd[1]: session-c304.scope: Deactivated successfully. Oct 09 23:44:50 np0005479288.novalocal sudo[97380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97380]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97383]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-flavor.json Oct 09 23:44:50 np0005479288.novalocal sudo[97383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97383]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97386]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-quota-flavor.json Oct 09 23:44:50 np0005479288.novalocal sudo[97386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97386]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97389]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware.json Oct 09 23:44:50 np0005479288.novalocal sudo[97389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97389]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97392]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm-hw.json Oct 09 23:44:50 np0005479288.novalocal sudo[97392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97392]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97395]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm.json Oct 09 23:44:50 np0005479288.novalocal sudo[97395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97395]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97398]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-watchdog.json Oct 09 23:44:50 np0005479288.novalocal sudo[97398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97398]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97401]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-xenapi.json Oct 09 23:44:50 np0005479288.novalocal sudo[97401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97401]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97404]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./glance-common-image-props.json Oct 09 23:44:50 np0005479288.novalocal sudo[97404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97404]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97407]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./image-signature-verification.json Oct 09 23:44:50 np0005479288.novalocal sudo[97407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97407]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97410]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./operating-system.json Oct 09 23:44:50 np0005479288.novalocal sudo[97410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97410]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97413]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-databases.json Oct 09 23:44:50 np0005479288.novalocal sudo[97413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97413]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97416]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-runtimes.json Oct 09 23:44:50 np0005479288.novalocal sudo[97416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97416]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97419]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-webservers.json Oct 09 23:44:50 np0005479288.novalocal sudo[97419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97419]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97422]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./storage-volume-type.json Oct 09 23:44:50 np0005479288.novalocal sudo[97422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97422]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97425]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005479288.novalocal.pem Oct 09 23:44:50 np0005479288.novalocal sudo[97425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97425]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97428]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Oct 09 23:44:50 np0005479288.novalocal sudo[97428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97428]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97431]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./2 Oct 09 23:44:50 np0005479288.novalocal sudo[97431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97431]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97434]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Oct 09 23:44:50 np0005479288.novalocal sudo[97434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97434]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97437]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Oct 09 23:44:50 np0005479288.novalocal sudo[97437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:50 np0005479288.novalocal sudo[97437]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:50 np0005479288.novalocal sudo[97440]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Oct 09 23:44:51 np0005479288.novalocal sudo[97440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97440]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97443]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005479288.novalocal.pem Oct 09 23:44:51 np0005479288.novalocal sudo[97443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97443]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97446]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./default_catalog.templates Oct 09 23:44:51 np0005479288.novalocal sudo[97446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97446]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97449]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.conf Oct 09 23:44:51 np0005479288.novalocal sudo[97449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97449]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97453]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf Oct 09 23:44:51 np0005479288.novalocal sudo[97453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97453]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97456]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./sso_callback_template.html Oct 09 23:44:51 np0005479288.novalocal sudo[97456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97456]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97459]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 09 23:44:51 np0005479288.novalocal sudo[97459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97459]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97462]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005479288.novalocal.pem Oct 09 23:44:51 np0005479288.novalocal sudo[97462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97462]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97465]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Oct 09 23:44:51 np0005479288.novalocal sudo[97465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97465]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97468]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila.conf Oct 09 23:44:51 np0005479288.novalocal sudo[97468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97468]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97471]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Oct 09 23:44:51 np0005479288.novalocal sudo[97471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97471]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97476]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 09 23:44:51 np0005479288.novalocal sudo[97476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97476]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97479]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.conf Oct 09 23:44:51 np0005479288.novalocal sudo[97479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97479]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97482]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Oct 09 23:44:51 np0005479288.novalocal sudo[97482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97482]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97485]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Oct 09 23:44:51 np0005479288.novalocal sudo[97485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97485]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97488]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./dhcp_agent.ini Oct 09 23:44:51 np0005479288.novalocal sudo[97488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97488]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97491]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./l3_agent.ini Oct 09 23:44:51 np0005479288.novalocal sudo[97491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97491]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97494]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./metadata_agent.ini Oct 09 23:44:51 np0005479288.novalocal sudo[97494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97494]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97497]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_vpn_agent.ini Oct 09 23:44:51 np0005479288.novalocal sudo[97497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97497]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97500]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_vpnaas.conf Oct 09 23:44:51 np0005479288.novalocal sudo[97500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97500]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97503]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./vpn_agent.ini Oct 09 23:44:51 np0005479288.novalocal sudo[97503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97503]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97506]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Oct 09 23:44:51 np0005479288.novalocal sudo[97506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97506]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97509]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Oct 09 23:44:51 np0005479288.novalocal sudo[97509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97509]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97512]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Oct 09 23:44:51 np0005479288.novalocal sudo[97512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97512]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97515]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Oct 09 23:44:51 np0005479288.novalocal sudo[97515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97515]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97518]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Oct 09 23:44:51 np0005479288.novalocal sudo[97518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97518]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97521]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 09 23:44:51 np0005479288.novalocal sudo[97521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97521]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:51 np0005479288.novalocal sudo[97524]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./README Oct 09 23:44:51 np0005479288.novalocal sudo[97524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:51 np0005479288.novalocal sudo[97524]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97527]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ml2_conf.ini Oct 09 23:44:52 np0005479288.novalocal sudo[97527]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97527]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97530]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_agent.ini Oct 09 23:44:52 np0005479288.novalocal sudo[97530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97530]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97533]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./sriov_agent.ini Oct 09 23:44:52 np0005479288.novalocal sudo[97533]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97533]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97536]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005479288.novalocal.pem Oct 09 23:44:52 np0005479288.novalocal sudo[97536]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97536]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97539]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Oct 09 23:44:52 np0005479288.novalocal sudo[97539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97539]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97542]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova.conf Oct 09 23:44:52 np0005479288.novalocal sudo[97542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97542]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97545]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./release Oct 09 23:44:52 np0005479288.novalocal sudo[97545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97545]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97548]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Oct 09 23:44:52 np0005479288.novalocal sudo[97548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97548]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97551]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 09 23:44:52 np0005479288.novalocal sudo[97551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97551]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97554]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.conf Oct 09 23:44:52 np0005479288.novalocal sudo[97554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97554]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97557]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005479288.novalocal.pem Oct 09 23:44:52 np0005479288.novalocal sudo[97557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97557]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97560]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.conf Oct 09 23:44:52 np0005479288.novalocal sudo[97560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97560]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97563]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 09 23:44:52 np0005479288.novalocal sudo[97563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97563]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97566]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Oct 09 23:44:52 np0005479288.novalocal sudo[97566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97566]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97569]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Oct 09 23:44:52 np0005479288.novalocal sudo[97569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97569]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97572]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Oct 09 23:44:52 np0005479288.novalocal sudo[97572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97572]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97575]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Oct 09 23:44:52 np0005479288.novalocal sudo[97575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97575]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97578]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Oct 09 23:44:52 np0005479288.novalocal sudo[97578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97578]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97581]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.cert.pem Oct 09 23:44:52 np0005479288.novalocal sudo[97581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97581]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97584]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.key.pem Oct 09 23:44:52 np0005479288.novalocal sudo[97584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97584]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97587]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client_ca.cert.pem Oct 09 23:44:52 np0005479288.novalocal sudo[97587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97587]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97590]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client.cert-and-key.pem Oct 09 23:44:52 np0005479288.novalocal sudo[97590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97590]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97593]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005479288.novalocal.pem Oct 09 23:44:52 np0005479288.novalocal sudo[97593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97593]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97596]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005479288.novalocal.pem Oct 09 23:44:52 np0005479288.novalocal sudo[97596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97596]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97599]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.conf Oct 09 23:44:52 np0005479288.novalocal sudo[97599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97599]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97602]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 09 23:44:52 np0005479288.novalocal sudo[97602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97602]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97605]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./accounts.yaml.sample Oct 09 23:44:52 np0005479288.novalocal sudo[97605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97605]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:52 np0005479288.novalocal sudo[97608]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./allow-list.yaml Oct 09 23:44:52 np0005479288.novalocal sudo[97608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:52 np0005479288.novalocal sudo[97608]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97611]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf.sample Oct 09 23:44:53 np0005479288.novalocal sudo[97611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97611]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97614]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./rbac-persona-accounts.yaml.sample Oct 09 23:44:53 np0005479288.novalocal sudo[97614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97614]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97617]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf Oct 09 23:44:53 np0005479288.novalocal sudo[97617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97617]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97620]: root : PWD=/var/log/weirdo-project/logs/etc/rsyslog.d ; USER=root ; COMMAND=/bin/chmod 644 ./21-cloudinit.conf Oct 09 23:44:53 np0005479288.novalocal sudo[97620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97620]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97623]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyslog.conf Oct 09 23:44:53 np0005479288.novalocal sudo[97623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97623]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97626]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.config Oct 09 23:44:53 np0005479288.novalocal sudo[97626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97626]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97629]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq-env.conf Oct 09 23:44:53 np0005479288.novalocal sudo[97629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97629]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97632]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./inetrc Oct 09 23:44:53 np0005479288.novalocal sudo[97632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97632]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97635]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmqadmin.conf Oct 09 23:44:53 np0005479288.novalocal sudo[97635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97635]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97638]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./enabled_plugins Oct 09 23:44:53 np0005479288.novalocal sudo[97638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97638]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97641]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.conf Oct 09 23:44:53 np0005479288.novalocal sudo[97641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97641]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97644]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005479288.novalocal.pem Oct 09 23:44:53 np0005479288.novalocal sudo[97644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97644]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97647]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./my.cnf Oct 09 23:44:53 np0005479288.novalocal sudo[97647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97647]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97650]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_gssapi.cnf Oct 09 23:44:53 np0005479288.novalocal sudo[97650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97650]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97653]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mysql-clients.cnf Oct 09 23:44:53 np0005479288.novalocal sudo[97653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97653]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97656]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./enable_encryption.preset Oct 09 23:44:53 np0005479288.novalocal sudo[97656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97656]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97659]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb-server.cnf Oct 09 23:44:53 np0005479288.novalocal sudo[97659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97659]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97662]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./spider.cnf Oct 09 23:44:53 np0005479288.novalocal sudo[97662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97662]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97665]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./server.cnf Oct 09 23:44:53 np0005479288.novalocal sudo[97665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97665]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97668]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./client.cnf Oct 09 23:44:53 np0005479288.novalocal sudo[97668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97668]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97671]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./np0005479288.novalocal.pem Oct 09 23:44:53 np0005479288.novalocal sudo[97671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97671]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97674]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./iscsid.conf Oct 09 23:44:53 np0005479288.novalocal sudo[97674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97674]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97677]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./initiatorname.iscsi Oct 09 23:44:53 np0005479288.novalocal sudo[97677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97677]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97680]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 644 ./default.xml Oct 09 23:44:53 np0005479288.novalocal sudo[97680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:53 np0005479288.novalocal sudo[97680]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:53 np0005479288.novalocal sudo[97683]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-admin.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97683]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97686]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97686]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97689]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlockd.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97689]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97689]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97692]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlogd.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97692]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97692]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97695]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtproxyd.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97695]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97695]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97698]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtstoraged.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97698]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97698]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97701]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirtd.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97701]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97701]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97704]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtinterfaced.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97704]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97704]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97707]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./network.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97707]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97707]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97710]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnetworkd.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97710]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97713]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnodedevd.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97713]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97716]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnwfilterd.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97716]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97716]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97719]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-lockd.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97719]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97719]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97722]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97722]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97722]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97725]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtqemud.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97725]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97725]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97728]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtsecretd.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97728]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97728]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97731]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Oct 09 23:44:54 np0005479288.novalocal sudo[97731]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97731]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97734]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Oct 09 23:44:54 np0005479288.novalocal sudo[97734]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97734]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97737]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-privkey.pem Oct 09 23:44:54 np0005479288.novalocal sudo[97737]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97737]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97740]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./default.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97740]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97740]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97743]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./.conf.db.~lock~ Oct 09 23:44:54 np0005479288.novalocal sudo[97743]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97743]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97746]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./conf.db Oct 09 23:44:54 np0005479288.novalocal sudo[97746]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97746]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97749]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./system-id.conf Oct 09 23:44:54 np0005479288.novalocal sudo[97749]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97749]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97752]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-req.pem Oct 09 23:44:54 np0005479288.novalocal sudo[97752]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97752]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97755]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Oct 09 23:44:54 np0005479288.novalocal sudo[97755]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97755]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:54 np0005479288.novalocal sudo[97758]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-req.pem Oct 09 23:44:54 np0005479288.novalocal sudo[97758]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:54 np0005479288.novalocal sudo[97758]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97761]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Oct 09 23:44:55 np0005479288.novalocal sudo[97761]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97761]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97764]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-req.pem Oct 09 23:44:55 np0005479288.novalocal sudo[97764]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97764]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97767]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-cert.pem Oct 09 23:44:55 np0005479288.novalocal sudo[97767]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97767]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97770]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./httpd.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97770]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97770]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97773]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./magic Oct 09 23:44:55 np0005479288.novalocal sudo[97773]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97773]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97776]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./ports.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97776]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97776]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97779]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-cinder_wsgi.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97779]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97779]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97782]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-glance_wsgi.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97782]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97782]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97785]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-keystone_wsgi.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97785]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97785]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97788]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-manila_wsgi.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97788]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97788]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97791]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_api_wsgi.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97791]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97791]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97794]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_metadata_wsgi.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97794]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97794]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97797]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-octavia_wsgi.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97797]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97797]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97800]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-placement_wsgi.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97800]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97800]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97803]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_ssl_vhost.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97803]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97803]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97806]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_vhost.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97806]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97806]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97809]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./openstack-dashboard.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97809]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97809]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97812]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97812]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97812]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97815]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.load Oct 09 23:44:55 np0005479288.novalocal sudo[97815]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97815]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97818]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_core.load Oct 09 23:44:55 np0005479288.novalocal sudo[97818]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97818]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97821]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_host.load Oct 09 23:44:55 np0005479288.novalocal sudo[97821]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97821]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97824]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./filter.load Oct 09 23:44:55 np0005479288.novalocal sudo[97824]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97824]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97827]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./log_config.load Oct 09 23:44:55 np0005479288.novalocal sudo[97827]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97827]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97830]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97830]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97830]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97833]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.load Oct 09 23:44:55 np0005479288.novalocal sudo[97833]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97833]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97836]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97836]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97836]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97839]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.load Oct 09 23:44:55 np0005479288.novalocal sudo[97839]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97839]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97842]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.conf Oct 09 23:44:55 np0005479288.novalocal sudo[97842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97842]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:55 np0005479288.novalocal sudo[97845]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.load Oct 09 23:44:55 np0005479288.novalocal sudo[97845]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:55 np0005479288.novalocal sudo[97845]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97848]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./socache_shmcb.load Oct 09 23:44:56 np0005479288.novalocal sudo[97848]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97848]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97851]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.conf Oct 09 23:44:56 np0005479288.novalocal sudo[97851]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97851]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97854]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.load Oct 09 23:44:56 np0005479288.novalocal sudo[97854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97854]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97857]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./systemd.load Oct 09 23:44:56 np0005479288.novalocal sudo[97857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97857]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97860]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./unixd.load Oct 09 23:44:56 np0005479288.novalocal sudo[97860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97860]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97863]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.conf Oct 09 23:44:56 np0005479288.novalocal sudo[97863]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97863]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97866]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.load Oct 09 23:44:56 np0005479288.novalocal sudo[97866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97866]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97869]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf.puppet Oct 09 23:44:56 np0005479288.novalocal sudo[97869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97869]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97872]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf Oct 09 23:44:56 np0005479288.novalocal sudo[97872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97872]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97875]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf.puppet Oct 09 23:44:56 np0005479288.novalocal sudo[97875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97875]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97878]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf Oct 09 23:44:56 np0005479288.novalocal sudo[97878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97878]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97881]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005479288.novalocal.pem Oct 09 23:44:56 np0005479288.novalocal sudo[97881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97881]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97884]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./.secret_key_store Oct 09 23:44:56 np0005479288.novalocal sudo[97884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97884]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97887]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_policy.yaml.txt Oct 09 23:44:56 np0005479288.novalocal sudo[97887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97887]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97890]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./README.txt Oct 09 23:44:56 np0005479288.novalocal sudo[97890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97890]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97893]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.yaml Oct 09 23:44:56 np0005479288.novalocal sudo[97893]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97893]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97896]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./glance.yaml Oct 09 23:44:56 np0005479288.novalocal sudo[97896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97896]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97899]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.yaml Oct 09 23:44:56 np0005479288.novalocal sudo[97899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97899]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97902]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.yaml Oct 09 23:44:56 np0005479288.novalocal sudo[97902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97902]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97905]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./nova.yaml Oct 09 23:44:56 np0005479288.novalocal sudo[97905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97905]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97908]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./manila.yaml Oct 09 23:44:56 np0005479288.novalocal sudo[97908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97908]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97911]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./glance_policy.yaml.txt Oct 09 23:44:56 np0005479288.novalocal sudo[97911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97911]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97914]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_policy.yaml.txt Oct 09 23:44:56 np0005479288.novalocal sudo[97914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97914]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97917]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./local_settings.txt Oct 09 23:44:56 np0005479288.novalocal sudo[97917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97917]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97920]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_10_set_custom_theme.py.example Oct 09 23:44:56 np0005479288.novalocal sudo[97920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97920]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97923]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_11_toggle_angular_features.py.example Oct 09 23:44:56 np0005479288.novalocal sudo[97923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97923]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97926]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_2010_integration_tests_deprecated.py.example Oct 09 23:44:56 np0005479288.novalocal sudo[97926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97926]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97929]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_20_integration_tests_scaffolds.py.example Oct 09 23:44:56 np0005479288.novalocal sudo[97929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97929]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:56 np0005479288.novalocal sudo[97932]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_9030_profiler_settings.py.example Oct 09 23:44:56 np0005479288.novalocal sudo[97932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:56 np0005479288.novalocal sudo[97932]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97935]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_90_manila_shares.py Oct 09 23:44:57 np0005479288.novalocal sudo[97935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97935]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97938]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./manila_policy.yaml.txt Oct 09 23:44:57 np0005479288.novalocal sudo[97938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97938]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97941]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_policy.yaml.txt Oct 09 23:44:57 np0005479288.novalocal sudo[97941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97941]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97944]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./api-extensions.yaml Oct 09 23:44:57 np0005479288.novalocal sudo[97944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97944]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97947]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./nova_policy.yaml.txt Oct 09 23:44:57 np0005479288.novalocal sudo[97947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97947]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97950]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005479288.novalocal.pem Oct 09 23:44:57 np0005479288.novalocal sudo[97950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97950]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97953]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyncd.conf Oct 09 23:44:57 np0005479288.novalocal sudo[97953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97953]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97956]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos.repo Oct 09 23:44:57 np0005479288.novalocal sudo[97956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97956]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97959]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean-deps.repo Oct 09 23:44:57 np0005479288.novalocal sudo[97959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97959]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97962]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean.repo Oct 09 23:44:57 np0005479288.novalocal sudo[97962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97962]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97965]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./redhat.repo Oct 09 23:44:57 np0005479288.novalocal sudo[97965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97965]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97968]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos-addons.repo Oct 09 23:44:57 np0005479288.novalocal sudo[97968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97968]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97971]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./passwd Oct 09 23:44:57 np0005479288.novalocal sudo[97971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97971]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97974]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./group Oct 09 23:44:57 np0005479288.novalocal sudo[97974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97974]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97977]: root : PWD=/var/log/weirdo-project/logs/etc/openstack/puppet ; USER=root ; COMMAND=/bin/chmod 644 ./admin-clouds.yaml Oct 09 23:44:57 np0005479288.novalocal sudo[97977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97977]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97980]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./fstab Oct 09 23:44:57 np0005479288.novalocal sudo[97980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97980]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97983]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-manage.log Oct 09 23:44:57 np0005479288.novalocal sudo[97983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97983]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97986]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Oct 09 23:44:57 np0005479288.novalocal sudo[97986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97986]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97989]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-api.log Oct 09 23:44:57 np0005479288.novalocal sudo[97989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97989]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97992]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./volume.log Oct 09 23:44:57 np0005479288.novalocal sudo[97992]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97992]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97995]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./backup.log Oct 09 23:44:57 np0005479288.novalocal sudo[97995]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97995]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[97998]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./cache.log Oct 09 23:44:57 np0005479288.novalocal sudo[97998]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[97998]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[98001]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./api.log Oct 09 23:44:57 np0005479288.novalocal sudo[98001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[98001]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[98004]: root : PWD=/var/log/weirdo-project/logs/horizon ; USER=root ; COMMAND=/bin/chmod 644 ./horizon.log Oct 09 23:44:57 np0005479288.novalocal sudo[98004]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[98004]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:57 np0005479288.novalocal sudo[98007]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.log Oct 09 23:44:57 np0005479288.novalocal sudo[98007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:57 np0005479288.novalocal sudo[98007]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98010]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone-manage.log Oct 09 23:44:58 np0005479288.novalocal sudo[98010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98010]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98013]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-manage.log Oct 09 23:44:58 np0005479288.novalocal sudo[98013]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98013]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98016]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Oct 09 23:44:58 np0005479288.novalocal sudo[98016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98016]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98019]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./share.log Oct 09 23:44:58 np0005479288.novalocal sudo[98019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98019]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98022]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Oct 09 23:44:58 np0005479288.novalocal sudo[98022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98022]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98025]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./data.log Oct 09 23:44:58 np0005479288.novalocal sudo[98025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98025]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98028]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-api.log Oct 09 23:44:58 np0005479288.novalocal sudo[98028]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98028]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98031]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./server.log Oct 09 23:44:58 np0005479288.novalocal sudo[98031]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98031]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98034]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron-ovn-agent.log Oct 09 23:44:58 np0005479288.novalocal sudo[98034]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98034]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98037]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-vpn-agent.log Oct 09 23:44:58 np0005479288.novalocal sudo[98037]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98037]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98040]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Oct 09 23:44:58 np0005479288.novalocal sudo[98040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98040]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98043]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-manage.log Oct 09 23:44:58 np0005479288.novalocal sudo[98043]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98043]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98046]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-novncproxy.log Oct 09 23:44:58 np0005479288.novalocal sudo[98046]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98046]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98049]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-conductor.log Oct 09 23:44:58 np0005479288.novalocal sudo[98049]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98049]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98052]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.log Oct 09 23:44:58 np0005479288.novalocal sudo[98052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98052]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98055]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-scheduler.log Oct 09 23:44:58 np0005479288.novalocal sudo[98055]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98055]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98058]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-api.log Oct 09 23:44:58 np0005479288.novalocal sudo[98058]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98058]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98061]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Oct 09 23:44:58 np0005479288.novalocal sudo[98061]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98061]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98064]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-metadata-api.log Oct 09 23:44:58 np0005479288.novalocal sudo[98064]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98064]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98067]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./housekeeping.log Oct 09 23:44:58 np0005479288.novalocal sudo[98067]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98067]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98070]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./driver-agent.log Oct 09 23:44:58 np0005479288.novalocal sudo[98070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98070]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98073]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./worker.log Oct 09 23:44:58 np0005479288.novalocal sudo[98073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98073]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98076]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./app.log Oct 09 23:44:58 np0005479288.novalocal sudo[98076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98076]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98079]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./health-manager.log Oct 09 23:44:58 np0005479288.novalocal sudo[98079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98079]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98082]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller.log Oct 09 23:44:58 np0005479288.novalocal sudo[98082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98082]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98085]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-nb.log Oct 09 23:44:58 np0005479288.novalocal sudo[98085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:58 np0005479288.novalocal sudo[98085]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:58 np0005479288.novalocal sudo[98088]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-sb.log Oct 09 23:44:58 np0005479288.novalocal sudo[98088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98088]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98091]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd.log Oct 09 23:44:59 np0005479288.novalocal sudo[98091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98091]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98094]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Oct 09 23:44:59 np0005479288.novalocal sudo[98094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98094]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98097]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-connection.txt Oct 09 23:44:59 np0005479288.novalocal sudo[98097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98097]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98100]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-ssl.txt Oct 09 23:44:59 np0005479288.novalocal sudo[98100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98100]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98103]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Oct 09 23:44:59 np0005479288.novalocal sudo[98103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98103]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98106]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-connection.txt Oct 09 23:44:59 np0005479288.novalocal sudo[98106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98106]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98109]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-ssl.txt Oct 09 23:44:59 np0005479288.novalocal sudo[98109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98109]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98112]: root : PWD=/var/log/weirdo-project/logs/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.log Oct 09 23:44:59 np0005479288.novalocal sudo[98112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98112]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98115]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.conf Oct 09 23:44:59 np0005479288.novalocal sudo[98115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98115]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98118]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./syslog.txt Oct 09 23:44:59 np0005479288.novalocal sudo[98118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98118]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98121]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6.log Oct 09 23:44:59 np0005479288.novalocal sudo[98121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98121]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98124]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6_upgrade.log Oct 09 23:44:59 np0005479288.novalocal sudo[98124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98124]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98127]: root : PWD=/var/log/weirdo-project/logs/mariadb ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb.log Oct 09 23:44:59 np0005479288.novalocal sudo[98127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98127]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98130]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.log Oct 09 23:44:59 np0005479288.novalocal sudo[98130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98130]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98133]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testrepository.subunit Oct 09 23:44:59 np0005479288.novalocal sudo[98133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98133]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98136]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testr_results.html Oct 09 23:44:59 np0005479288.novalocal sudo[98136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98136]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98139]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./dstat.log Oct 09 23:44:59 np0005479288.novalocal sudo[98139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98139]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98142]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iostat.log Oct 09 23:44:59 np0005479288.novalocal sudo[98142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98142]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98145]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iotop.log Oct 09 23:44:59 np0005479288.novalocal sudo[98145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98145]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98148]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000001.log Oct 09 23:44:59 np0005479288.novalocal sudo[98148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98148]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98151]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000002.log Oct 09 23:44:59 np0005479288.novalocal sudo[98151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98151]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98154]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000003.log Oct 09 23:44:59 np0005479288.novalocal sudo[98154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98154]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98157]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000004.log Oct 09 23:44:59 np0005479288.novalocal sudo[98157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98157]: pam_unix(sudo:session): session closed for user root Oct 09 23:44:59 np0005479288.novalocal sudo[98160]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000005.log Oct 09 23:44:59 np0005479288.novalocal sudo[98160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:44:59 np0005479288.novalocal sudo[98160]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal systemd[1]: Starting system activity accounting tool... Oct 09 23:45:00 np0005479288.novalocal sudo[98163]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000006.log Oct 09 23:45:00 np0005479288.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 09 23:45:00 np0005479288.novalocal systemd[1]: Finished system activity accounting tool. Oct 09 23:45:00 np0005479288.novalocal sudo[98163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98163]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98167]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000007.log Oct 09 23:45:00 np0005479288.novalocal sudo[98167]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98167]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98170]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000008.log Oct 09 23:45:00 np0005479288.novalocal sudo[98170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98170]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98173]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000009.log Oct 09 23:45:00 np0005479288.novalocal sudo[98173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98173]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98176]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-0000000a.log Oct 09 23:45:00 np0005479288.novalocal sudo[98176]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98176]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98179]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./virsh-net-list.txt Oct 09 23:45:00 np0005479288.novalocal sudo[98179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98179]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98182]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-pki.log Oct 09 23:45:00 np0005479288.novalocal sudo[98182]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98182]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98185]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server.log Oct 09 23:45:00 np0005479288.novalocal sudo[98185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98185]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98188]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vswitchd.log Oct 09 23:45:00 np0005479288.novalocal sudo[98188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98188]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98191]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./zuul Oct 09 23:45:00 np0005479288.novalocal sudo[98191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98191]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98194]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./90-cloud-init-users Oct 09 23:45:00 np0005479288.novalocal sudo[98194]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98194]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98197]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./glance Oct 09 23:45:00 np0005479288.novalocal sudo[98197]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98197]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98200]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./neutron Oct 09 23:45:00 np0005479288.novalocal sudo[98200]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98200]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98203]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./nova Oct 09 23:45:00 np0005479288.novalocal sudo[98203]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98203]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98206]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Oct 09 23:45:00 np0005479288.novalocal sudo[98206]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98206]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98209]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./manila Oct 09 23:45:00 np0005479288.novalocal sudo[98209]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98209]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98212]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./sudoers.txt Oct 09 23:45:00 np0005479288.novalocal sudo[98212]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98212]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98215]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./error_log Oct 09 23:45:00 np0005479288.novalocal sudo[98215]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98215]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98218]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_error.log Oct 09 23:45:00 np0005479288.novalocal sudo[98218]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98218]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98221]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_error.log Oct 09 23:45:00 np0005479288.novalocal sudo[98221]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98221]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98224]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_error_ssl.log Oct 09 23:45:00 np0005479288.novalocal sudo[98224]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98224]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98227]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_error_ssl.log Oct 09 23:45:00 np0005479288.novalocal sudo[98227]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98227]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98230]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_error_ssl.log Oct 09 23:45:00 np0005479288.novalocal sudo[98230]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98230]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:00 np0005479288.novalocal sudo[98233]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_error_ssl.log Oct 09 23:45:00 np0005479288.novalocal sudo[98233]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:00 np0005479288.novalocal sudo[98233]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98236]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_error_ssl.log Oct 09 23:45:01 np0005479288.novalocal sudo[98236]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98236]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98239]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_error_ssl.log Oct 09 23:45:01 np0005479288.novalocal sudo[98239]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98239]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98242]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_error_ssl.log Oct 09 23:45:01 np0005479288.novalocal sudo[98242]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98242]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98245]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_error_ssl.log Oct 09 23:45:01 np0005479288.novalocal sudo[98245]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98245]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98248]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_access.log Oct 09 23:45:01 np0005479288.novalocal sudo[98248]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98248]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98251]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_access.log Oct 09 23:45:01 np0005479288.novalocal sudo[98251]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98251]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98254]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_access_ssl.log Oct 09 23:45:01 np0005479288.novalocal sudo[98254]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98254]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98257]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_access_ssl.log Oct 09 23:45:01 np0005479288.novalocal sudo[98257]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98257]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98260]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_access_ssl.log Oct 09 23:45:01 np0005479288.novalocal sudo[98260]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98260]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98263]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_access_ssl.log Oct 09 23:45:01 np0005479288.novalocal sudo[98263]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98263]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98266]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_access_ssl.log Oct 09 23:45:01 np0005479288.novalocal sudo[98266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98266]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98271]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_access_ssl.log Oct 09 23:45:01 np0005479288.novalocal sudo[98271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98271]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98274]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_access_ssl.log Oct 09 23:45:01 np0005479288.novalocal sudo[98274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98274]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98277]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_access_ssl.log Oct 09 23:45:01 np0005479288.novalocal sudo[98277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98277]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98280]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.log Oct 09 23:45:01 np0005479288.novalocal sudo[98280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98280]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98283]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.log Oct 09 23:45:01 np0005479288.novalocal sudo[98283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98283]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98286]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./audit.log.txt Oct 09 23:45:01 np0005479288.novalocal sudo[98286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98286]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98289]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./nova Oct 09 23:45:01 np0005479288.novalocal sudo[98289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98289]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98292]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./manila Oct 09 23:45:01 np0005479288.novalocal sudo[98292]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98292]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98295]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Oct 09 23:45:01 np0005479288.novalocal sudo[98295]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98295]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98298]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./keystone Oct 09 23:45:01 np0005479288.novalocal sudo[98298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98298]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98301]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./glance Oct 09 23:45:01 np0005479288.novalocal sudo[98301]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98301]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98304]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf.txt Oct 09 23:45:01 np0005479288.novalocal sudo[98304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98304]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98307]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./rpm-qa.txt Oct 09 23:45:01 np0005479288.novalocal sudo[98307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98307]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98310]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./repolist.txt Oct 09 23:45:01 np0005479288.novalocal sudo[98310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98310]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98313]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./installed-packages.txt Oct 09 23:45:01 np0005479288.novalocal sudo[98313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98313]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:01 np0005479288.novalocal sudo[98316]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./modulelist.txt Oct 09 23:45:01 np0005479288.novalocal sudo[98316]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:01 np0005479288.novalocal sudo[98316]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98319]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.log Oct 09 23:45:02 np0005479288.novalocal sudo[98319]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98319]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98322]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.rpm.log Oct 09 23:45:02 np0005479288.novalocal sudo[98322]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98322]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98325]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./gem-list.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98325]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98328]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./df.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98328]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98331]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./free.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98331]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98334]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lsmod.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98334]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98334]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98337]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./cpuinfo.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98337]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98340]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ps.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98340]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98343]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ip_-d_address.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98343]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98343]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98346]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./brctl_show.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98346]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98346]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98349]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_show.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98349]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98349]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98352]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_list_open_vswitch.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98352]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98352]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98355]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98355]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98355]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98358]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98358]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98358]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98361]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./netstat.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98361]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98361]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98364]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./systemctl.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98364]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98364]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98367]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iptables.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98367]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98367]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98370]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./mount.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98370]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98370]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98373]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./losetup_-al.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98373]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98373]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98376]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lvm.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98376]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98376]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98379]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./semanage-boolean-list.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98379]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98382]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98382]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98385]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./nova.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98385]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98385]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98388]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./placement.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98388]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98388]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98391]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98391]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98391]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:02 np0005479288.novalocal sudo[98394]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./glance.txt Oct 09 23:45:02 np0005479288.novalocal sudo[98394]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:02 np0005479288.novalocal sudo[98394]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98397]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.txt Oct 09 23:45:03 np0005479288.novalocal sudo[98397]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98397]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98400]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./manila.txt Oct 09 23:45:03 np0005479288.novalocal sudo[98400]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98400]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98403]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.txt Oct 09 23:45:03 np0005479288.novalocal sudo[98403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98403]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98406]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./nova-cell_v2.txt Oct 09 23:45:03 np0005479288.novalocal sudo[98406]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98406]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[97178]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98411]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chown -R 0:0 /var/log/weirdo-project/logs Oct 09 23:45:03 np0005479288.novalocal sudo[98411]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98411]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98414]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type l -execdir sudo rm -f {} ; Oct 09 23:45:03 np0005479288.novalocal sudo[98414]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98417]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Oct 09 23:45:03 np0005479288.novalocal sudo[98417]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98417]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98420]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./glance_cinder_store.filters Oct 09 23:45:03 np0005479288.novalocal sudo[98420]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98420]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98423]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Oct 09 23:45:03 np0005479288.novalocal sudo[98423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98423]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98426]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./ovn.ini Oct 09 23:45:03 np0005479288.novalocal sudo[98426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98426]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98429]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./plugin.ini Oct 09 23:45:03 np0005479288.novalocal sudo[98429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98429]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98432]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn.ini Oct 09 23:45:03 np0005479288.novalocal sudo[98432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98432]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98435]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks/autostart ; USER=root ; COMMAND=/bin/rm -f ./default.xml Oct 09 23:45:03 np0005479288.novalocal sudo[98435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98435]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98438]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_admin_add_share_panel_group.py Oct 09 23:45:03 np0005479288.novalocal sudo[98438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98438]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98441]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_project_add_share_panel_group.py Oct 09 23:45:03 np0005479288.novalocal sudo[98441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98441]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98444]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_admin_add_shares_panel_to_share_panel_group.py Oct 09 23:45:03 np0005479288.novalocal sudo[98444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98444]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98447]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_project_add_shares_panel_to_share_panel_group.py Oct 09 23:45:03 np0005479288.novalocal sudo[98447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98447]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98450]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_admin_add_share_snapshots_panel_to_share_panel_group.py Oct 09 23:45:03 np0005479288.novalocal sudo[98450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98450]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98453]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_project_add_share_snapshots_panel_to_share_panel_group.py Oct 09 23:45:03 np0005479288.novalocal sudo[98453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98453]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98456]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9030_manila_admin_add_share_types_panel_to_share_panel_group.py Oct 09 23:45:03 np0005479288.novalocal sudo[98456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98456]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98459]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_admin_add_share_networks_panel_to_share_panel_group.py Oct 09 23:45:03 np0005479288.novalocal sudo[98459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98459]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98462]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_project_add_share_networks_panel_to_share_panel_group.py Oct 09 23:45:03 np0005479288.novalocal sudo[98462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98462]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:03 np0005479288.novalocal sudo[98465]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_admin_add_security_services_panel_to_share_panel_group.py Oct 09 23:45:03 np0005479288.novalocal sudo[98465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:03 np0005479288.novalocal sudo[98465]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98468]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_project_add_security_services_panel_to_share_panel_group.py Oct 09 23:45:04 np0005479288.novalocal sudo[98468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98468]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98471]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9060_manila_admin_add_share_servers_panel_to_share_panel_group.py Oct 09 23:45:04 np0005479288.novalocal sudo[98471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98471]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98474]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9070_manila_admin_add_share_instances_panel_to_share_panel_group.py Oct 09 23:45:04 np0005479288.novalocal sudo[98474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98474]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98477]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_admin_add_share_groups_panel_to_share_panel_group.py Oct 09 23:45:04 np0005479288.novalocal sudo[98477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98477]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98480]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_project_add_share_groups_panel_to_share_panel_group.py Oct 09 23:45:04 np0005479288.novalocal sudo[98480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98480]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98483]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_admin_add_share_group_snapshots_panel_to_share_panel_group.py Oct 09 23:45:04 np0005479288.novalocal sudo[98483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98483]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98486]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_project_add_share_group_snapshots_panel_to_share_panel_group.py Oct 09 23:45:04 np0005479288.novalocal sudo[98486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98486]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98489]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9090_manila_admin_add_share_group_types_panel_to_share_panel_group.py Oct 09 23:45:04 np0005479288.novalocal sudo[98489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98489]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98492]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_admin_add_user_messages_panel_to_share_panel_group.py Oct 09 23:45:04 np0005479288.novalocal sudo[98492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98492]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98495]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_project_add_user_messages_panel_to_share_panel_group.py Oct 09 23:45:04 np0005479288.novalocal sudo[98495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98495]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98414]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98499]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20251009_232817.log /var/log/weirdo-project/logs/puppet-20251009_232817.txt Oct 09 23:45:04 np0005479288.novalocal sudo[98499]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98499]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98502]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20251009_233110.log /var/log/weirdo-project/logs/puppet-20251009_233110.txt Oct 09 23:45:04 np0005479288.novalocal sudo[98502]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98502]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98505]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-manage.log /var/log/weirdo-project/logs/cinder/cinder-manage.txt Oct 09 23:45:04 np0005479288.novalocal sudo[98505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98505]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98508]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/scheduler.log /var/log/weirdo-project/logs/cinder/scheduler.txt Oct 09 23:45:04 np0005479288.novalocal sudo[98508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98508]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98511]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-api.log /var/log/weirdo-project/logs/cinder/cinder-api.txt Oct 09 23:45:04 np0005479288.novalocal sudo[98511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98511]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98514]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/volume.log /var/log/weirdo-project/logs/cinder/volume.txt Oct 09 23:45:04 np0005479288.novalocal sudo[98514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98514]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98517]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/backup.log /var/log/weirdo-project/logs/cinder/backup.txt Oct 09 23:45:04 np0005479288.novalocal sudo[98517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98517]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98520]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/cache.log /var/log/weirdo-project/logs/glance/cache.txt Oct 09 23:45:04 np0005479288.novalocal sudo[98520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98520]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98523]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/api.log /var/log/weirdo-project/logs/glance/api.txt Oct 09 23:45:04 np0005479288.novalocal sudo[98523]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98523]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98526]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/horizon/horizon.log /var/log/weirdo-project/logs/horizon/horizon.txt Oct 09 23:45:04 np0005479288.novalocal sudo[98526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98526]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98529]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone.log /var/log/weirdo-project/logs/keystone/keystone.txt Oct 09 23:45:04 np0005479288.novalocal sudo[98529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98529]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98532]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone-manage.log /var/log/weirdo-project/logs/keystone/keystone-manage.txt Oct 09 23:45:04 np0005479288.novalocal sudo[98532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98532]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:04 np0005479288.novalocal sudo[98535]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-manage.log /var/log/weirdo-project/logs/manila/manila-manage.txt Oct 09 23:45:04 np0005479288.novalocal sudo[98535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:04 np0005479288.novalocal sudo[98535]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98538]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/scheduler.log /var/log/weirdo-project/logs/manila/scheduler.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98538]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98541]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/share.log /var/log/weirdo-project/logs/manila/share.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98541]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98544]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/privsep-helper.log /var/log/weirdo-project/logs/manila/privsep-helper.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98544]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98547]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/data.log /var/log/weirdo-project/logs/manila/data.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98547]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98547]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98550]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-api.log /var/log/weirdo-project/logs/manila/manila-api.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98550]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98553]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/server.log /var/log/weirdo-project/logs/neutron/server.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98553]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98556]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.log /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98556]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98559]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.log /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98559]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98562]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/privsep-helper.log /var/log/weirdo-project/logs/neutron/privsep-helper.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98562]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98565]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-manage.log /var/log/weirdo-project/logs/nova/nova-manage.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98565]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98568]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-novncproxy.log /var/log/weirdo-project/logs/nova/nova-novncproxy.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98568]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98571]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-conductor.log /var/log/weirdo-project/logs/nova/nova-conductor.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98571]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98574]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-compute.log /var/log/weirdo-project/logs/nova/nova-compute.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98574]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98577]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-scheduler.log /var/log/weirdo-project/logs/nova/nova-scheduler.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98577]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98580]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-api.log /var/log/weirdo-project/logs/nova/nova-api.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98580]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98583]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/privsep-helper.log /var/log/weirdo-project/logs/nova/privsep-helper.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98583]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98586]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-metadata-api.log /var/log/weirdo-project/logs/nova/nova-metadata-api.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98586]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98589]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/housekeeping.log /var/log/weirdo-project/logs/octavia/housekeeping.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98589]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98592]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/driver-agent.log /var/log/weirdo-project/logs/octavia/driver-agent.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98592]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98595]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/worker.log /var/log/weirdo-project/logs/octavia/worker.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98595]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98598]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/app.log /var/log/weirdo-project/logs/octavia/app.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98598]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98601]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/health-manager.log /var/log/weirdo-project/logs/octavia/health-manager.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98601]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98601]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98604]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-controller.log /var/log/weirdo-project/logs/ovn/ovn-controller.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98604]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98607]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98607]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98607]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98610]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98610]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98610]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98613]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-northd.log /var/log/weirdo-project/logs/ovn/ovn-northd.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98613]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98613]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98616]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/placement/placement.log /var/log/weirdo-project/logs/placement/placement.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98616]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98616]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98619]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98619]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98619]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98622]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98622]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98622]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98625]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/mariadb/mariadb.log /var/log/weirdo-project/logs/mariadb/mariadb.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98625]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98625]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98628]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/tempest.log /var/log/weirdo-project/logs/tempest.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98628]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98628]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:05 np0005479288.novalocal sudo[98631]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dstat.log /var/log/weirdo-project/logs/dstat.txt Oct 09 23:45:05 np0005479288.novalocal sudo[98631]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:05 np0005479288.novalocal sudo[98631]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98634]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iostat.log /var/log/weirdo-project/logs/iostat.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98634]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98634]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98637]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iotop.log /var/log/weirdo-project/logs/iotop.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98637]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98637]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98640]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98640]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98640]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98643]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98643]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98643]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98646]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98646]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98649]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98649]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98649]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98652]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98652]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98655]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98655]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98658]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98658]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98658]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98661]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98661]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98661]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98664]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98664]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98664]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98667]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.log /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98667]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98667]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98670]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-pki.log /var/log/weirdo-project/logs/openvswitch/ovs-pki.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98670]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98670]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98673]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovsdb-server.log /var/log/weirdo-project/logs/openvswitch/ovsdb-server.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98673]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98673]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98676]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.log /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98676]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98676]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98679]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_error.log /var/log/weirdo-project/logs/apache/horizon_error.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98679]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98679]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98682]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_error.log /var/log/weirdo-project/logs/apache/horizon_ssl_error.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98682]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98682]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98685]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98685]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98688]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98688]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98688]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98691]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98691]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98691]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98694]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98694]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98694]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98697]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98697]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98700]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98700]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98700]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98703]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98703]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98706]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98706]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98706]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98709]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_access.log /var/log/weirdo-project/logs/apache/horizon_access.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98709]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98709]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98712]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_access.log /var/log/weirdo-project/logs/apache/horizon_ssl_access.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98712]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98712]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98715]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98715]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98715]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98718]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98718]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98718]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:06 np0005479288.novalocal sudo[98721]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.txt Oct 09 23:45:06 np0005479288.novalocal sudo[98721]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:06 np0005479288.novalocal sudo[98721]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98724]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98724]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98727]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98727]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98727]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98730]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98730]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98730]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98733]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98733]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98733]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98736]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98736]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98736]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98739]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/redis.log /var/log/weirdo-project/logs/redis/redis.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98739]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98742]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/sentinel.log /var/log/weirdo-project/logs/redis/sentinel.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98742]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98745]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.log /var/log/weirdo-project/logs/dnf/dnf.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98745]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98748]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.rpm.log /var/log/weirdo-project/logs/dnf/dnf.rpm.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98748]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98752]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/zuul /var/log/weirdo-project/logs/sudoers.d/zuul.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98752]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98752]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98755]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98755]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98755]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98758]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/glance /var/log/weirdo-project/logs/sudoers.d/glance.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98758]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98758]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98761]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/neutron /var/log/weirdo-project/logs/sudoers.d/neutron.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98761]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98761]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98764]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/nova /var/log/weirdo-project/logs/sudoers.d/nova.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98764]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98764]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98767]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/cinder /var/log/weirdo-project/logs/sudoers.d/cinder.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98767]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98767]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98770]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/manila /var/log/weirdo-project/logs/sudoers.d/manila.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98770]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98770]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98773]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98773]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98773]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98776]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98776]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98776]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98779]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98779]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98779]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98782]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98782]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98782]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98785]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98785]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98785]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98788]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98788]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98788]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98791]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98791]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98791]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98794]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98794]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98794]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:07 np0005479288.novalocal sudo[98797]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs.txt Oct 09 23:45:07 np0005479288.novalocal sudo[98797]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:07 np0005479288.novalocal sudo[98797]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98800]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98800]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98800]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98803]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98803]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98803]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98806]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98806]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98806]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98809]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98809]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98809]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98812]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98812]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98812]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98815]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98815]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98815]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98818]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98818]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98818]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98821]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98821]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98821]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98824]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98824]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98824]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98827]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98827]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98827]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98830]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98830]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98830]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98833]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98833]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98833]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98836]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98836]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98836]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98839]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98839]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98839]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98842]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98842]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98845]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98845]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98845]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98848]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98848]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98848]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98851]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005479288.novalocal.pem /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005479288.novalocal.pem.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98851]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98851]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98854]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/api-paste.ini /var/log/weirdo-project/logs/etc/cinder/api-paste.ini.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98854]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98857]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/cinder.conf /var/log/weirdo-project/logs/etc/cinder/cinder.conf.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98857]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98860]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/resource_filters.json /var/log/weirdo-project/logs/etc/cinder/resource_filters.json.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98860]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98863]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98863]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98863]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:08 np0005479288.novalocal sudo[98866]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/policy.yaml /var/log/weirdo-project/logs/etc/cinder/policy.yaml.txt Oct 09 23:45:08 np0005479288.novalocal sudo[98866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:08 np0005479288.novalocal sudo[98866]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98869]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98869]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98872]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api.conf /var/log/weirdo-project/logs/etc/glance/glance-api.conf.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98872]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98875]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-cache.conf /var/log/weirdo-project/logs/etc/glance/glance-cache.conf.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98875]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98878]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98878]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98881]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98881]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98884]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-swift.conf /var/log/weirdo-project/logs/etc/glance/glance-swift.conf.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98884]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98887]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/rootwrap.conf /var/log/weirdo-project/logs/etc/glance/rootwrap.conf.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98887]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98890]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/schema-image.json /var/log/weirdo-project/logs/etc/glance/schema-image.json.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98890]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98893]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/policy.yaml /var/log/weirdo-project/logs/etc/glance/policy.yaml.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98893]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98893]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98896]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98896]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98899]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98899]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98902]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98902]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98905]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98905]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98908]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98908]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98911]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98911]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98914]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98914]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98917]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98917]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98920]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98920]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98923]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98923]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98926]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98926]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98929]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98929]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98932]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98932]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:09 np0005479288.novalocal sudo[98935]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json.txt Oct 09 23:45:09 np0005479288.novalocal sudo[98935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:09 np0005479288.novalocal sudo[98935]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98938]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98938]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98941]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98941]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98944]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98944]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98947]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98947]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98950]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98950]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98953]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98953]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98956]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98956]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98959]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98959]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98962]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98962]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98965]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98965]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98968]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98968]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98971]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98971]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98974]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98974]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98977]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98977]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98980]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98980]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98983]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98983]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98986]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98986]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98989]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98989]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98992]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98992]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98992]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98995]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005479288.novalocal.pem /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005479288.novalocal.pem.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98995]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98995]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[98998]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1.txt Oct 09 23:45:10 np0005479288.novalocal sudo[98998]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[98998]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[99001]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2.txt Oct 09 23:45:10 np0005479288.novalocal sudo[99001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[99001]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[99004]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0.txt Oct 09 23:45:10 np0005479288.novalocal sudo[99004]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[99004]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[99007]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/1 /var/log/weirdo-project/logs/etc/keystone/credential-keys/1.txt Oct 09 23:45:10 np0005479288.novalocal sudo[99007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[99007]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[99010]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/0 /var/log/weirdo-project/logs/etc/keystone/credential-keys/0.txt Oct 09 23:45:10 np0005479288.novalocal sudo[99010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:10 np0005479288.novalocal sudo[99010]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:10 np0005479288.novalocal sudo[99013]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005479288.novalocal.pem /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005479288.novalocal.pem.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99013]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99013]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99016]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99016]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99019]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/keystone.conf /var/log/weirdo-project/logs/etc/keystone/keystone.conf.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99019]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99022]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/logging.conf /var/log/weirdo-project/logs/etc/keystone/logging.conf.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99022]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99025]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99025]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99028]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.yaml /var/log/weirdo-project/logs/etc/keystone/policy.yaml.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99028]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99028]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99031]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005479288.novalocal.pem /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005479288.novalocal.pem.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99031]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99031]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99034]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/api-paste.ini /var/log/weirdo-project/logs/etc/manila/api-paste.ini.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99034]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99034]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99037]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/manila.conf /var/log/weirdo-project/logs/etc/manila/manila.conf.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99037]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99037]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99040]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/rootwrap.conf /var/log/weirdo-project/logs/etc/manila/rootwrap.conf.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99040]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99043]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/policy.yaml /var/log/weirdo-project/logs/etc/manila/policy.yaml.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99043]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99043]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99048]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron.conf /var/log/weirdo-project/logs/etc/neutron/neutron.conf.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99048]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99051]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99051]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99054]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/api-paste.ini /var/log/weirdo-project/logs/etc/neutron/api-paste.ini.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99054]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99057]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99057]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99060]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99060]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99063]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99063]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99066]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99066]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99069]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99069]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99072]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99072]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99075]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99075]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99078]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99078]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99081]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99081]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99084]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99084]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99087]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99087]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:11 np0005479288.novalocal sudo[99087]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:11 np0005479288.novalocal sudo[99090]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/policy.yaml /var/log/weirdo-project/logs/etc/neutron/policy.yaml.txt Oct 09 23:45:11 np0005479288.novalocal sudo[99090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99090]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99093]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/conf.d/README /var/log/weirdo-project/logs/etc/neutron/conf.d/README.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99093]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99096]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99096]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99099]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99099]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99102]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99102]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99105]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005479288.novalocal.pem /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005479288.novalocal.pem.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99105]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99108]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/api-paste.ini /var/log/weirdo-project/logs/etc/nova/api-paste.ini.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99108]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99111]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova.conf /var/log/weirdo-project/logs/etc/nova/nova.conf.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99111]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99114]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/release /var/log/weirdo-project/logs/etc/nova/release.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99114]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99117]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/rootwrap.conf /var/log/weirdo-project/logs/etc/nova/rootwrap.conf.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99117]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99120]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.yaml /var/log/weirdo-project/logs/etc/nova/policy.yaml.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99120]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99123]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova-compute.conf /var/log/weirdo-project/logs/etc/nova/nova-compute.conf.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99123]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99126]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005479288.novalocal.pem /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005479288.novalocal.pem.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99126]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99129]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/octavia.conf /var/log/weirdo-project/logs/etc/octavia/octavia.conf.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99129]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99132]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/policy.yaml /var/log/weirdo-project/logs/etc/octavia/policy.yaml.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99132]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99135]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99135]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99138]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99138]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99141]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99141]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99144]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99144]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99147]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99147]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99150]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99150]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99150]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99153]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99153]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99153]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99156]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99156]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99156]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:12 np0005479288.novalocal sudo[99159]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem.txt Oct 09 23:45:12 np0005479288.novalocal sudo[99159]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:12 np0005479288.novalocal sudo[99159]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99162]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005479288.novalocal.pem /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005479288.novalocal.pem.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99162]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99162]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99165]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005479288.novalocal.pem /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005479288.novalocal.pem.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99165]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99168]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/placement.conf /var/log/weirdo-project/logs/etc/placement/placement.conf.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99168]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99168]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99171]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.yaml /var/log/weirdo-project/logs/etc/placement/policy.yaml.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99171]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99174]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99174]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99177]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99177]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99177]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99180]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99180]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99180]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99183]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99183]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99186]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/tempest.conf /var/log/weirdo-project/logs/etc/tempest/tempest.conf.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99186]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99189]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99189]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99192]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.conf /var/log/weirdo-project/logs/etc/rsyslog.conf.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99192]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99195]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99195]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99198]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99198]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99201]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/inetrc /var/log/weirdo-project/logs/etc/rabbitmq/inetrc.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99201]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99201]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99204]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99204]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99207]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99207]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99207]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99210]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99210]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99213]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005479288.novalocal.pem /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005479288.novalocal.pem.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99213]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99216]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf /var/log/weirdo-project/logs/etc/my.cnf.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99216]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99219]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99219]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99222]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99222]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99225]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99225]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99228]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99228]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99231]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99231]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99234]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:13 np0005479288.novalocal sudo[99234]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:13 np0005479288.novalocal sudo[99237]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf.txt Oct 09 23:45:13 np0005479288.novalocal sudo[99237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99237]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99240]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/np0005479288.novalocal.pem /var/log/weirdo-project/logs/etc/my.cnf.d/np0005479288.novalocal.pem.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99240]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99243]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99243]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99246]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99246]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99249]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99249]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99252]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99252]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99255]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99255]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99258]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99258]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99261]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99261]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99264]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99264]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99267]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99267]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99270]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99270]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99273]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99273]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99276]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/network.conf /var/log/weirdo-project/logs/etc/libvirt/network.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99276]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99276]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99279]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99279]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99282]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99282]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99285]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99285]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99288]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99288]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99291]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu.conf /var/log/weirdo-project/logs/etc/libvirt/qemu.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99291]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99294]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99294]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99297]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99297]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99300]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99300]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99303]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99303]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:14 np0005479288.novalocal sudo[99303]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:14 np0005479288.novalocal sudo[99306]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem.txt Oct 09 23:45:14 np0005479288.novalocal sudo[99306]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99306]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99309]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/default.conf /var/log/weirdo-project/logs/etc/openvswitch/default.conf.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99309]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99312]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~ /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99312]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99315]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/conf.db /var/log/weirdo-project/logs/etc/openvswitch/conf.db.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99315]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99315]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99318]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99318]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99318]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99321]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99321]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99321]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99324]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99324]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99324]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99327]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99327]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99327]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99330]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99330]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99330]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99333]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99333]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99333]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99336]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99336]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99336]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99339]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99339]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99339]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99342]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/magic /var/log/weirdo-project/logs/etc/httpd/conf/magic.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99342]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99342]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99345]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99345]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99348]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99348]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99359]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99359]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99390]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99390]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99390]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99393]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99393]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99393]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99396]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99396]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99396]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99399]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99399]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99399]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99402]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99402]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:15 np0005479288.novalocal sudo[99402]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:15 np0005479288.novalocal sudo[99405]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf.txt Oct 09 23:45:15 np0005479288.novalocal sudo[99405]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99405]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99408]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99408]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99408]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99411]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99411]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99411]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99414]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99414]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99414]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99417]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99417]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99417]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99420]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99420]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99420]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99423]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99423]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99426]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99426]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99429]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99429]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99432]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99432]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99435]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99435]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99438]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99438]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99441]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99441]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99444]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99444]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99447]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99447]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99450]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99450]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99453]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99453]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99456]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99456]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99459]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99459]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99462]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99462]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99465]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99465]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99468]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99468]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99471]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99471]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99474]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet.txt Oct 09 23:45:16 np0005479288.novalocal sudo[99474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:16 np0005479288.novalocal sudo[99474]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:16 np0005479288.novalocal sudo[99477]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf /var/log/weirdo-project/logs/etc/redis/redis.conf.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99477]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99480]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99480]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99483]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf /var/log/weirdo-project/logs/etc/redis/sentinel.conf.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99483]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99486]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005479288.novalocal.pem /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005479288.novalocal.pem.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99486]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99489]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99489]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99492]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99492]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99495]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99495]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99498]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99498]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99501]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99501]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99504]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99504]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99507]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99507]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99510]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99510]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99510]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99513]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99513]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99513]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99516]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99516]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99516]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99519]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99519]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99522]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99522]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99525]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99525]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99528]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99528]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99531]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99531]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99534]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99534]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99537]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99537]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99540]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99540]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:17 np0005479288.novalocal sudo[99543]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt.txt Oct 09 23:45:17 np0005479288.novalocal sudo[99543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:17 np0005479288.novalocal sudo[99543]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[99546]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt.txt Oct 09 23:45:18 np0005479288.novalocal sudo[99546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:18 np0005479288.novalocal sudo[99546]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[99549]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml.txt Oct 09 23:45:18 np0005479288.novalocal sudo[99549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:18 np0005479288.novalocal sudo[99549]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[99552]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt.txt Oct 09 23:45:18 np0005479288.novalocal sudo[99552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:18 np0005479288.novalocal sudo[99552]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[99555]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005479288.novalocal.pem /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005479288.novalocal.pem.txt Oct 09 23:45:18 np0005479288.novalocal sudo[99555]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:18 np0005479288.novalocal sudo[99555]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[99558]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf.txt Oct 09 23:45:18 np0005479288.novalocal sudo[99558]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:18 np0005479288.novalocal sudo[99558]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[99561]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo.txt Oct 09 23:45:18 np0005479288.novalocal sudo[99561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:18 np0005479288.novalocal sudo[99561]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[99564]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo.txt Oct 09 23:45:18 np0005479288.novalocal sudo[99564]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:18 np0005479288.novalocal sudo[99564]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[99567]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo.txt Oct 09 23:45:18 np0005479288.novalocal sudo[99567]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:18 np0005479288.novalocal sudo[99567]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[99570]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo.txt Oct 09 23:45:18 np0005479288.novalocal sudo[99570]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:18 np0005479288.novalocal sudo[99570]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[99573]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo.txt Oct 09 23:45:18 np0005479288.novalocal sudo[99573]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:18 np0005479288.novalocal sudo[99573]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[99576]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/passwd /var/log/weirdo-project/logs/etc/passwd.txt Oct 09 23:45:18 np0005479288.novalocal sudo[99576]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:18 np0005479288.novalocal sudo[99576]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[99579]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/group /var/log/weirdo-project/logs/etc/group.txt Oct 09 23:45:18 np0005479288.novalocal sudo[99579]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:18 np0005479288.novalocal sudo[99579]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[99582]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml.txt Oct 09 23:45:18 np0005479288.novalocal sudo[99582]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:18 np0005479288.novalocal sudo[99582]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[99585]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/fstab /var/log/weirdo-project/logs/etc/fstab.txt Oct 09 23:45:18 np0005479288.novalocal sudo[99585]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 09 23:45:18 np0005479288.novalocal sudo[99585]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[96298]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:18 np0005479288.novalocal sudo[99695]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uzwcwnygnxhpfompnvdseyqzzdqxtmtn ; /usr/bin/python3' Oct 09 23:45:18 np0005479288.novalocal sudo[99695]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:45:19 np0005479288.novalocal python3[99697]: ansible-command Invoked with creates=/var/log/weirdo/cpuinfo.txt _raw_params=cat /proc/cpuinfo >/var/log/weirdo/cpuinfo.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 09 23:45:19 np0005479288.novalocal sudo[99695]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:19 np0005479288.novalocal sudo[99703]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qqlnahqgyurgkapnjtxiguwobuebhzpk ; /usr/bin/python3' Oct 09 23:45:19 np0005479288.novalocal sudo[99703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:45:19 np0005479288.novalocal python3[99705]: ansible-command Invoked with creates=/var/log/weirdo/df.txt _raw_params=df -h >/var/log/weirdo/df.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 09 23:45:19 np0005479288.novalocal sudo[99703]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:19 np0005479288.novalocal sudo[99710]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qjzbexjgtavmmjxlwsmoceekkqnkqdmg ; /usr/bin/python3' Oct 09 23:45:19 np0005479288.novalocal sudo[99710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:45:19 np0005479288.novalocal python3[99712]: ansible-command Invoked with creates=/var/log/weirdo/dmesg.txt _raw_params=dmesg -T >/var/log/weirdo/dmesg.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 09 23:45:19 np0005479288.novalocal sudo[99710]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:19 np0005479288.novalocal sudo[99717]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jantzgrrcticxrnwmdpfppnkimocsybq ; /usr/bin/python3' Oct 09 23:45:19 np0005479288.novalocal sudo[99717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:45:19 np0005479288.novalocal python3[99719]: ansible-command Invoked with creates=/var/log/weirdo/fdisk.txt _raw_params=fdisk -l >/var/log/weirdo/fdisk.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 09 23:45:19 np0005479288.novalocal sudo[99717]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:19 np0005479288.novalocal sudo[99725]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yeusbzsawogigmvpsaojqgcpvmmvexod ; /usr/bin/python3' Oct 09 23:45:19 np0005479288.novalocal sudo[99725]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:45:20 np0005479288.novalocal python3[99727]: ansible-command Invoked with creates=/var/log/weirdo/getenforce.txt _raw_params=getenforce >/var/log/weirdo/getenforce.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 09 23:45:20 np0005479288.novalocal sudo[99725]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:20 np0005479288.novalocal sudo[99732]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-shwhvdaidkldadavssrcsxdtfuvtrewl ; /usr/bin/python3' Oct 09 23:45:20 np0005479288.novalocal sudo[99732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:45:20 np0005479288.novalocal python3[99734]: ansible-command Invoked with creates=/var/log/weirdo/hosts.txt _raw_params=cat /etc/hosts >/var/log/weirdo/hosts.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 09 23:45:20 np0005479288.novalocal sudo[99732]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:20 np0005479288.novalocal sudo[99739]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pvzsxcyyvzlerbquxfpafjbenfqrmadn ; /usr/bin/python3' Oct 09 23:45:20 np0005479288.novalocal sudo[99739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:45:20 np0005479288.novalocal python3[99741]: ansible-command Invoked with creates=/var/log/weirdo/ip.txt _raw_params=ip a >/var/log/weirdo/ip.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 09 23:45:20 np0005479288.novalocal sudo[99739]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:20 np0005479288.novalocal sudo[99746]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dpwsdnqtujnszngzwysusfttjgugqsgj ; /usr/bin/python3' Oct 09 23:45:20 np0005479288.novalocal sudo[99746]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:45:20 np0005479288.novalocal python3[99748]: ansible-command Invoked with creates=/var/log/weirdo/iptables.txt _raw_params=iptables -vnL >/var/log/weirdo/iptables.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 09 23:45:21 np0005479288.novalocal sudo[99746]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:21 np0005479288.novalocal sudo[99753]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lvystuzsoaltjxgqeorophmraitfrijg ; /usr/bin/python3' Oct 09 23:45:21 np0005479288.novalocal sudo[99753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:45:21 np0005479288.novalocal python3[99755]: ansible-command Invoked with creates=/var/log/weirdo/iptables_nat.txt _raw_params=iptables -vnL -t nat >/var/log/weirdo/iptables_nat.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 09 23:45:21 np0005479288.novalocal sudo[99753]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:21 np0005479288.novalocal sudo[99760]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bldewozvmquzowmlxezibvaknsjofuxh ; /usr/bin/python3' Oct 09 23:45:21 np0005479288.novalocal sudo[99760]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:45:21 np0005479288.novalocal python3[99762]: ansible-command Invoked with creates=/var/log/weirdo/iptables_mangle.txt _raw_params=iptables -vnL -t mangle >/var/log/weirdo/iptables_mangle.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 09 23:45:21 np0005479288.novalocal sudo[99760]: pam_unix(sudo:session): session closed for user root Oct 09 23:45:21 np0005479288.novalocal sudo[99769]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vcelysukltjtzzjjkzcyhpmeznqtlnen ; /usr/bin/python3' Oct 09 23:45:21 np0005479288.novalocal sudo[99769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 09 23:45:21 np0005479288.novalocal python3[99771]: ansible-command Invoked with creates=/var/log/weirdo/journalctl.txt _raw_params=journalctl --no-pager >/var/log/weirdo/journalctl.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None